Implementasi AES ECB dan Hashing MD5/SHA-256 Pada Aplikasi Penyuratan Android
Abstract
The Riau Ministry of Religion Regional Office is still archiving assignment letters and official travel letters manually. The staff who take care of the correspondence section, namely personnel and legal unit staff, do not have an application that facilitates the activities of assignment letters and official travel letters to simplify filing and data containing certain information contained in letters which include assignment letters and official travel letters. Security is important because it relates to data. Therefore, a correspondence application was created to support the correspondence activities of the Riau Ministry of Religion Regional Office and make it easier for staff in the Civil Service and Legal unit to properly manage assignment letters and official travel letters as well as control books. Android application development uses the waterfall method and the ECB (Electronic Code Book) mode AES algorithm and MD5/SHA-256 hashing for security. By building this application, it will be easier for leaders and employees to exchange letters and confidential information, guaranteed security and the application built can be used by users easily. The results of the Black Box testing carried out on the application produced the expected output and the UAT test obtained a score of 89%. Application testing on sentences, Jpg, Png and PDF files has a fairly high level of security using statistical analysis methods, namely bit frequency testing, autocorrelation, 0/1 bit distribution, entropy.
Downloads
References
H. Pasaribu, D. Sitanggang, R. R. Damanik, dan A. C. R. Sitompul, “Combination Of Advanced Encryption Standard 256 Bits With MD5 to Secure Documents On Android Smartphone,” IOP Conf. Series: Journal of Physics, vol. 1007, no. 1, hlm. 1–8, 2018, doi: 10.1088/1742-6596/1007/1/012014.
G. G. P.U.K, Ernawati, dan A. Erlanshari, “Implementasi Metode Advanced Encryption Standard (AES) Dan Message Digest 5 (MD5) Pada Enkripsi Dokumen (Studi Kasus LPSE UNIB),” Jurnal Rekursif, vol. 4, no. 3, hlm. 277–287, 2016, doi: 10.33369/rekursif.v4i3.864.
A. Fathurrozi dan Selviyani, “Penerapan Algoritma Advanced Encryption Standard (AES256) Dengan Mode CBC DanSecure Hash Algorithm (SHA-256) Untuk Pengamanan Data File,” Journal of Information and Information Security (JIFORTY), vol. 2, no. 2, hlm. 227–238, 2021, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://ejurnal.ubharajaya.ac.id/index.php/jiforty/article/view/879
S. Sulastri dan R. D. M. Putri, “Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan,” Jurnal Teknik Elektro, vol. 10, no. 2, hlm. 70–74, 2018, doi: 10.15294/jte.v10i2.18628.
I. N. Abdullah, D. Kusumaningsih, dan M. Alawy, “Aplikasi Enkripsi File Dokumen Menggunakan Metode Algoritma AES (Advanced Encryption Standard) Dan OTP (One Time Pad) Berbasis Web Pada PT. MNC Sky Vision,” Telematika MKOM, vol. 10, no. 1, hlm. 11–16, 2018, doi: 10.36080/telematikamkom.654.
F. Nuraeni, Y. H. Agustin, dan A. E. Purnama, “Implementasi Caesar Cipher And Advanced Encryption Standard (AES) Pada Pengamanan Data Pajak Bumi Bangunan,” Jurnal Ilmiah Matrik, vol. 22, no. 2, hlm. 188–194, 2020, doi: 10.33557/jurnalmatrik.v22i2.949.
A. G. Pramudito dan D. Kusumaningsih, “Implementasi Algoritma AES 128 Dan RC4 Untuk Pengamanan Email Pada PT. Dinamika Hydro Engineering,” SKANIKA, vol. 1, no. 3, hlm. 869–876, 2018, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://jom.fti.budiluhur.ac.id/index.php/SKANIKA/article/view/2499
A. Hermawan dan E. I. H. Ujianto, “Implementasi Enkripsi Data Menggunakan Kombinasi AES Dan RSA,” Jurnal Nasional Informatika Dan Teknologi Jaringan, vol. 5, no. 2, hlm. 325–330, 2021, doi: 10.30743/infotekjar.v5i2.3585.
