Implementasi Metode One Time Password pada Sistem Pemesanan Online
DOI:
https://doi.org/10.30865/mib.v4i4.2195Keywords:
Security, Online Reservation, Password, Username, Two Factor Authentication, One Time PasswordAbstract
The most commonly used security system in the authentication method is the password. The ease of implementation is a major factor in the use of password-based systems and the use of insecure networks is still a threat for some applications, for example on this online ordering website based application. Where the seller must register in advance to be able to place an order. Therefore, it is necessary to have a mechanism to prevent the negative impact of various security attacks, one of which is by implementing a two factor authentication system, it can be built using a combination of username and password and validated ownership with dynamic passwords one time password. One method for generating One Time Password (OTP) is Time-based One Time Password (TOTP), this method generates a dynamic password that changes following a specified time lag. Where the password is generated through the Secure Hash Algorithm 256 (SHA-256) encryption process with the help of a pseudo random number generator that produces a 6-digit hexadecimal value. The results of the system testing at the beginning to the end of the system testing are the application of scenarios that obtain test results in the form of outputs and assessments with a range of values around 95% - 100%. The average results achieved are successful and appropriate based on the design carried out.
References
R. Munadi, Z. Musliyana, and T. Y. Arif, “Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On,†Jurnal Nasional Teknik Elektro dan Teknologi Informasi, vol. 5, no. 3, pp. 201–206, August. 2016.
D. V. S. Y. Sakti, N. Agani, and M. Hardjianto, “Pengamanan Sistem Menggunakan One Time Password dengan Pembangkit Password Hash SHA-256 dan Pseudo Random Number Generator (PRNG) Linear Congruential Generator (LCG) di Perangkat Berbasis Android,†Jurnal BIT, vol. 13, no. 1, pp. 64–73, April. 2016.
R. Doly Andika C, “Implementasi One Time Password Mobile Token dengan Algorithm Secure Hash Algorithm 1 (SHA1) pada Login Website Pusdaskrimti Kejaksaan Agung Republik Indonesia,†Tugas Akhir, Fakultas Teknologi Informasi., Universitas Budi Luhur., Jakarta, 2017.
W. S. Raharjo et al., “Implementasi Two Factor Authentication dan Protokol Zero Knowledge Proof pada Sistem Login,†Jurnal Teknik Informatika dan Sistem Informasi, vol. 3, no. 1, pp. 127–136, April. 2017.
I. D. Id, Sukamto, and E. Mahdiyah, “Implementasi TOTP (Time-Based One-Time Password) untuk Meningkatkan Keamanan Transaksi E-Commerce,†in Konferensi Nasional Sistem dan Informasi, STT Ibnu Sina, Batam, August 11 -13, 2016, Pekanbaru, 2017, pp. 1-6.
A. Y. Husodo et al., “Sistem Keamanan Nilai Akademik Online Berbasis Kode Hash dengan Identitas Server Sebagai Parameter Validasi,†Jurnal Sains Teknologi dan Lingkungan vol. 1, no. 1, pp. 8–14, 2015.
R. Yusuf, E. Anggriawan, S. Tinggi, and S. Negara, “Penerapan Metode Smart Authentication dalam Layanan E-Banking Menggunakan Two Channel Authentication dan QR-Code pada Perangkat Mobile,†Seminar Nasional Sistem Informasi Indonesia, November 2-3, 2015, Bogor, Sekolah Tinggi Sandi Negara, 2015.
U. Ungkawa, I. A. Dewi, and K. R. Putra, “Implementasi Algoritma Time-Based One Time Password dalam Otentikasi Token Internet Banking,†in Library Itenas, Bandung, 2015, pp. 2–11.
A. Rosano, N. A. Farabi, and A. Kusumaningrum, “Perancangan Sistem Internet Banking (IBank) Menggunakan One-Time-Password (OTP) Untuk Pengamanan Transasksi (Studi Kasus Bank Mega, Tbk),†Jurnal AKRAB JUARA, vol. 3, no. 2, pp. 1-12, May. 2018.
P. D. Pamungkas, “Rancang Bangun Sistem Verifikasi Data Dokumen,†Jurnal INOVATE, vol. 03, no. 02, pp. 10–17, 2019.
A. Afifudin, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) dan Metode Two Factor Authentication (2FA) untuk Verifikas Dokumen,†Skripsi, Fakultas Teknik., Universitas Nusantara PGRI, Kediri., 2018.
H. Sembiring, F. Y. Manik, and Tengkuzaidah, “Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan pada Citra,†Medida Informasi Analisa dan Sistem, vol. 4, no. 1, pp. 33–36, Juni. 2019.
I. Saputra and S. D. Nasution, “Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital,†in Prosiding Seminar Nasional Riset Infomation Science, pp. 164–178, September. 2019.
A. Y. Mulyadi, E. P. Nugroho, and R. R. J. P, “Implementasi Algoritma AES 128 dan SHA–256 dalam Pengkodean pada Sebagian Frame Video CCTV MPEG-2,†Jurnal Teori dan Aplikasi Komputer, vol. 1, no. 1, pp. 33–39, Maret. 2018.
M. Naufal and Purwanto, “Implementasi Keamanan Login dengan Metode One Time Password (OTP) Menggunakan Fungsi Hash Algoritma SHA-512 pada SMP Negeri 3 Tangerang Selatan,†Jurnal Skanika, vol. 1, no. 1, pp. 335–339, Maret. 2018.
N. Istiqamah, “Sistem Keamanan E-Voting Menggunakan Fungsi Hash dan Algoritma One Time Pad,†Skripsi, Fakultas Teknik., Universitas Negeri Semarang., Jawa Tengah., 2016.
U. P. S. Perdana, “Pemanfaatan Telegram Boot API dalam Layanan Otentikasi Tanpa Password Menggunakan Algoritma Time-based One-Time Password (TOTP),†Skripsi, Fakultas Teknik., Universitas PGRI., Kediri., 2016.
K. I. Santoso, “Dua Faktor Pengamanan Login Web Menggunakan Otentikasi One Time Password dengan Hash SHA,†in Seminar Nasional Teknologi Informasi dan Komunikasi Terapan, pp. 204–210, November. 2013.
P. S. Rahmat, “Penelitian Kualitatif,†Equilibrium, vol. 5, no. 9, pp. 1-8, Juni 2009.
Y. Anugrah, M. H. H. Ichsan, and A. Kusyanti, “Implementasi Algoritme SHA-256 Menggunakan Protokol MQTT pada Budidaya Ikan Hias,†vol. 3, no. 4, pp. 4066-4074, April. 2019.
Pratiwi and D. Atmojo. WP, “Peningkatan Keamanan Data dengan Metode Cropping Selection Pseudorandom,†Jurnal TICOM, vol. 4, no. 3, pp. 132–138, Mei. 2016.
Hamid, “Analisis Keamanan Aplikasi E-mail Bawaan Android dan Gmail pada Jaringan Nirkabel,†Jurnal Teknoin, vol. 23, no. 2, pp. 125–136, Juni, 2017.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).