Rancang Bangun Aplikasi Verifikasi Keaslian e-Sertifikat dengan Algoritma SHA-512

J Javier(1*), Yuwono Marta Dinata(2),

(1) Universitas Ciputra Surabaya, Surabaya, Indonesia
(2) Universitas Ciputra Surabaya, Surabaya, Indonesia
(*) Corresponding Author

Abstract


In today's digital age, electronic certificates, also known as e-certificates, are frequently used. The authenticity of these certificates, however, can be a challenge to resolve because they are easily falsified. Rarely do certificates for events like contests, seminars, courses, and awards have serial numbers, barcodes, or QR scanners as authenticity markers. Contrary to certificates for land titles, vehicles, law, education, or academia, which are challenging to counterfeit because they have an indicator and typically have a physical form rather than a digital one. Recruiting committees, institutional memberships, and HR departments could all suffer as a result. Therefore, a solution is required to maintain the validity of these certificates using the Cryptographic Hash Function technique and the SHA-512 algorithm, which is the most recent member of the SHA-2 generation. The findings from this research indicate that the website application developed performs effectively on the user's device and facilitates the verification process of e-certificates that lack authenticity indicators. Therefore, the authors can conclude that this website application provides assistance to both individual and organizational users in verifying digital certificates.

Full Text:

PDF

References


S. Chao, Z. Chen, and X. Sun, "Anti-Counterfeit Authentication System of Printed Information Based on A Logic Signing Technique," Atlantis Press | Atlantis Press Open Access Publisher Scientific Technical Medical Proceedings Journals Books, Oct. 2007. [Online]. Available: https://www.atlantis-press.com/article/1429.pdf.

O. Ghazali and O. S. Saleh, "A Graduation Certificate Verification Model via Utilization of the Blockchain Technology," Journal of Telecommunication, Electronic and Computer Engineering (JTEC), Sep. 26, 2018. [Online]. Available: https://jtec.utem.edu.my/jtec/article/view/4707/3640.

C. R. Dougherty, "CERT/CC vulnerability note VU#836068," CERT Vulnerability Notes Database, Dec. 31, 2008. [Online]. Available: https://www.kb.cert.org/vuls/id/836068.

B. Schneier, "Cryptanalysis of SHA-1," Schneier on Security, Feb. 18, 2005. [Online]. Available: https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html.

NIST, "NIST.gov - Computer security division - Computer security resource center," Wayback Machine, Apr. 12, 2011. [Online]. Available: https://web.archive.org/web/20110625054822/csrc.NIST.gov/groups/ST/toolkit/secure_Hashing.html.

M. Stevens, E. Bursztein, P. Karpman, A. Albertini, and Y. Markov, "The first collision for full SHA-1," [Online]. Available: https://shattered.io/static/shattered.pdf.

A. Argani and W. Taraka, "Pemanfaatan Teknologi Blockchain Untuk Mengoptimalkan Keamanan Sertifikat Pada Perguruan Tinggi," Google Books, Jun. 2020. [Online]. Available: https://books.google.co.id/books?hl=en&lr=&id=cDILEAAAQBAJ&oi=fnd&pg=PA10&dq=sertifikat+palsu&ots=a0GNYjgrzy&sig=IdZpKZYgJEzII0Xr9B6nOdjSoYY&redir_esc=y#v=onepage&q=sertifikat%20palsu&f=false.

U. Rahardja, E. P. Harahap, and G. Fresandy, "Penerapan Sistem Autentikasi Sertifikat Sebagai Pengambil Keputusan Validasi Sertifikat Pada Perguruan Tinggi," iLearning Journal Center (iJC), Aug. 2017. [Online]. Available: https://ijc.ilearning.co/index.php/TMJ/article/view/312/25.

A. H. Lone and R. Naaz, "Forgery Protection Of Academic Certificates Through Integrity Preservation At Scale Using Ethereum Smart Contract," Scalable Computing: Practice and Experience, Dec. 2020. [Online]. Available: https://scpe.org/index.php/scpe/article/view/1806/672




DOI: http://dx.doi.org/10.30645/j-sakti.v7i2.664

Refbacks

  • There are currently no refbacks.



J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:


Jumlah Kunjungan :

View My Stats