Implementasi Time Lock Auto Decryption Untuk Keamanan Surat Wasiat Digital Berbasis Web dan Mobile


  • Reza Gemasih * Mail Universitas Teknologi Yogyakarta, Yogyakarta, Indonesia
  • Moh. Ali Romli Universitas Teknologi Yogyakarta, Yogyakarta, Indonesia
  • (*) Corresponding Author
Keywords: AES; RSA; TRC; Cryptography; Digital Will; Security

Abstract

The management of wills in Indonesia still relies heavily on physical documents stored by notaries or family members. This manual approach presents several weaknesses, including the risks of damage, loss, forgery, and unauthorized access before the intended time. To address these issues, this study develops a digital will-security system utilizing a combination of AES–RSA encryption and a server-based Time-Released Cryptography (TRC) mechanism. AES is employed to encrypt document contents quickly and efficiently, while RSA secures the AES encryption key. TRC is implemented to ensure that the decryption process can only be performed at the predetermined time, thereby systematically preventing unauthorized access. This research adopts the Waterfall model, encompassing requirement analysis, system design, implementation, and performance and security testing. The test results show that the average encryption time for a 300 KB document is 125 ms, while the average decryption time is 118 ms. The TRC mechanism demonstrates 100% timing accuracy with no deviation from the release schedule, and all attempts to access the document before its designated time failed completely (0% success rate). The integration of AES–RSA and TRC proves effective in enhancing security, maintaining confidentiality, and controlling timely access to digital will documents.

Downloads

Download data is not yet available.

References

Abdullah, R. K., Azhar, N. F., Mujahidin, S., & Hoan, R. O. (2025). Implementing AES-RSA Hybrid Encryption to Enhance the Security of Salary Slip Distribution Information System. Jambura Journal of Electrical and Electronics Engineering, 7(1), 33–40. https://doi.org/10.37905/jjeee.v7i1.28737

Al Jabbar, M. F., Harahap, F. A., & Sijabat, J. I. (2025). Analisis Perbandingan Pemanfaatan Erd Untuk Proses Pembuatan Program. Jurnal Informatika Utama, 3(1), 12–22. https://doi.org/10.55903/jitu.v3i1.263

Arianto, B., Kurniadi, H., & Kurniasari, I. (2023). Implementasi Pengarsipan Elektronik Menggunakan Enkripsi Dan Dekripsi Dengan Metode Aes Di Uniska. Jurnal Fasilkom, 13(02), 259–268. https://doi.org/10.37859/jf.v13i02.5060

Azhari, M., Mulyana, D. I., Perwitosari, J., & Ali, F. (2022). Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES). Jurnal Pendidikan Sains Dan Komputer, 2(1), 163–171. https://doi.org/10.47709/jpsk.v2i01.1390

Duma, A., & Pusvita, E. A. (2023). Pengembangan Sistem Informasi Data Siswa Berbasis Web Pada SMPN 09 Nabire dengan Metode Waterfall. Journal of Information System Management (JOISM), 5(1), 70–76. https://doi.org/10.24076/joism.2023v5i1.1115

Fauzan, D. A., Fathurrozi, A., & Sugiyatno. (2023). Perancangan Aplikasi Pengamanan Data Menggunakan Algoritma RSA (Rivest Shamir Adleman) dan AES (Advanced Encryption Standard) Berbasis Web. Journal of Information and Information Security (JIFORTY), 4(1), 2722–4058. https://doi.org/10.31599/qkfbes25

Mashudi, A. I. A., & Prihanto, A. (2025). Rancang Bangun Sistem Keamanan Pintu Menggunakan Metode Two-Factor Authentication. Journal of Informatics and Computer Science (JINACS), 6(03), 630–638. https://doi.org/10.26740/jinacs.v6n03.p630-638

Maulana, S. H., Saepudin, S., & Irawan, C. (2025). Perancangan Arsitektur Pengelolaan Taman Kota Berbasis Web Menggunakan Framework Zachman. JIPI (Jurnal Ilmiah Penelitian Dan Pembelajaran Informatika), 10(2), 1491–1506. https://doi.org/10.29100/jipi.v10i2.6265

