Implementasi AES ECB dan Hashing MD5/SHA-256 Pada Aplikasi Penyuratan Android


  • Fajar Febriyadi Universitas Islam Negeri Sultan Syarif Kasim Riau, Pekanbaru, Indonesia
  • Fitra Kurnia * Mail Universitas Islam Negeri Sultan Syarif Kasim Riau, Pekanbaru, Indonesia
  • Nazruddin Safaat Harahap Universitas Islam Negeri Sultan Syarif Kasim Riau, Pekanbaru, Indonesia
  • Febi Yanto Universitas Islam Negeri Sultan Syarif Kasim Riau, Pekanbaru, Indonesia
  • Pizaini Pizaini Universitas Islam Negeri Sultan Syarif Kasim Riau, Pekanbaru, Indonesia
  • (*) Corresponding Author
Keywords: Lettering; Application; AES; Hash; Ministry of Religion

Abstract

The Riau Ministry of Religion Regional Office is still archiving assignment letters and official travel letters manually. The staff who take care of the correspondence section, namely personnel and legal unit staff, do not have an application that facilitates the activities of assignment letters and official travel letters to simplify filing and data containing certain information contained in letters which include assignment letters and official travel letters. Security is important because it relates to data. Therefore, a correspondence application was created to support the correspondence activities of the Riau Ministry of Religion Regional Office and make it easier for staff in the Civil Service and Legal unit to properly manage assignment letters and official travel letters as well as control books. Android application development uses the waterfall method and the ECB (Electronic Code Book) mode AES algorithm and MD5/SHA-256 hashing for security. By building this application, it will be easier for leaders and employees to exchange letters and confidential information, guaranteed security and the application built can be used by users easily. The results of the Black Box testing carried out on the application produced the expected output and the UAT test obtained a score of 89%. Application testing on sentences, Jpg, Png and PDF files has a fairly high level of security using statistical analysis methods, namely bit frequency testing, autocorrelation, 0/1 bit distribution, entropy.

Downloads

Download data is not yet available.

References

H. Pasaribu, D. Sitanggang, R. R. Damanik, dan A. C. R. Sitompul, “Combination Of Advanced Encryption Standard 256 Bits With MD5 to Secure Documents On Android Smartphone,” IOP Conf. Series: Journal of Physics, vol. 1007, no. 1, hlm. 1–8, 2018, doi: 10.1088/1742-6596/1007/1/012014.

G. G. P.U.K, Ernawati, dan A. Erlanshari, “Implementasi Metode Advanced Encryption Standard (AES) Dan Message Digest 5 (MD5) Pada Enkripsi Dokumen (Studi Kasus LPSE UNIB),” Jurnal Rekursif, vol. 4, no. 3, hlm. 277–287, 2016, doi: 10.33369/rekursif.v4i3.864.

A. Fathurrozi dan Selviyani, “Penerapan Algoritma Advanced Encryption Standard (AES256) Dengan Mode CBC DanSecure Hash Algorithm (SHA-256) Untuk Pengamanan Data File,” Journal of Information and Information Security (JIFORTY), vol. 2, no. 2, hlm. 227–238, 2021, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://ejurnal.ubharajaya.ac.id/index.php/jiforty/article/view/879

S. Sulastri dan R. D. M. Putri, “Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan,” Jurnal Teknik Elektro, vol. 10, no. 2, hlm. 70–74, 2018, doi: 10.15294/jte.v10i2.18628.

I. N. Abdullah, D. Kusumaningsih, dan M. Alawy, “Aplikasi Enkripsi File Dokumen Menggunakan Metode Algoritma AES (Advanced Encryption Standard) Dan OTP (One Time Pad) Berbasis Web Pada PT. MNC Sky Vision,” Telematika MKOM, vol. 10, no. 1, hlm. 11–16, 2018, doi: 10.36080/telematikamkom.654.

F. Nuraeni, Y. H. Agustin, dan A. E. Purnama, “Implementasi Caesar Cipher And Advanced Encryption Standard (AES) Pada Pengamanan Data Pajak Bumi Bangunan,” Jurnal Ilmiah Matrik, vol. 22, no. 2, hlm. 188–194, 2020, doi: 10.33557/jurnalmatrik.v22i2.949.

