Dewantoro, Rico Wijaya
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

IMPLEMENTING SHA-256 IN BLOCKCHAIN FOR SECURE AND TRUSTED ONLINE TRANSACTIONS OF MSMEs Luis, Matthew; Dewantoro, Rico Wijaya; Crispin, Andrian Reinaldo; Putra, Adya Zizwan; Dharma, Abdi; Chrysia, Celine; Vagga, Cherry Piya
JIKO (Jurnal Informatika dan Komputer) Vol 8, No 3 (2025)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v8i3.10606

Abstract

The advancement of information technology has driven digital transformation in various sectors, including Micro, Small, and Medium Enterprises (MSMEs), which are vital to Indonesia's economy. However, local MSMEs still face challenges in online transactions, especially related to data security and low consumer trust. Issues like data manipulation, lack of transparency, and weak security systems hinder optimal digitalization. This study implements the SHA-256 cryptographic algorithm in a blockchain system to enhance security and trust in local MSMEs' online transactions. SHA-256 is chosen for its ability to produce unique, permanent, and tamper-resistant hashes. The system adopts a decentralized blockchain model, where transactions are recorded in encrypted, chronologically linked blocks. The testing results show that the SHA-256-based blockchain system functions effectively in maintaining data integrity and preventing manipulation. Black Box Testing confirmed that the system operates correctly from the user's perspective, including login validation, transaction recording, manipulation detection, and transaction history retrieval. White Box Testing validated the internal logic of the system, proving the correct implementation of SHA-256 hashing, block linking, Proof of Work (PoW), and transaction validation mechanisms. All test cases passed successfully, demonstrating that the system is stable, functional, and secure.
COMPARISON OF ECDSA DAN EDDSA ALGORITHMS IN BLOCKCHAIN-BASED HEALTH RECORDS SECURITY Alexander, Nicholas; Wijaya, Bayu Angga; Dewantoro, Rico Wijaya; Monalisa, Monalisa
JIKO (Jurnal Informatika dan Komputer) Vol 8, No 3 (2025)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v8i3.10709

Abstract

The development of blockchain technology presents significant opportunities for the management of Electronic Health Records (EHR), owing to its decentralized, transparent, and tamper-resistant characteristics. However, security challenges remain, particularly regarding the use of the Elliptic Curve Digital Signature Algorithm (ECDSA), which, despite being compact and secure, has limitations in efficiency and potential vulnerabilities related to random nonce usage. This study aims to compare the effectiveness, efficiency, and security of ECDSA with the Edwards-curve Digital Signature Algorithm (EdDSA) in safeguarding the integrity and confidentiality of blockchain-based EHR systems. The research methodology involved simulations and evaluations of digital signature algorithms using an EHR dataset from Kaggle, focusing on performance testing, data validation, and the implementation of the Proof-of-Work (PoW) consensus mechanism. The results indicate that EdDSA outperforms ECDSA in terms of both speed and security. EdDSA achieved a signing time of 0.000180 seconds and a verification time of 0.000200 seconds, compared to ECDSA's 0.000962 seconds and 0.003204 seconds, respectively. While both algorithms successfully validated the data, neither was able to detect data alterations. From a blockchain perspective, PoW demonstrated high computational resistance, as evidenced by increased mining times—from 1,504 seconds for 4,000 blocks (difficulty target = 5) to 7,702 seconds for 20,000 blocks (difficulty target = 5)—thereby enhancing system integrity. Overall, EdDSA is considered more suitable for modern blockchain-based EHR implementations, although further research is needed to develop mechanisms for detecting data alteration.
Penerapan Elliptic Curve Digital Signature Algorithm (ECDSA) dalam Blockchain untuk Sistem Pembayaran Digital Indonesia Situmorang, Mikael; Dewantoro, Rico Wijaya; Saragih, Willy Alfrianer; Panjaitan, Partahi Tulus
Dinamik Vol 31 No 1 (2026)
Publisher : Universitas Stikubank

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35315/dinamik.v31i1.10329

Abstract

This research examines the application of the Elliptic Curve Digital Signature Algorithm (ECDSA) in a blockchain system as a security solution for digital payment systems in Indonesia. Using a descriptive-qualitative approach based on literature review and conceptual simulations using Python, this study discusses the working principles of ECDSA, its advantages over other digital signature algorithms, and the challenges of its adoption in Indonesia. The results show that ECDSA provides high cryptographic efficiency, maintains transaction authenticity and integrity, and supports a transparent decentralized system. The academic simulations include not only KYC processes, top-ups, transactions, validation by validators, and block recording, but also demonstrates the formation of an interconnected multi-level blockchain and tests scenarios for rejecting manipulated or invalid transactions. The contribution of this research lies not only in the theoretical review but also in the implementation illustrations that can be used as a basis for education and the initial development of blockchain-based digital payment systems. The research results show that ECDSA is capable of providing a high level of efficiency in the encryption and transaction verification process, maintaining data integrity and authenticity, and supporting a decentralized and transparent system. The academic simulations included the KYC process, wallet creation using ECDSA keys, balance top-ups through bank integration, transaction creation and validation, and block recording in the blockchain. Specifically, the simulations successfully demonstrated how new blocks are added to the chain by referencing the previous block's hash, as well as how transactions with corrupted signatures, manipulated amounts, or insufficient balances are automatically rejected by the validator consensus mechanism, maintaining system integrity. This research contributes not only theoretically, but also through conceptual representations that can be used as an educational foundation and for the initial development of blockchain-based digital payment systems in Indonesia.