IMPLEMENTATION OF AES AND SHA-3 CRYPTOGRAPHY ALGORITHMS IN SECURING USER SENSITIVE DATA ON THE ARTESIAN WATER BILL PAYMENT TRANSACTION WEBSITE
DOI:
https://doi.org/10.69933/jocsit.v1i1.11Keywords:
AES, SHA-3, security system, encryption, cryptographicAbstract
Transacting online is something that is familiar to almost everyone in the digital era. The presence of digital transactions brings convenience in carrying out trading activities, but the use of the internet in creating easy transactions with several challenges in the form of hacking. In order to realize secure transactions, the level of protection on digital transaction service provider sites must be made as strong as possible to prevent digital attacks. Therefore, a protection system for user payment data on one of the transaction websites was created by applying the AES and SHA-3 cryptographic algorithm methods. The AES algorithm method was chosen because its implementation is not complicated but has proven its security, while SHA-3 is used to create unique keys from user passwords with the latest hash technology, so that the data encryption and decryption process becomes more protected because it uses the secret key of each user but not directly. The application of cryptographic algorithms will provide additional protection for the security of nominal user transaction data from cyber attacks so that the data. This research will produce a cryptography program flow with the Python programming language and examples of encryption and hash process results during program execution.
Abstract
Transacting online is something that is familiar to almost everyone in the digital era. The presence of digital transactions brings convenience in carrying out trading activities, but the use of the internet in creating easy transactions with several challenges in the form of hacking. In order to realize secure transactions, the level of protection on digital transaction service provider sites must be made as strong as possible to prevent digital attacks. Therefore, a protection system for user payment data on one of the transaction websites was created by applying the AES and SHA-3 cryptographic algorithm methods. The AES algorithm method was chosen because its implementation is not complicated but has proven its security, while SHA-3 is used to create unique keys from user passwords with the latest hash technology, so that the data encryption and decryption process becomes more protected because it uses the secret key of each user but not directly. The application of cryptographic algorithms will provide additional protection for the security of nominal user transaction data from cyber attacks so that the data. This research will produce a cryptography program flow with the Python programming language and examples of encryption and hash process results during program execution.
Downloads
References
D. Rifai, S. Fitri, I. N. Ramadhan, dan R. Ramadan, “Perkembangan Ekonomi Digital Mengenai Perilaku Pengguna Media Sosial Dalam Melakukan Transaksi”, ABDI, vol. 3, no. 1, pp. 49–52, Jun. 2022, doi: 10.34306/abdi.v3i1.752. DOI: https://doi.org/10.34306/abdi.v3i1.752
E. Purike, I. W. Kurniasih, F. W. Wulandari, and A. Nirwani, “TRANSAKSI DIGITAL DAN PERKEMBANGAN e-TOURISM DI INDONESIA,” NAWASENA, vol. 1, no. 2, pp. 12–19, Aug. 2022, doi: 10.56910/nawasena.v1i2.157. DOI: https://doi.org/10.56910/nawasena.v1i2.157
S. Parulian, D. A. Pratiwi, and M. C. Yustina, “Ancaman dan Solusi Serangan Siber di Indonesia,” Telecommunications, Networks, Electronics, and Computer Technologies (TELNECT), vol. 1, no. 2, pp. 85–92, Dec. 2021, doi: 10.17509/telnect.v1i2.40866.
A. Pambudi, A. Kusyanti, and M. Data, “Perancangan Sistem Pengamanan Data Transaksi Pada Database Terdistribusi Menggunakan Metode Hashing,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 1, pp. 247–252, 2019, [Online]. Available: https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/4085.
N. W. Hidayatulloh, M. Tahir, H. Amalia, N. A. Basyar, A. F. Prianggara, and M. Yasin, “Mengenal Advance Encrytion Standard (AES) Sebagai Algoritma Kriptografi Dalam Mengamankan Data,” Digital Transformation Technology (Digitech), vol. 3, no. 1, pp. 1–10, Mar. 2023, doi: 10.47709/digitech.v3i1.2293.
