Implementasi Secure Hash Algorithm-256 dan Advanced Encryption Standard Untuk Verifikasi Tanda Tangan Digital
Abstract
Process of traditional document approval carried out across all layers of society as part of a legal system in matters related to work or daily activities that involve legal obligations by all relevant parties is done by using handwritten signatures to bind the intentions and contents of the document with all related parties and provie legal value. With the development of internet access, traditional signatures have started to be abandoned, leading to a shift in document approval infrastructure towards a hybrid system where document signing can be done electronically. This shift has introduced the potential for electronic signature forgery, as there is no validation that can be performed on a digital image of an electronic signature.The ease of scanning someone's traditional signature can potentially be misused by unauthorized parties, so digital signatures have been developed to address this problem. Digital signatures are used to secure messages or documents from unauthorised parties, secure sensitive data, strengthen the signatories' confidence and detect attempted corruption. The solution offered in this project is the development of a software system capable of verifying the authenticity of digital documents so that the documents are not abused and can be used as appropriate using the SHA-256 Hash Function and the AES-256 Encryption Algorithm. The software produced has a satisfaction percentage of 93.71%, so it can be concluded that the applications that have been developed are running well.
Downloads
References
M. Dahlia and W. Susetio, “Tinjauan Yuridis Penggunaan Tanda Tangan Digital Dalam Perjanjian Jual Beli,” J. Multidisiplin Indones., vol. 2, no. 8, pp. 2277–2289, 2023, doi: 10.58344/jmi.v2i8.442.
L. B. Sihombing, “Keabsahan Tanda Tangan Elektronik dalam Akta Notaris,” J. Educ. Dev., vol. 8, no. 1, p. 135, 2020, doi: https://doi.org/10.37081/ed.v8i1.1515.
T. Yuniati and M. F. Sidiq, “Literature Review: Legalisasi Dokumen Elektronik Menggunakan Tanda Tangan Digital sebagai Alternatif Pengesahan Dokumen di Masa Pandemi,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 6, 2020, doi: 10.29207/resti.v4i6.2502.
V. V. Zubov, “An Electronic Signature Within The Digital Economy,” in Proceedings of the II International Scientific Conference GCPMED 2019 - “Global Challenges and Prospects of the Modern Economic Development,” 2020, pp. 621–625. doi: 10.15405/epsbs.2020.03.89.
Ihwan, “Kasus pemalsuan tanda tangan di Program Pascasarjana UMI tahun 2014 , resmi dilaporkan oleh Lsm Gempa Indonesia.” Accessed: Oct. 05, 2023. [Online]. Available: https://sulselberita.com/2021/10/23/kasus-pemalsuan-tanda-tangan-di-program-pascasarjana-umi-tahun-2014-resmi-dilaporkan-oleh-lsm-gempa-indonesia/
Tempo, “Kasus Pabrik Semen Rembang, Polisi usut kasus pemalsuan tanda tangan.” Accessed: Oct. 05, 2023. [Online]. Available: https://koran.tempo.co/read/berita-utama-jateng/410502/polisi-usut-kasus-pemalsuan-tanda-tangan
Muria, “IEC Palsukan Stempel dan Tanda Tangan Presiden BEM UMK.” Accessed: Oct. 05, 2023. [Online]. Available: https://umk.ac.id/informasi/berita/2100-iec-palsukan-stempel-dan-tanda-tangan-presiden-bem-umk
R. Unila, “Tanggapi Kasus Tanda Tangan Palsu, Rektor Ingatkan Mahasiswa Taat Aturan.” Accessed: Oct. 05, 2023. [Online]. Available: https://www.unila.ac.id/tanggapi-kasus-tanda-tangan-palsu-rektor-ingatkan-mahasiswa-taat-aturan-2/
N. Chalimah and M. Ridhuan, “Menunggu Hasil Kerja Polisi Urusi Pemalsuan Tanda Tangan Gubernur, Penyidik Sedang Menyusun Laporan Terbaru.” Accessed: Oct. 05, 2023. [Online]. Available: https://kaltimpost.jawapos.com/utama/01/02/2023/menunggu-hasil-kerja-polisi-urusi-pemalsuan-tanda-tangan-gubernur-penyidik-sedang-menyusun-laporan-terbaru
F. Z. Abraham, P. I. Santosa, and W. W. Winarno, “Tandatangan Digital Sebagai Solusi Teknologi Informasi Dan Komunikasi (Tik) Hijau: Sebuah Kajian Literatur (Digital Signature As Green Information and Communication Technology (Ict) Solution: a Review Paper),” Masy. Telemat. Dan Inf. J. Penelit. Teknol. Inf. dan Komun., vol. 9, no. 2, p. 111, 2019, doi: 10.17933/mti.v9i2.120.
A. Eritza, M. Ramadhan, and H. Hafizah, “Penerapan Digital Signature Metode SHA dan DSA Pada Slip Gaji Pegawai,” J. Sist. Inf. Triguna Dharma (JURSI TGD), vol. 1, no. 6, p. 906, 2022, doi: 10.53513/jursi.v1i6.6002.
G. Leurent and T. Peyrin, “SHA-1 is a shambles: First chosen-prefix collision on SHA-1 and application to the PGP web of trust,” Proc. 29th USENIX Secur. Symp., pp. 1839–1856, 2020.
W. Pramusinto, B. Trya Sartana, S. Mulyati, and S. Amini, “Implementation of AES-192 Cryptography and QR Code to Verify The Authenticity of Budi Luhur University Student Certificate,” J. Pendidik. Teknol. Kejuru., vol. 3, no. 4, pp. 209–215, 2021, doi: 10.24036/jptk.v3i4.14823.
D. Puspitasari and Y. Permanasari, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” in Prosiding Matematika, 2020, pp. 14–20. doi: http://dx.doi.org/10.29313/.v0i0.20771.
J. Hutagalung, P. S. Ramadhan, and S. J. Sihombing, “Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature,” J. Teknol. Inf. dan Ilmu Komput., vol. 10, no. 6, pp. 1213–1222, 2023, doi: 10.25126/jtiik.1067319.
L. Ante, “Smart Contracts on the Blockchain – A Bibliometric Analysis and Review,” SSRN Electron. J., no. 10, pp. 1–48, 2020, doi: 10.2139/ssrn.3576393.
R. M. Nasution, “Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio,” Bull. Comput. Sci. Res., vol. 2, no. 3, pp. 73–84, 2022, doi: 10.47065/bulletincsr.v2i3.140.
NIST, “NIST Retires SHA-1 Cryptographic Algorithm.” Accessed: Oct. 05, 2023. [Online]. Available: https://www.nist.gov/news-events/news/2022/12/nist-retires-sha-1-cryptographic-algorithm
H. J. Christanto, “Game Theory Analysis on Marketing Strategy Determination of KAI Access and Traveloka based on Usability of HCI (Human-Computer Interaction),” J. Inf. Syst. Informatics, vol. 4, no. 3, pp. 665–672, 2022, doi: 10.51519/journalisi.v4i3.300.
K. L. D. Mendeja, N. R. Dulce, V. U. Martinez, C. N. Tuazon, N. A. Magnaye, and J. M. Gaspado, “A Development using the Rapid Application Model of peTrace : Peter ’ s Poultry Supply Sales and Monitoring Management System,” Int. J. Metaverse, vol. 1, no. 1, 2023.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Secure Hash Algorithm-256 dan Advanced Encryption Standard Untuk Verifikasi Tanda Tangan Digital
Pages: 229-239
Copyright (c) 2024 Ahmad Zaky Nadimsyah, Muhammad Ezar Al Rivan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















