Dewantoro, Rico Wijaya
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

IMPLEMENTING SHA-256 IN BLOCKCHAIN FOR SECURE AND TRUSTED ONLINE TRANSACTIONS OF MSMEs Luis, Matthew; Dewantoro, Rico Wijaya; Crispin, Andrian Reinaldo; Putra, Adya Zizwan; Dharma, Abdi; Chrysia, Celine; Vagga, Cherry Piya
JIKO (Jurnal Informatika dan Komputer) Vol 8, No 3 (2025)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v8i3.10606

Abstract

The advancement of information technology has driven digital transformation in various sectors, including Micro, Small, and Medium Enterprises (MSMEs), which are vital to Indonesia's economy. However, local MSMEs still face challenges in online transactions, especially related to data security and low consumer trust. Issues like data manipulation, lack of transparency, and weak security systems hinder optimal digitalization. This study implements the SHA-256 cryptographic algorithm in a blockchain system to enhance security and trust in local MSMEs' online transactions. SHA-256 is chosen for its ability to produce unique, permanent, and tamper-resistant hashes. The system adopts a decentralized blockchain model, where transactions are recorded in encrypted, chronologically linked blocks. The testing results show that the SHA-256-based blockchain system functions effectively in maintaining data integrity and preventing manipulation. Black Box Testing confirmed that the system operates correctly from the user's perspective, including login validation, transaction recording, manipulation detection, and transaction history retrieval. White Box Testing validated the internal logic of the system, proving the correct implementation of SHA-256 hashing, block linking, Proof of Work (PoW), and transaction validation mechanisms. All test cases passed successfully, demonstrating that the system is stable, functional, and secure.
COMPARISON OF ECDSA DAN EDDSA ALGORITHMS IN BLOCKCHAIN-BASED HEALTH RECORDS SECURITY Alexander, Nicholas; Wijaya, Bayu Angga; Dewantoro, Rico Wijaya; Monalisa, Monalisa
JIKO (Jurnal Informatika dan Komputer) Vol 8, No 3 (2025)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v8i3.10709

Abstract

The development of blockchain technology presents significant opportunities for the management of Electronic Health Records (EHR), owing to its decentralized, transparent, and tamper-resistant characteristics. However, security challenges remain, particularly regarding the use of the Elliptic Curve Digital Signature Algorithm (ECDSA), which, despite being compact and secure, has limitations in efficiency and potential vulnerabilities related to random nonce usage. This study aims to compare the effectiveness, efficiency, and security of ECDSA with the Edwards-curve Digital Signature Algorithm (EdDSA) in safeguarding the integrity and confidentiality of blockchain-based EHR systems. The research methodology involved simulations and evaluations of digital signature algorithms using an EHR dataset from Kaggle, focusing on performance testing, data validation, and the implementation of the Proof-of-Work (PoW) consensus mechanism. The results indicate that EdDSA outperforms ECDSA in terms of both speed and security. EdDSA achieved a signing time of 0.000180 seconds and a verification time of 0.000200 seconds, compared to ECDSA's 0.000962 seconds and 0.003204 seconds, respectively. While both algorithms successfully validated the data, neither was able to detect data alterations. From a blockchain perspective, PoW demonstrated high computational resistance, as evidenced by increased mining times—from 1,504 seconds for 4,000 blocks (difficulty target = 5) to 7,702 seconds for 20,000 blocks (difficulty target = 5)—thereby enhancing system integrity. Overall, EdDSA is considered more suitable for modern blockchain-based EHR implementations, although further research is needed to develop mechanisms for detecting data alteration.