Implementasi Metode One Time Password pada Sistem Pemesanan Online

 Nani Sarah Hapsari (Universitas Islam Nusantara, Bandung, Indonesia)
 (*)Yenni Fatman Mail (Universitas Islam Nusantara, Bandung, Indonesia)
 Isbandi Isbandi (Universitas Islam Nusantara, Bandung, Indonesia)

(*) Corresponding Author

Submitted: May 14, 2020; Published: October 20, 2020

DOI: http://dx.doi.org/10.30865/mib.v4i4.2195

Abstract

The most commonly used security system in the authentication method is the password. The ease of implementation is a major factor in the use of password-based systems and the use of insecure networks is still a threat for some applications, for example on this online ordering website based application. Where the seller must register in advance to be able to place an order. Therefore, it is necessary to have a mechanism to prevent the negative impact of various security attacks, one of which is by implementing a two factor authentication system, it can be built using a combination of username and password and validated ownership with dynamic passwords one time password. One method for generating One Time Password (OTP) is Time-based One Time Password (TOTP), this method generates a dynamic password that changes following a specified time lag. Where the password is generated through the Secure Hash Algorithm 256 (SHA-256) encryption process with the help of a pseudo random number generator that produces a 6-digit hexadecimal value. The results of the system testing at the beginning to the end of the system testing are the application of scenarios that obtain test results in the form of outputs and assessments with a range of values around 95% - 100%. The average results achieved are successful and appropriate based on the design carried out.

Keywords


Security, Online Reservation, Password, Username, Two Factor Authentication, One Time Password

Full Text:

PDF


Article Metrics

Abstract View: 90 times | PDF View: 22 times

References

R. Munadi, Z. Musliyana, and T. Y. Arif, “Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On,” Jurnal Nasional Teknik Elektro dan Teknologi Informasi, vol. 5, no. 3, pp. 201–206, August. 2016.

D. V. S. Y. Sakti, N. Agani, and M. Hardjianto, “Pengamanan Sistem Menggunakan One Time Password dengan Pembangkit Password Hash SHA-256 dan Pseudo Random Number Generator (PRNG) Linear Congruential Generator (LCG) di Perangkat Berbasis Android,” Jurnal BIT, vol. 13, no. 1, pp. 64–73, April. 2016.

R. Doly Andika C, “Implementasi One Time Password Mobile Token dengan Algorithm Secure Hash Algorithm 1 (SHA1) pada Login Website Pusdaskrimti Kejaksaan Agung Republik Indonesia,” Tugas Akhir, Fakultas Teknologi Informasi., Universitas Budi Luhur., Jakarta, 2017.

W. S. Raharjo et al., “Implementasi Two Factor Authentication dan Protokol Zero Knowledge Proof pada Sistem Login,” Jurnal Teknik Informatika dan Sistem Informasi, vol. 3, no. 1, pp. 127–136, April. 2017.

I. D. Id, Sukamto, and E. Mahdiyah, “Implementasi TOTP (Time-Based One-Time Password) untuk Meningkatkan Keamanan Transaksi E-Commerce,” in Konferensi Nasional Sistem dan Informasi, STT Ibnu Sina, Batam, August 11 -13, 2016, Pekanbaru, 2017, pp. 1-6.

A. Y. Husodo et al., “Sistem Keamanan Nilai Akademik Online Berbasis Kode Hash dengan Identitas Server Sebagai Parameter Validasi,” Jurnal Sains Teknologi dan Lingkungan vol. 1, no. 1, pp. 8–14, 2015.

R. Yusuf, E. Anggriawan, S. Tinggi, and S. Negara, “Penerapan Metode Smart Authentication dalam Layanan E-Banking Menggunakan Two Channel Authentication dan QR-Code pada Perangkat Mobile,” Seminar Nasional Sistem Informasi Indonesia, November 2-3, 2015, Bogor, Sekolah Tinggi Sandi Negara, 2015.

