MECHANISM OF DOCUMENT SECURITY AND DISTRIBUTION SYSTEM IN INDONESIAN NATIONAL POLICE USING QUICK RESPONSE CODE AND ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
Document security and the process of distributing official documents in Indonesian National Police are absolutely necessary. So, the documents information does not leak and fall into unauthorized hands. The combination of QR Code and elliptic curve digital signature algorithm is proposed as a sol...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/53619 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Document security and the process of distributing official documents in Indonesian
National Police are absolutely necessary. So, the documents information does not leak and
fall into unauthorized hands. The combination of QR Code and elliptic curve digital
signature algorithm is proposed as a solution in providing security for documents and their
distribution process. QR Code is an easy-to-use message delivery technology. By using a
QR Code, messages are secured in the form of random images with a black and white
module that cannot be read by the human eye. Meanwhile, the use of an elliptic curve digital
signature algorithm can present aspects of document security in terms of authenticating
senders and recipients of official texts, ensuring the integrity of the contents of official
scripts, and non-denial.
From this research that using design science research methodology, the results show that
the system designed is able to secure documents and their distribution processes through
document encryption, digital signature generation, QR code generation, user verification,
validation of digital signatures, and document reappearance which is encoded. Future
research with the same technique is expected to improve system performance by producing
a higher version and error correction level of the QR Code and using other cryptographic
algorithms.
|
---|