The Implementation Analysis Of Lamport Scheme With Sha-256 On Mobile E-Office

(1) Hendra Widodo Mail (Department of Electrical Engineering Universitas Lampung, Indonesia)
(2) Mardiana Mardiana Mail (Department of Electrical Engineering Universitas Lampung, Indonesia)
(3) Melvi Melvi Mail (Department of Electrical Engineering Universitas Lampung, Indonesia)
(4) * Ardian Ulvan Mail (Department of Electrical Engineering Universitas Lampung, Indonesia)
(5) Pattarakorn Sajjaporn Nuttachot Mail (Chulalongkorn University, Thailand)
*corresponding author

Abstract


Electronic administration system is one of the best solutions in the current digital era, electronic-based systems are considered to make it easier for an organization to process data and can reduce the possibility of data loss due to human error or natural disasters. The current administrative data management application is called the Electronic Office (E-Office). The E-Office handles data for  incoming mail, outgoing mail and mail disposition. There are frequent delays in receiving information and validating letter files that are still carried out using physical files, so the mobile e-office is a solution that can be used by an agency to make it easier  for workers to access information more quickly and can be done anywhere. Data security is an important thing that needs to be considered in an electronic transaction, so this research will add data security to the mobile e-office using sha-256 and lamport schemes. We present data on the results of this mobile e-office test on mobile devices and virtual private servers (vps), the data is in the form of functional application performance testing results and records of processing time performed by mobile and vps devices. From this  data an analysis will be carried out to determine the appropriateness of the devices that can be used in running a mobile e-office.


Keywords


Mobile Electronic Office; Data Security; SHA-265; Lamport Scheme; Performance Analysis;

   

DOI

https://doi.org/10.29099/ijair.v5i2.212
      

Article metrics

10.29099/ijair.v5i2.212 Abstract views : 392

   

Cite

   

References


Satish, C.G. (2004). Model View Controller (MVC ) Architecture. Accessed on 16 January, 2021 from http://www.dotnetspider.com/resources/316-Model-View-Controller-MVC-architecture.aspx

Leff, A. and Rayfield, J.T. (2001). Web-Application Development Using the Model/View/Controller Design Pattern. In Enterprise Distributed Object Computing Conference, 2001. EDOC’01. Proceedings Fifth IEEE International, IEEE, Seattle, WA, USA, 4-7 Sept. 2001, 118-127

Subari, A. et al (2020). Design of E-office System in Vocational School Diponegoro University using Code Igniter Framework. IOP Conf. Ser.: Mater. Sci. Eng. 801 012141.

Grimpe, C. er al (2017). R&D, marketing innovation, and new product performance: A mixed methods study. Journal of Product Innovation Management, 34 (3), pp. 360-383

Sugiyono. (2017). Metode Penelitian dan Pengembangan (Research and Development/R&D). Bandung:ALFABETA. ISBN: 978-602-289-158-1.

Jogiyanto. (2005). Analisis dan Desain Sistem Informasi: Pendekatan Terstruktur Teori dan Praktik Aplikasi Bisnis. Yogyakarta:ANDI. ISBN: 979-731-560-6.

Pasolong, H. (2016). Metode Penelitian Administrasi Publik. Bandung:ALFABETA. ISBN: 978-602- 9328-30-1.

Federal Information Processing Standard (FIPS) 180-4 (2015). Secure Hash Standard (SHS). National Institute of Standards and Technology, US Department of Commerce.

Fauziah, N.A. et al (2018). Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application. International Seminar on Research of Information Technology and Intellegent System (ISRTI). pp. 146- 151.

Sembiring, H. et al (2019). Application of the Secure Hash Algorithm (SHA) Algorithm for Image Security. Media Informasi Analisa dan Sistem (MEANS). Vol. 4. No. 1. P-ISSN: 2548-6985. E-ISSN: 2599-3089.

Sugiyatno, & Atika, P.D. (2018). Digital Signature with SHA-1 and RSA Algorithm as Authentication. Jurnal Cendekia. Vol. XVI. P-ISSN:0216-9436. E-ISSN:2622-6782.

Zentai, D. (2020). On The Efficiency on The Lamport Signature Scheme. Land Forces Academy Review, Vol. XXV, No. 3 (99).

Abdullah, G.M. et al (2018). Addoption of Lamport Signature Scheme to Implement Digital Signature in IoT. International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). pp. 1-4.

Puspitasari, T.D., & Supriadi, Y. (2019). Implementation of Lamport Scheme on RFID Arduino Mega 2560 Based on Personel Access Control System (XYZ College Case Study). National Seminar on Innovation and Technology Application in Industry. pp. 91-98. ISSN 2085-4218.

Lopes, H., & Chatterjee, M. (2014). Application H-Secure for Mobile Security. International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA). pp. 370-374.

Nidhra, S., & Jagruthi, D. (2012). Black Box and White Box Testing Techniques – A Literature Review. International Journal of Embedded System and Application (IJESA). Vol. 2. No. 2. pp. 29-50.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

________________________________________________________

International Journal Of Artificial Intelligence Research

Organized by: Departemen Teknik Informatika STMIK Dharma Wacana
Published by: STMIK Dharma Wacana
Jl. Kenanga No.03 Mulyojati 16C Metro Barat Kota Metro Lampung
phone. +62725-7850671
Fax. +62725-7850671
Email: jurnal.ijair@gmail.com | herinurdiyanto@dharmawacana.ac.id

View IJAIR Statcounter

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.