U. Ungkawa, I. A. Dewi, and K. R. Putra, “Implementasi Algoritma Time-Based One Time Password dalam Otentikasi Token Internet Banking,” in Library Itenas, Bandung, 2015, pp. 2–11.

A. Rosano, N. A. Farabi, and A. Kusumaningrum, “Perancangan Sistem Internet Banking (IBank) Menggunakan One-Time-Password (OTP) Untuk Pengamanan Transasksi (Studi Kasus Bank Mega, Tbk),” Jurnal AKRAB JUARA, vol. 3, no. 2, pp. 1-12, May. 2018.

P. D. Pamungkas, “Rancang Bangun Sistem Verifikasi Data Dokumen,” Jurnal INOVATE, vol. 03, no. 02, pp. 10–17, 2019.

A. Afifudin, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) dan Metode Two Factor Authentication (2FA) untuk Verifikas Dokumen,” Skripsi, Fakultas Teknik., Universitas Nusantara PGRI, Kediri., 2018.

H. Sembiring, F. Y. Manik, and Tengkuzaidah, “Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan pada Citra,” Medida Informasi Analisa dan Sistem, vol. 4, no. 1, pp. 33–36, Juni. 2019.

I. Saputra and S. D. Nasution, “Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital,” in Prosiding Seminar Nasional Riset Infomation Science, pp. 164–178, September. 2019.

A. Y. Mulyadi, E. P. Nugroho, and R. R. J. P, “Implementasi Algoritma AES 128 dan SHA–256 dalam Pengkodean pada Sebagian Frame Video CCTV MPEG-2,” Jurnal Teori dan Aplikasi Komputer, vol. 1, no. 1, pp. 33–39, Maret. 2018.

M. Naufal and Purwanto, “Implementasi Keamanan Login dengan Metode One Time Password (OTP) Menggunakan Fungsi Hash Algoritma SHA-512 pada SMP Negeri 3 Tangerang Selatan,” Jurnal Skanika, vol. 1, no. 1, pp. 335–339, Maret. 2018.

N. Istiqamah, “Sistem Keamanan E-Voting Menggunakan Fungsi Hash dan Algoritma One Time Pad,” Skripsi, Fakultas Teknik., Universitas Negeri Semarang., Jawa Tengah., 2016.

U. P. S. Perdana, “Pemanfaatan Telegram Boot API dalam Layanan Otentikasi Tanpa Password Menggunakan Algoritma Time-based One-Time Password (TOTP),” Skripsi, Fakultas Teknik., Universitas PGRI., Kediri., 2016.

K. I. Santoso, “Dua Faktor Pengamanan Login Web Menggunakan Otentikasi One Time Password dengan Hash SHA,” in Seminar Nasional Teknologi Informasi dan Komunikasi Terapan, pp. 204–210, November. 2013.

P. S. Rahmat, “Penelitian Kualitatif,” Equilibrium, vol. 5, no. 9, pp. 1-8, Juni 2009.

Y. Anugrah, M. H. H. Ichsan, and A. Kusyanti, “Implementasi Algoritme SHA-256 Menggunakan Protokol MQTT pada Budidaya Ikan Hias,” vol. 3, no. 4, pp. 4066-4074, April. 2019.

Pratiwi and D. Atmojo. WP, “Peningkatan Keamanan Data dengan Metode Cropping Selection Pseudorandom,” Jurnal TICOM, vol. 4, no. 3, pp. 132–138, Mei. 2016.

Hamid, “Analisis Keamanan Aplikasi E-mail Bawaan Android dan Gmail pada Jaringan Nirkabel,” Jurnal Teknoin, vol. 23, no. 2, pp. 125–136, Juni, 2017.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Metode One Time Password pada Sistem Pemesanan Online

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 JURNAL MEDIA INFORMATIKA BUDIDARMA

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



JURNAL MEDIA INFORMATIKA BUDIDARMA
STMIK Budi Darma
Sekretariat : Jln. Sisingamangaraja No. 338 Telp 061-7875998
email : mib.stmikbd@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.