A. G. Pramudito dan D. Kusumaningsih, “Implementasi Algoritma AES 128 Dan RC4 Untuk Pengamanan Email Pada PT. Dinamika Hydro Engineering,” SKANIKA, vol. 1, no. 3, hlm. 869–876, 2018, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://jom.fti.budiluhur.ac.id/index.php/SKANIKA/article/view/2499

A. Hermawan dan E. I. H. Ujianto, “Implementasi Enkripsi Data Menggunakan Kombinasi AES Dan RSA,” Jurnal Nasional Informatika Dan Teknologi Jaringan, vol. 5, no. 2, hlm. 325–330, 2021, doi: 10.30743/infotekjar.v5i2.3585.

F. Kurnia, M. Fikry, dan F. Febriyadi, “Rancang Bangun Sistem Informasi Penyuratan Unit Kepegawaian Kantor Wilayah Kementerian Agama Provinsi Riau,” Jurnal Ilmiah Rekayasa Dan Manajemen Sistem Informasi, vol. 8, no. 2, hlm. 180–188, 2022, doi: 10.24014/rmsi.v8i2.18208.

R. Ravida dan H. A. Santoso, “Advanced Encryption Standard (AES) 128 Bit untuk Keamanan Data Internet of Things (IoT) Tanaman Hidroponik,” Jurnal Rekayasa Sistem dan Teknologi Informasi (RESTI), vol. 4, no. 6, hlm. 1157–1164, 2019, doi: 10.29207/resti.v4i6.2478.

D. Hulu, B. Nadeak, dan S. Aripin, “Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan,” Konferensi Nasional Teknologi Informasi Dan Komputer, vol. 4, no. 1, hlm. 78–86, 2020, doi: 10.30865/komik.v4i1.2645.

A. P. Putra, Herfina, S. Maryana, dan A. Setiawan, “Implementasi Algoritma AES (Advanced Encryption Standard) Rijndael Pada Aplikasi Keamanan Data,” Jurnal Ilmiah Penelitian Teknologi Informasi Dan Komputer, vol. 1, no. 2, hlm. 46–51, 2020, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://journal.upgris.ac.id/index.php/jipetik/article/view/KAI

J. Handoyo dan Y. M. Subakti, “Keamanan Dokumen Menggunakan Algoritma Advanced Encryption Standard (AES),” Jurnal Sistem Informasi Dan Teknologi, vol. 3, no. 2, hlm. 143–152, 2020, doi: 10.24176/sitech.v3i2.5865.

C. Kirana dan E. Sugianto, “Penerapan Algoritma AES dan Konversi SMS Ke Dalam Bahasa Khek pada Aplikasi Enkripsi Berbasis Mobile Application,” Jurnal Ilmu Komputer Dan Informatika, vol. 5, no. 1, hlm. 68–77, 2019, doi: 10.23917/khif.v5i1.7453.

A. A. Permana dan D. Nurnaningsih, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (AES),” Jurnal Teknik Informatika, vol. 11, no. 2, hlm. 177–186, 2018, doi: 10.15408/jti.v11i2.7811.

I. Fitriani dan A. B. Utomo, “Implementasi Algoritma Advanced Encryption Standard (AES) Pada Layanan SMS Desa,” JISKa, vol. 5, no. 3, hlm. 153–163, 2020, doi: 10.14421/jiska.2020.53-03.

A. E. Putri, A. Kartikadewi, dan L. A. A. Rosyid, “Implementasi Kriptografi Dengan Algoritma Advanced Encryption Standard (AES) 128 Bit Dan Steganografi Menggunakan Metode End Of File (EOF) Berbasis Java Desktop Pada Dinas Pendidikan Kabupaten Tangerang,” Applied Information Systems and Management (AISM), vol. 3, no. 2, hlm. 69–78, 2020, doi: 10.15408/aism.v3i2.14722.

