ESVISIGN: Tanda Tangan Digital Sekolah Vokasi IPB
Abstract
All activities have been online since the Covid-19 pandemic broke out in Indonesia. IPB also supports government policy by partially locking down the campus area. Administrative activities are also in online mode. Online correspondence activities still require a signature as a form of validity and authentication of the letter. The scanned signature is different from the digital signature. Thus an application was made to create digital signatures. This application is named eSVi sign. This web-based application was made by using Prototype method. Prototype method consists of communication, planning and modeling quickly, making prototypes, submitting the system to users and feedback. This app uses a hash function with SHA256. Each signed document is assigned a hash value which is stored in storage. When the document is verified, the system will look for a hash value that matches the document in the database. The method to test this application was black box testing. This application can be accessed on the https://ipb.link/esvisign. This digital signature is only used within the College of Vocational Studies IPB University.
Downloads
References
J. Arifin and M. Z. Naf’an, “Verifikasi Tanda Tangan Asli Atau Palsu Berdasarkan Sifat Keacakan (Entropi),” J. Infotel, vol. 9, no. 1, p. 130, 2017, doi: 10.20895/infotel.v9i1.136.
S. Mertokusumo, Hukum Acara Perdata Indonesia. Yogyakarta: Liberty, 2006.
G. Shelly and M. Vermaat, Discovering Computers: Living in a Digital World. Boston: Course Technology, Cengage Learning, 2011.
F. Song and Z. Cui, “Electronic voting scheme about elgamal blind-signatures based on XML,” Procedia Eng., vol. 29, pp. 2721–2725, 2012, doi: 10.1016/j.proeng.2012.01.379.
Y. Ding, B. Li, and Z. Zheng, “An electronic auction scheme based on group signatures and partially blind signatures,” Procedia Eng., vol. 15, pp. 3051–3057, 2011, doi: 10.1016/j.proeng.2011.08.572.
I. C. Chang, H. G. Hwang, M. C. Hung, M. H. Lin, and D. C. Yen, “Factors affecting the adoption of electronic signature: Executives’ perspective of hospital information department,” Decis. Support Syst., vol. 44, no. 1, pp. 350–359, 2007, doi: 10.1016/j.dss.2007.04.006.
P. Pharow and B. Blobel, “Electronic signatures for long-lasting storage purposes in electronic archives,” Int. J. Med. Inform., vol. 74, no. 2–4, pp. 279–287, 2005, doi: 10.1016/j.ijmedinf.2004.04.018.
W. Sholihah, S. Guritman, and H. Sukoco, “Electronic Power of Attorney Protocol by using Digital Signature Algorithm,” J. Theor. Appl. Inf. Technol., vol. 59, no. 3, pp. 690–695, 2013.
M. Wang, “Do the regulations on electronic signatures facilitate international electronic commerce? A critical review,” Comput. Law Secur. Rep., vol. 23, no. 1, pp. 32–41, 2007, doi: 10.1016/j.clsr.2006.09.006.
H. Saripan and Z. Hamin, “The application of the digital signature law in securing internet banking: Some preliminary evidence from Malaysia,” Procedia Comput. Sci., vol. 3, pp. 248–253, 2011, doi: 10.1016/j.procs.2010.12.042.
H. Leitold, R. Posch, and T. Rössler, “Reconstruction of electronic signatures from eDocument printouts,” Comput. Secur., vol. 29, no. 5, pp. 523–532, 2010, doi: 10.1016/j.cose.2009.11.002.
S. Mason, “Documents signed or executed with electronic signatures in English law,” Comput. Law Secur. Rev., vol. 34, no. 4, pp. 933–945, 2018, doi: 10.1016/j.clsr.2018.05.023.
A. Srivastava, “Electronic signatures and security issues: An empirical study,” Comput. Law Secur. Rev., vol. 25, no. 5, pp. 432–446, 2009, doi: 10.1016/j.clsr.2009.05.007.
