IMPLEMENTATION OF THE SECURITY SYSTEM S-KEY CRYPTOCURRENCY HARDWARE WALLET WITH AUTHENTICATION DURATION FEATURES
At present, the use of smartphones has penetrated into various fields and one of them is the economic field. By using a smartphone, now people can easily shop and even pay routine bills. In addition, one of the most common uses of smartphones in the economy is digital transactions using digital exch...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/46517 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | At present, the use of smartphones has penetrated into various fields and one of them is the economic field. By using a smartphone, now people can easily shop and even pay routine bills. In addition, one of the most common uses of smartphones in the economy is digital transactions using digital exchange tools called cryptocurrency. During its development, technology for a cryptocurrency called a wallet. Simply put, a wallet is a place used to store cryptocurrency currencies.
Lately, an already circulating wallet that is connected with a smartphone. However, the wallet used on an average smartphone is still a wallet software. Wallet in the form of software is widely used because it is more affordable in terms of economics and some are even free. However, the wallet software security system is still vulnerable to theft by strangers. This is because the storage system in the wallet software is done by saving digital money in a smartphone storage system. Digital money data stored on a smartphone still has the possibility to be tracked and stolen by tracking the IP address of the smartphone used and is able to penetrate into the system of the smartphone. Concerns of wallet software users will arise due to vulnerable security, so a cryptocurrency wallet for safer smartphones is needed. Therefore, a system was developed that could store cryptocurrency keys separately from smartphones and could generate public keys for transactions that were integrated with a special application, namely the S-Key.
One of the subsystems on the S-Key is the term security subsystem. This subsystem will perform routine authentication to require the user to enter the PIN in an effort to ensure that the hardware stays with the appropriate party. There are 3 conditions defined in the system, namely authentication conditions, deadline conditions, and current conditions. The Authentication condition will indicate the time when the user must authenticate. Deadline Conditions are the deadline conditions the user must enter the PIN. If the user does not enter the PIN, it will overwrite the stored data. The current time condition is a realtime time condition which will be a comparison if it has been included in the other two conditions.
Retrieval of these conditions will be defined using the time parameter by using the RTC whose value has been normalized. RTC is used as a defining component so that the clock needed to retrieve time parameters continues to run even if the hardware is turned off without power.
The test is carried out directly with the duration of the authentication condition 7 days and a deadline of 24 hours after the authentication condition. Testing is done with the Normal Test and Negative Test. In the Normal Test, authentication is performed at the specified time to see whether the stored data remains stored. Then in the Negative Test, the test is done by letting the authentication conditions and the deadline finish so that the stored data is overwritten with false data. In order to get 100% successful testing with several notes to note, the valid time is the same time in the same zone as the instrument. Then the drift of time that occurs between RTc time with real-time has no effect because only a very small difference occurs so that it can be ignored.
|
---|