Penerapan Pengkodean Data Base-64 dan Kode QR Citra Foto Wajah untuk Autentikasi Tanda Tangan Dokumen Digital dengan Library Javascript

Main Article Content

Hana Afriliza
Febi Eka Febriansyah

Abstract

The application of technology has an impact on replacing conventional methods with modern ones, one of which is providing document authentication. Signatures can be used as a solution in authenticating documents because they are considered capable of being used as mathematical proof that the document is not modified illegally. The difference that lies between the signature on digital documents and conventional documents is in terms of security. Signatures on conventional documents are prone to forgery. This is due to the absence of evidence to ensure that the document has been signed by the party concerned. Thus, the use of signatures on digital documents is more secure than on conventional documents. The security that is carried out to ensure its authenticity is by utilizing a QR code which contains an id, photo of the signatory which is encoded first using base-64 coding, and a link which is used to verify the authenticity of the document. The verification process carried out to ensure its authenticity is by scanning the QR code embedded in the document. The library developed using Javascript and Waterfall is used as a development method, and the testing method used is black-box testing.

Article Details

How to Cite
Afriliza, H., & Febriansyah, F. E. (2023). Penerapan Pengkodean Data Base-64 dan Kode QR Citra Foto Wajah untuk Autentikasi Tanda Tangan Dokumen Digital dengan Library Javascript. Jurnal Pepadun, 4(1), 66–75. https://doi.org/10.23960/pepadun.v4i1.149

References

Y. Anshori, A. Y. Erwin Dodu & D. M. P. Wedananta, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” Techno.Com, vol. 18, no. 2, pp. 110–121, 2019, doi: 10.33633/tc.v18i2.2166.

A. G. P. Suratma & A. Azis, “Tanda Tangan Digital Menggunakan QR Code Dengan Metode Advanced Encryption Standard,” Techno, vol. 18, no. 1, pp. 59–68, 2017.

R. A. Azdy, “Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA,” J. Nas. Tek. Elektro dan Teknol. Inf., vol. 5, no. 3, pp. 184–191, 2016, doi: 10.22146/jnteti.v5i3.255.

F. Nuraeni, Y. H. Agustin, D. Kurniadi & I. D. Ariyanti, “Implementasi Skema QR-Code dan Digital Signature menggunakan Kombinasi Algoritma RSA dan AES untuk Pengamanan Data Sertifikat Elektronik,” Semin. Nas. Teknol. Informasi, Komun. dan Ind. 12, no. December, pp. 43–52, 2020.

A. Lorien & T. Wellem, “Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 4, pp. 663–671, 2021, doi: 10.29207/resti.v5i4.3316.

D. Wijonarko & B. W. R. Mulya, “Pengembangan Antarmuka Pemrograman Aplikasi Menggunakan Metode RESTful pada Sistem Informasi Akademik Politeknik Kota Malang,” Smatika J., vol. 8, no. 02, pp. 63–66, 2018, doi: 10.32664/smatika.v8i02.202.

F. Wahyu. C, A. P. Rahangiar & F. de Fretes, “Penerapan Algoritma Gabungan RC4 dan Base64 pada Sistem Keamanan E- Commerce (Application of Joint RC4 and BASE64 Algorithm for E-Commerce Security System),” no. June 2012, 2016.

E. Gunadhi & A. P. Nugraha, “Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection,” J. Algoritm., vol. 13, no. 2, pp. 391–398, 2017, doi: 10.33364/algoritma/v.13-2.391.

I. Sholikhah, M. Sairan & N. O. Syamsiah, “Aplikasi Pembelian Dan Penjualan Barang Dagang Pada CV Gemilang Muliatama Cikarang,” Tek. Komput. AMIK BSI, vol. III, no. 1, pp. 16–23, 2017.

H. Nur, “Penggunaan Metode Waterfall Dalam Rancang Bangun Sistem Informasi Penjualan,” Gener. J., vol. 3, no. 1, p. 1, 2019, doi: 10.29407/gj.v3i1.12642.

T. Hidayat & M. Muttaqin, “Pengujian Sistem Informasi Pendaftaran dan Pembayaran Wisuda Online menggunakan Black Box Testing dengan Metode Equivalence Partitioning dan Boundary Value Analysis,” J. Tek. Inform. UNIS JUTIS, vol. 6, no. 1, pp. 2252–5351, 2018, [Online]. Available: www.ccssenet.org/cis.

A. Krismadi, A. F. Lestari, A. Pitriyah, I. W. P. A. Mardangga, M. Astuti & A. Saifudin, “Pengujian Black Box berbasis Equivalence Partitions pada Aplikasi Seleksi Promosi Kenaikan Jabatan,” J. Teknol. Sist. Inf. dan Apl., vol. 2, no. 4, p. 155, 2019, doi: 10.32493/jtsi.v2i4.3771.