C. Liu, “Security analysis of Liu-Zhang-Deng digital signature scheme,” Procedia Comput. Sci., vol. 32, pp. 485–488, 2014, doi: 10.1016/j.procs.2014.05.451.
S. K. H. Islam and G. P. Biswas, “Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography,” Int. J. Comput. Math., vol. 90, no. 11, pp. 2244–2258, 2013, doi: 10.1080/00207160.2013.776674.
N. Tiwari, “On the security of pairing-free certificateless digital signature schemes using ECC,” ICT Express, vol. 1, no. 2, pp. 94–95, 2015, doi: 10.1016/j.icte.2015.12.001.
A. S. Kittur and A. R. Pais, “Batch verification of Digital Signatures: Approaches and challenges,” J. Inf. Secur. Appl., vol. 37, pp. 15–27, 2017, doi: 10.1016/j.jisa.2017.09.005.
V. Andrianova, “Electronic signature key storage,” in Procedia Computer Science, 2018, vol. 145, pp. 59–63, doi: 10.1016/j.procs.2018.11.010.
G. Krylov, A. Gaybatova, V. Davydenko, and A. Grigoryan, “Integration of distributed ledger technology into software electronic signature exchange service,” in Procedia Computer Science, 2020, vol. 169, no. 2019, pp. 479–488, doi: 10.1016/j.procs.2020.02.221.
J. H. Seo, “Efficient digital signatures from RSA without random oracles,” Inf. Sci. (Ny)., vol. 512, no. xxxx, pp. 471–480, 2020, doi: 10.1016/j.ins.2019.09.084.
F. Shahid and A. Khan, “Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers,” Futur. Gener. Comput. Syst., vol. 111, pp. 241–253, 2020, doi: 10.1016/j.future.2020.04.042.
A. Alyushin, “Document protection technology in the digital economics using cognitive biometric methods,” in Procedia Computer Science, 2020, vol. 169, no. 2019, pp. 887–891, doi: 10.1016/j.procs.2020.02.147.
M. González-Lee, M. Nakano-Miyatake, H. Pérez-Meana, and G. Sánchez-Pérez, “Script format document authentication scheme based on watermarking techniques,” J. Appl. Res. Technol., vol. 13, no. 3, pp. 435–442, 2015, doi: 10.1016/j.jart.2015.07.010.
J. C. C. Ibarz, “Bringing JSON signatures to ETSI AdES framework: Meet JAdES signatures,” Comput. Stand. Interfaces, vol. 71, no. February, p. 103434, 2020, doi: 10.1016/j.csi.2020.103434.
V. L. Xuan and D. L. Hong, “A new digital signature scheme based on the hardness of some expanded root problems,” in Procedia Computer Science, 2020, vol. 171, no. 2019, pp. 541–550, doi: 10.1016/j.procs.2020.04.058.
R. S. Pressman, Rekayasa Perangkat Lunak: Pendekatan Praktisi, 7th ed. Yogyakarta: Penerbit Andi, 2012.
F. Sulianta, Teknik Perancangan Arsitektur Sistem Informasi. Yogyakarta: Penerbit Andi, 2017.
R. Sukamto and M. Shalahuddin, Rekayasa Perangkat Lunak (Terstruktur Berorientasi Objek). Bandung: Informatika, 2013.
T. A. Kurniawan, “Pemodelan Use Case (UML): Evaluasi Terhadap beberapa Kesalahan dalam Praktik,” J. Teknol. Inf. dan Ilmu Komput., vol. 5, no. 1, p. 77, 2018, doi: 10.25126/jtiik.201851610.
A. Menezes, P. Van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997.
D. Rachmawati, J. T. Tarigan, and A. B. C. Ginting, “A comparative study of Message Digest 5(MD5) and SHA256 algorithm,” J. Phys. Conf. Ser., vol. 978, no. 1, 2018, doi: 10.1088/1742-6596/978/1/012116.
Copyright (c) 2022 Walidatush Sholihah, Sofiyanti Indriasari, Inna Noviyanti, Anggi Mardiyono, Nur Aziezah
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.