Enkripsi Base 64, Hashing SHA1 dan MD5 pada QR Code Presensi Kuliah

Authors

DOI:

https://doi.org/10.36085/jsai.v4i2.1680

Abstract

The lecture attendance application at the University of Muhammadiyah Bengkulu needs to be developed so that it is easier in the implementation process. One way to simplify the process is to use the presence of a Quick Response Code which can be done in online or offline lectures. The method used is in the form of encrypted and hashed Uniform Resource Locator storage combined with internet protocol address filtering so that the information stored in the Quick Response Code becomes more secure than in plain text. The data collection method uses observation and interview techniques to previous application users and then analysis, design and experimental programming are carried out on program modules that play a role in the presence process. From the results of this study, the Quick Response Code can be protected and used successfully and can be integrated with several learning management systems, social media applications that are often used by lecturers, especially at the University of Muhammadiyah Bengkulu. The results of this study have been used in the lecture process in the Even Semester of the 2020 Academic Year.

Author Biographies

Harry Witriyono, Universitas Muhammadiyah Bengkulu

Fakultas Teknik, Program Studi Teknik Informatika

Sandhy Fernandez, Universitas Muhammadiyah Bengkulu

Fakultas Teknik, Program Studi Teknik Informatika

References

U. Rahardja, O. Sholeh, and F. Nursetianingsih, “Penggunaan dashboard untuk mengontrol kinerja profesionalisme pegawai pada Pt . Sinarmas Land Property,†J. Teknol. Inf. dan Multimed., vol. 1, no. 2, pp. 415–418, 2015.

M. Awaluddin, J. angelina Widians, and Masnawati, “Fkti Universitas Mulawarman Berbasis Web,†Apl. Daft. Hadir Perkuliahan Mhs. FKTI Univ. Mulawarman Berbas. Web, vol. 2, no. 1, 2017.

A. S. Rintjap, R. U. A. Sherwin, S. St, O. L. St, and J. T. Elektro-ft, “Aplikasi Absensi Siswa Menggunakan Sidik Jari Di Sekolah Menengah Atas Negeri 9 Manado,†J. Tek. Elektro dan Komput., vol. 3, no. 3, pp. 1–5, 2014.

Q. Aini, Y. I. Graha, and S. R. Zuliana, “Penerapan Absensi QRCode Mahasiswa Bimbingan Belajar pada Website berbasis YII Framework Application Student Attendance QRCode in Guidance Learn to Website Based on Yii Framework,†J. Ilm. SISFOTENIKA, vol. 7, no. 2, pp. 207–218, 2017, [Online]. Available: https://www.neliti.com/id/publications/226282/penerapan-absensi-qrcode-mahasiswa-bimbingan-belajar-pada-website-berbasis-yii-f.

K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,†Creat. Inf. Technol. J., vol. 1, no. 1, pp. 57–66, 2013, Accessed: Jun. 05, 2021. [Online]. Available: https://ojs.amikom.ac.id/index.php/citec/article/view/298.

E. Gunadhi and A. P. Nugraha, “Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection,†J. Algoritm., vol. 13, no. 2, pp. 391–398, 2017, doi: 10.33364/algoritma/v.13-2.391.

S. Sulastri, “Implementasi Enkripsi Data Message Digest Algorithm 5 (MD5) Dan Secure Hash Algorithm (SHA-256) Pada Sistem Penjadwalan Karyawan Agrowisata Setya Aji Flower Farm Bandungan,†vol. 5, 2019.

Anonim, “Networking IP filtering and network address translation,†IBM Corp., 2013. https://www.ibm.com/docs/en/i/7.3?topic=security-ip-filtering-network-address-translation (accessed Jun. 19, 2021).

L. A. Muharom, “Penerapan Model Presensi Ujian Semester Berbasis Quick Response Code (QR Code) di Universitas Muhammadiyah Jember | Muharom | JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia),†J. Sitem Teknol. Inf. Indones., vol. 1, no. 2, pp. 113–122, 2016, Accessed: Jun. 03, 2021. [Online]. Available: http://jurnal.unmuhjember.ac.id/index.php/JUSTINDO/article/view/572/452.

E. Z. Henry Februariyanti, “Rancang Bangun Sistem Perpustakaan untuk Jurnal Elektronik,†J. Teknol. Inf. Din., vol. 17, no. 2, pp. 124–132, 2012.

M. I. Sugiarto, A. Linarta, and A. Sofiyan, “Aplikasi Layanan Informasi Absen Dan Nilai Berbasis Sms Gayeway Menggunakan Php Pada Smk Taruna Persada Dumai,†I N F O R M a T I K a, vol. 9, no. 2, p. 60, 2019, doi: 10.36723/juri.v9i2.106.

R. Ashford, “QR codes and academic libraries,†Coll. Res. Libr. News, vol. 71, no. 10, pp. 526–530, 2010, doi: 10.5860/crln.71.10.8454.

R. T. Fielding, D. Software, and R. N. Taylor, “Principled Design of the Modern Web Architecture,†2000.

Sutriman and B. Sugiantoro, “Analysis of password and salt combination scheme to improve hash algorithm security,†Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 11, pp. 420–425, 2019, doi: 10.14569/IJACSA.2019.0101158.

C. Prihantoro and H. Witriyono, “Perancangan Client Server Three Tier Pada Pembangunan Web Service Anggota Perpustakaan Universitas Muhammadiyah Bengkulu,†J. Technopreneursh. Inf. Syst., 2019, doi: 10.36085/jtis.v2i2.355.

Downloads

Published

2021-07-01

Issue

Section

Articles
Abstract viewed = 238 times