F. Kurnia, M. Fikry, dan F. Febriyadi, “Rancang Bangun Sistem Informasi Penyuratan Unit Kepegawaian Kantor Wilayah Kementerian Agama Provinsi Riau,” Jurnal Ilmiah Rekayasa Dan Manajemen Sistem Informasi, vol. 8, no. 2, hlm. 180–188, 2022, doi: 10.24014/rmsi.v8i2.18208.
R. Ravida dan H. A. Santoso, “Advanced Encryption Standard (AES) 128 Bit untuk Keamanan Data Internet of Things (IoT) Tanaman Hidroponik,” Jurnal Rekayasa Sistem dan Teknologi Informasi (RESTI), vol. 4, no. 6, hlm. 1157–1164, 2019, doi: 10.29207/resti.v4i6.2478.
D. Hulu, B. Nadeak, dan S. Aripin, “Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan,” Konferensi Nasional Teknologi Informasi Dan Komputer, vol. 4, no. 1, hlm. 78–86, 2020, doi: 10.30865/komik.v4i1.2645.
A. P. Putra, Herfina, S. Maryana, dan A. Setiawan, “Implementasi Algoritma AES (Advanced Encryption Standard) Rijndael Pada Aplikasi Keamanan Data,” Jurnal Ilmiah Penelitian Teknologi Informasi Dan Komputer, vol. 1, no. 2, hlm. 46–51, 2020, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://journal.upgris.ac.id/index.php/jipetik/article/view/KAI
J. Handoyo dan Y. M. Subakti, “Keamanan Dokumen Menggunakan Algoritma Advanced Encryption Standard (AES),” Jurnal Sistem Informasi Dan Teknologi, vol. 3, no. 2, hlm. 143–152, 2020, doi: 10.24176/sitech.v3i2.5865.
C. Kirana dan E. Sugianto, “Penerapan Algoritma AES dan Konversi SMS Ke Dalam Bahasa Khek pada Aplikasi Enkripsi Berbasis Mobile Application,” Jurnal Ilmu Komputer Dan Informatika, vol. 5, no. 1, hlm. 68–77, 2019, doi: 10.23917/khif.v5i1.7453.
A. A. Permana dan D. Nurnaningsih, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (AES),” Jurnal Teknik Informatika, vol. 11, no. 2, hlm. 177–186, 2018, doi: 10.15408/jti.v11i2.7811.
I. Fitriani dan A. B. Utomo, “Implementasi Algoritma Advanced Encryption Standard (AES) Pada Layanan SMS Desa,” JISKa, vol. 5, no. 3, hlm. 153–163, 2020, doi: 10.14421/jiska.2020.53-03.
A. E. Putri, A. Kartikadewi, dan L. A. A. Rosyid, “Implementasi Kriptografi Dengan Algoritma Advanced Encryption Standard (AES) 128 Bit Dan Steganografi Menggunakan Metode End Of File (EOF) Berbasis Java Desktop Pada Dinas Pendidikan Kabupaten Tangerang,” Applied Information Systems and Management (AISM), vol. 3, no. 2, hlm. 69–78, 2020, doi: 10.15408/aism.v3i2.14722.
Ahyuna dan S. Hozeng, “Perancangan Aplikasi Enkripsi Menggunakan Algoritma AES Berbasis Android,” dalam Prosiding Seminar Nasional Komunikasi Dan Informatika #3, 2019, hlm. 130–135. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://jurnal.kominfo.go.id/index.php/snki/article/view/2569
E. Ali, Rekayasa Perangkat Lunak. Yogyakarta: MFA, 2019.
A. R. Mulyanto, Rekayasa Perangkat Lunak Jilid 1. Jakarta: Direktorat Pembinaan Sekolah Menengah Kejuruan, 2008. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: http://opac.salatigakota.go.id/ucs/index.php?p=show_detail&id=33903
Widiyawati dkk., Rekayasa Perangkat Lunak. Bandung: Widina Bhakti Persada Bandung, 2022. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://repository.penerbitwidina.com/publications/410361/rekayasa-perangkat-lunak
M. Armstrong, “Institutional Repository Management Models That Support Faculty Research Dissemination,” Albertsons Library, vol. 30, no. 1, hlm. 1–3, 2013, doi: 10.1108/OCLC-07-2013-0028.