M. B. Aryanto, M. Tahir, S. I. Devita, Z. N. Mustofa, Q. Ainiyah, and S. Sundoro, “Implementasi Enkrip Dan Dekrip File Menggunakan Metode Advance Encryption Standard (AES-128),” JUISIK: JURNAL ILMIAH SISTEM INFORMASI DAN ILMU KOMPUTER, vol. 3, no. 1, pp. 89–104, Mar. 2023, doi: 10.55606/juisik.v3i1.434. DOI: https://doi.org/10.55606/juisik.v3i1.434
L. Mustika, “Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web,” JURIKOM (Jurnal Riset Komputer), vol. 1, no. 7, pp. 148-155, 2020, doi: 10.30865/jurikom.v7i1.1943. DOI: https://doi.org/10.30865/jurikom.v7i1.1943
M. P. Sari, “Analisis Algoritma SHA-3 Keamanan pada Data Pribadi,” TECHNOSCIENZA, vol. 5, no. 2, pp. 231–242, Apr. 2021, doi: 10.51158/tecnoscienza.v5i2.429. DOI: https://doi.org/10.51158/tecnoscienza.v5i2.429
S. Praptodiyono, M. A. Sidiq, and F. Muhammad, “Implementasi Algoritma SHA-3 Dan AES Sebagai Sistem Keamanan Pada Proses Pensinyalan Mobile IPv6,” Setrum : Sistem Kendali-Tenaga-elektronika-telekomunikasi-komputer, vol. 10, no. 2, pp. 59–68, Nov. 2021, doi: 10.36055/setrum.v10i2.13075. DOI: https://doi.org/10.36055/setrum.v10i2.13075
N. Cristy and F. Riandari, “Implementasi Metode Advanced Encryption Standard (AES 128 Bit) Untuk Mengamankan Data Keuangan,” JIKOMSI [Jurnal Ilmu Komputer dan Sistem Informasi], vol. 4, no. 2, pp. 75–85, Sep. 2021, doi: 10.9767/jikomsi.v4i2.181.
M. Azhari, F. J. Perwitosari, D. I. Mulyana, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 1, pp. 163–171, Feb. 2022, doi: 10.47709/jpsk.v2i1.1390. DOI: https://doi.org/10.47709/jpsk.v2i01.1390
J. S. Sianipar, N. B. Nuugroho, and I. Mariami, “Pengamanan Data Gaji Karyawan Dengan Menggunakan Metode Advanced Encryption Standard (AES),” JURNAL SISTEM INFORMASI TGD, vol. 3, no. 1, pp. 35–45, Jan. 2024, doi: 10.53513/jursi.v3i1.5653.
A. Dharmawan and H. Munandar, “PENERAPAN ALGORITME KRIPTOGRAFI SHA-256 DAN AES-256 UNTUK PENGAMANAN FILE PADA PT PELANGI SENTRAL KREASI,” Seminar Nasional Mahasiswa Fakultas Teknologi Informasi (SENAFTI), vol. 2, no. 2, pp. 186–195, Sep. 2023, [Online]. Available: https://senafti.budiluhur.ac.id/index.php/senafti/article/view/857.
Y. Putra, Y. Yuhandri, and Sumijan, “Meningkatkan Keamanan Web Menggunakan Algoritma Advanced Encryption Standard (AES) terhadap Seragan Cross Site Scripting,” Jurnal Sistim Informasi dan Teknologi, vol. 3, no. 2, pp. 56–63, Jun. 2021, doi: 10.37034/jsisfotek.v3i2.44. DOI: https://doi.org/10.37034/jsisfotek.v3i2.44
E. Ramadhan, A. Rizkiana, P. Wiyardhana, and D. Ogi, “Secure Self Payment and Monitoring Service Laundry using RFID with SHA-3 and AES 128,” 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), pp. 41-46, Aug. 2023, doi: 10.1109/ICoCICs58778.2023.10277534. DOI: https://doi.org/10.1109/ICoCICs58778.2023.10277534
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Muhamad Luthfi Assidiq, Fathoni Mahardika, Deris Santika (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.