Muslimah, M., & Kartikawati, D. R. (2022). Analisis Akta Wasiat yang Tidak Diketahui Oleh Ahli Waris Berdasarkan Hukum Waris Perdata. Krisna Law: Jurnal Mahasiswa Fakultas Hukum Universitas Krisnadwipayana, 4(1), 17–31. https://doi.org/10.37893/krisnalaw.v4i1.12

Olivia, B., Irine, P., Tahir, M., Ayu, N., Cholili, D. Y., Mulaikah, D., Batsul, A., & Septian, M. (2023). Implementasi Kriptografi Pada Keamanan Data Menggunakan Algoritma Advance Encryption Standard (Aes). Jurnal Simantec, 11(2), 167–174. https://doi.org/10.21107/simantec.v11i2.20034

Pirlo Indraka, A., & Romli, M. A. (2025). Keamanan Arsip Kelurahan Bumijo Menggunakan Metode Advanced Encryption Standard (AES 128) Berbasis Web. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 5(1), 232–241.

Ramdany, S. W., Kaidar, S. A., Aguchino, B., Putri, C. A. A., & Anggie, R. (2024). Penerapan UML Class Diagram dalam Perancangan Sistem Informasi Perpustakaan Berbasis Web. Journal of Industrial and Engineering System (JIES), 5(1), 30–41. https://doi.org/10.31599/2e9afp31

Salam, I. A., Prihandani, K., & Purnamasari, I. (2023). Rancang Bangun Aplikasi Profit Penjualan Motor Berbasis Desktop Konsep Arsitektur Model View Controller (Mvc). Jurnal Informatika Dan Teknik Elektro Terapan, 11(3s1), 1062–1080. https://doi.org/10.23960/jitet.v11i3s1.3495

Saripa, S. (2024). Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi. Progressive Information, Security, Computer, and Embedded System, 2(1), 35–45. https://doi.org/10.61255/pisces.v1i2.100

Silalahi, R., Parlina, I., Sumarno, S., Gunawan, I., & Saputra, W. (2021). Implementasi Algoritma Caesar Cipher dan Algoritma RSA untuk Keamanan Data Surat Wasiat pada Kantor Notaris/PPAT Robert Tampubolon, S.H. Jurnal Sosial Teknologi, 1(4), 282–293. https://doi.org/10.59188/jurnalsostech.v1i4.64

Sudamanto, A., & Nelli, J. (2024). Analisis Penghalang Kewarisan Dalam Kompilasi Hukum Islam (KHI). Al Yasini: Jurnal Keislaman, Sosial, Hukum Dan Pendidikan, 9(2), 282–294. https://doi.org/10.55102/alyasini.v9i2.6455

Syifauddin, M. R., Kusumodestoni, R. H., & Sarwido, S. (2024). Penerapan Algoritma Rivest Shamir Aldeman (RSA) untuk Pengamanan Data Gambar Nasabah BMT Al-Hikmah Permata. Jurnal Minfo Polgan, 13(1), 726–741. https://doi.org/10.33395/jmp.v13i1.13805

Wahyuni, E. D., Ramadha, F. N., & Vannes, D. D. (2024). SDLC Big Bang dan Waterfall: Perbandingan Pendekatan dalam Pengembangan Perangkat Lunak. Nuansa Informatika, 18(2), 41–45. https://doi.org/10.25134/ilkom.v18i2.158

Wahyuni, M. D., Patrianingsih, N. K. W., & Mufida, O. R. (2024). Peningkatan Efisiensi Layanan Administrasi Desa Melalui Pelatihan Digitalisasi Kearsipan. UNBI Mengabdi, 5(2), 77–85. https://doi.org/10.34063/um.v5i2.431

Yuan, K., Cheng, Z., Chen, K., Wang, B., Sun, J., Zhou, S., & Jia, C. (2024). Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system. Journal of Cloud Computing, 13(1). https://doi.org/10.1186/s13677-024-00676-y


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Time Lock Auto Decryption Untuk Keamanan Surat Wasiat Digital Berbasis Web dan Mobile

Dimensions Badge
Article History
Published: 2025-11-30
Abstract View: 58 times
PDF Download: 29 times
Section
Articles