M. C. Sinaga, Kriptografi Python. Medan: Academia, 2017. doi: 10.31227/osf.io/6su2h.
B. Rahardjo, Keamanan Informasi. Bandung: Insan Infonesia, 2017. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://budi.rahardjo.id/files/keamanan.pdf
S. Kromodimoeljo, Teori dan Aplikasi Kriptografi. Jakarta: SPK IT Consulting, 2009. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://lmsspada.kemdikbud.go.id/pluginfile.php/548262/mod_resource/content/1/crypto-book-complete.pdf
J. Daemen dan V. Rijmen, The Design of Rijndael The Advanced Encryption Standard (AES) Second Edition. Berlin: Springer, 2002. doi: 10.1007/978-3-662-60769-5.
NIST, “NIST Special Publication 800-38A,” Maryland, 2001. doi: 10.6028/NIST.SP.800-38A.
E. Z. A. Kashogi, “Algoritma Message Digest 5 (MD5),” Institut Teknologi Bandung Makalah0607-116, hlm. 1–11, 2021, Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://informatika.stei.itb.ac.id/~rinaldi.munir/Matdis/2006-2007/Makalah/Makalah0607-116.pdf
NIST, “Federal Information Processing Standards (FIPS) Publication 180-4,” Maryland, 2015. doi: 10.6028/NIST.FIPS.180-4.
F. N. Hasanah dan R. S. Untar, Rekayasa Perangkat Lunak. Sidoarjo: Umsida Press, 2020. doi: 10.21070/2020/978-623-6833-89-6.
W. E. Perry, Effective Methods for Software Testing. Indianapolis: Wiley Publishing, 2006. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://www.academia.edu/8858693/Effective_Methods_for_Software_Testing_Third_Edition_Effective_Methods_for_Software_Testing_Third_Edition
A. J. Menezes, P. C. van Oorschot, dan S. A. Vanstone, Handbook of Applied Cryptography. Cambridge: Massachusetts Institute of Technology, 1996. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://cacr.uwaterloo.ca/hac/
NIST, “The Testing of Entropy Sources for Cryptography,” Maryland, 2014. Diakses: 16 Oktober 2023. [Daring]. Tersedia pada: https://www.sarahscheffler.net/2014/scheffler_entropy.pdf
C. Cachin, “Entropy Measures and Unconditional Security in Cryptography,” Swiss Federal Institute Of Technology Zurich, Swiss, 1997. doi: 10.3929/ethz-a-001806220.
A. Anwar, Statistika Untuk Penelitian Pendidikan Dan Aplikasinya Dengan SPSS Dan Excel. Kediri: IAIT Press, 2009. Diakses: 24 Oktober 2023. [Daring]. Tersedia pada: http://repository.iainkediri.ac.id/25/1/Ali%20Anwar_Statistika%20untuk%20Penelitian%20Pendidikan.pdf
R. Yang, L. Wallace, dan I. Burchett, “Teaching Cryptology At All Levels Using CrypTool,” dalam Proceedings of the 15 Colloquium for Information Systems Security Education, Ohio: CISSE, 2011, hlm. 22–28. [Daring]. Tersedia pada: https://www.cryptool.org/assets/ctp/documents/teachingcryptool.pdf
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi AES ECB dan Hashing MD5/SHA-256 Pada Aplikasi Penyuratan Android
Pages: 113-126
Copyright (c) 2023 Fajar Febriyadi, Fitra Kurnia, Nazaruddin Safaat Harahap, Febi Yanto, Pizaini Pizaini
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).