Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal ULTIMATICS

Implementasi Zero Knowledge Proof Menggunakan Protokol Feige Fiat Shamir Untuk Verifikasi Tiket Rahasia Willy Sudiarto Raharjo; Dessy Sutanti
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.174 KB) | DOI: 10.31937/ti.v7i2.355

Abstract

Cryptography is known for it’s ability to protect confidential information, but it can also be used for other purposes. One of them is for identity verification or authentication. One of the biggest disadvantages of traditional authencation method is at the end of the session, the verifier knows about secrets which is supposed to be known only by prover. In this paper, we implemented a ZeroKnowledge Proof-based secret ticket verification system using Feige Fiat Shamir protocol. The goal of this system is to help prover identified themselves to the verifier, but also prevent the verifier to understand anything about the prover’s secret information. The system is also able to prevent ticket duplication or double-use of tickets by using an interactive proof verification method. By combining it with cryptography, not only we can achieve completeness and soundness property of Zero-Knowledge Proof, but we can also achieve information security property. Index Terms - Feige Flat Shamir, Verification, Zero Knowledge Proof.
Implementasi Skema Meaningful Sharing pada Kriptografi Visual Berwarna untuk Digital Safe Deposit Box Willy Sudiarto Raharjo; Danny Aguswahyudi
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1049.651 KB) | DOI: 10.31937/ti.v8i1.498

Abstract

Conventional key being used in safe deposit box is a physical key that is easily duplicated, stolen and abused by irresponsible parties. This research proposed a model that substitutes the conventional key with a digital shared secret with the use of visual cryptography scheme. Visual cryptography hide the secret image into two or more images which are called share images that will not reveal anything about secret image if they were separated. The secret image can be recovered simply by stacking the shared images together without any complex computation. In this research, we propose a digital safe deposit box built using a color visual cryptography scheme. The proposed system will generate secret images containing passphrase that will be hidden in two shared images. The shared images are used for substituting the traditional key. We found 93% of the stacked image are visually readable by human eye and Arial-Courier font combination are more readable compared to Times New Roman-Calibri with 95% compared to 92% during human visual verification process. Index Terms— visual cryptography, secret sharing
Analisa Implementasi Protokol HTTPS pada Situs Web Perguruan Tinggi di Pulau Jawa Willy Sudiarto Raharjo; Aloysius Airlangga Bajuadji
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1200.825 KB) | DOI: 10.31937/ti.v8i2.518

Abstract

HTTPS protocol offers better data protection than regular HTTP protocol since it utilize cryptography, mainly encryption and authentication mechanism to provide confidentiality and authenticity to packets sent to and from servers. However, not all institutions have properly implemented HTTPS protocol for their web sites. This paper analyzed the implementation of HTTPS protocol for all higher education web sites in Java island. We found that only 28 out of 1505 (1.86%) of all higher education institution who have a domain name have been using HTTPS protocol for their main domain. Furthermore, not all of them have properly implemented HTTPS protocol. We analyzed all 28 domains and we found that 8 out of 28 (28.57%) institutions are still using SSLv3 protocol which is no longer recommended to be used since it’s vulnerable to POODLE attack, 9 out of 28 (32.14%) institutions are still using an old algorithm RC4 which is proven to be insecure, 4 out of 28 (14.28%) institutions only support up to TLS 1.0, and 6 out of 28 (21.42%) institutions are still using SSLv2 or reusing same RSA keys thus vulnerable to DROWN attack. Many of the best practices of implementing HTTPS protocol were also neglected. HTTP Strict Transport Security (HSTS) is used by 5 out of 28 (17.8%) institutions and none of them have implemented HTTP Public Key Pinning (HPKP). Index Terms—cryptography, HTTPS, SSL, TLS