Ahyuna dan S. Hozeng, “Perancangan Aplikasi Enkripsi Menggunakan Algoritma AES Berbasis Android,” dalam Prosiding Seminar Nasional Komunikasi Dan Informatika #3, 2019, hlm. 130–135. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://jurnal.kominfo.go.id/index.php/snki/article/view/2569

E. Ali, Rekayasa Perangkat Lunak. Yogyakarta: MFA, 2019.

A. R. Mulyanto, Rekayasa Perangkat Lunak Jilid 1. Jakarta: Direktorat Pembinaan Sekolah Menengah Kejuruan, 2008. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: http://opac.salatigakota.go.id/ucs/index.php?p=show_detail&id=33903

Widiyawati dkk., Rekayasa Perangkat Lunak. Bandung: Widina Bhakti Persada Bandung, 2022. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://repository.penerbitwidina.com/publications/410361/rekayasa-perangkat-lunak

M. Armstrong, “Institutional Repository Management Models That Support Faculty Research Dissemination,” Albertsons Library, vol. 30, no. 1, hlm. 1–3, 2013, doi: 10.1108/OCLC-07-2013-0028.

M. C. Sinaga, Kriptografi Python. Medan: Academia, 2017. doi: 10.31227/osf.io/6su2h.

B. Rahardjo, Keamanan Informasi. Bandung: Insan Infonesia, 2017. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://budi.rahardjo.id/files/keamanan.pdf

S. Kromodimoeljo, Teori dan Aplikasi Kriptografi. Jakarta: SPK IT Consulting, 2009. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://lmsspada.kemdikbud.go.id/pluginfile.php/548262/mod_resource/content/1/crypto-book-complete.pdf

J. Daemen dan V. Rijmen, The Design of Rijndael The Advanced Encryption Standard (AES) Second Edition. Berlin: Springer, 2002. doi: 10.1007/978-3-662-60769-5.

NIST, “NIST Special Publication 800-38A,” Maryland, 2001. doi: 10.6028/NIST.SP.800-38A.

E. Z. A. Kashogi, “Algoritma Message Digest 5 (MD5),” Institut Teknologi Bandung Makalah0607-116, hlm. 1–11, 2021, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://informatika.stei.itb.ac.id/~rinaldi.munir/Matdis/2006-2007/Makalah/Makalah0607-116.pdf

NIST, “Federal Information Processing Standards (FIPS) Publication 180-4,” Maryland, 2015. doi: 10.6028/NIST.FIPS.180-4.

F. N. Hasanah dan R. S. Untar, Rekayasa Perangkat Lunak. Sidoarjo: Umsida Press, 2020. doi: 10.21070/2020/978-623-6833-89-6.

W. E. Perry, Effective Methods for Software Testing. Indianapolis: Wiley Publishing, 2006. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://www.academia.edu/8858693/Effective_Methods_for_Software_Testing_Third_Edition_Effective_Methods_for_Software_Testing_Third_Edition

A. J. Menezes, P. C. van Oorschot, dan S. A. Vanstone, Handbook of Applied Cryptography. Cambridge: Massachusetts Institute of Technology, 1996. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://cacr.uwaterloo.ca/hac/

NIST, “The Testing of Entropy Sources for Cryptography,” Maryland, 2014. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://www.sarahscheffler.net/2014/scheffler_entropy.pdf

C. Cachin, “Entropy Measures and Unconditional Security in Cryptography,” Swiss Federal Institute Of Technology Zurich, Swiss, 1997. doi: 10.3929/ethz-a-001806220.

A. Anwar, Statistika Untuk Penelitian Pendidikan Dan Aplikasinya Dengan SPSS Dan Excel. Kediri: IAIT Press, 2009. Diakses: 24 Oktober 2023. [Daring]. Tersedia pada: http://repository.iainkediri.ac.id/25/1/Ali%20Anwar_Statistika%20untuk%20Penelitian%20Pendidikan.pdf

R. Yang, L. Wallace, dan I. Burchett, “Teaching Cryptology At All Levels Using CrypTool,” dalam Proceedings of the 15 Colloquium for Information Systems Security Education, Ohio: CISSE, 2011, hlm. 22–28. [Daring]. Tersedia pada: https://www.cryptool.org/assets/ctp/documents/teachingcryptool.pdf


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi AES ECB dan Hashing MD5/SHA-256 Pada Aplikasi Penyuratan Android

Dimensions Badge
Article History
Submitted: 2023-10-30
Published: 2023-11-30
Abstract View: 148 times
PDF Download: 83 times
Section
Articles