IMPLEMENTASI ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM DAN SECURE HASH ALGORITHM 256 PADA LOGIN AKUN DENGAN SISTEM TWO-FACTOR AUTHENTICATION

    Hokianto Suseno, - and Siti Fatimah, - and Rini Marwati, - (2025) IMPLEMENTASI ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM DAN SECURE HASH ALGORITHM 256 PADA LOGIN AKUN DENGAN SISTEM TWO-FACTOR AUTHENTICATION. S1 thesis, Universitas Pendidikan Indonesia.

    Abstract

    Autentikasi dua faktor (2FA) merupakan metode keamanan yang semakin banyak digunakan untuk meningkatkan keamanan login akun. Penelitian ini membahas implementasi algoritma Elliptic Curve Digital Signature Algorithm (ECDSA) dan Secure Hash Algorithm 256 (SHA 256) dalam sistem 2FA. ECDSA digunakan untuk menghasilkan tanda tangan digital sebagai bukti keaslian pengguna, sedangkan SHA 256 diterapkan dalam proses hashing untuk melindungi informasi sensitif, seperti username, password, dan kunci privat. Proses autentikasi terdiri dari dua tahap utama, yaitu verifikasi username dan password pengguna, serta validasi tanda tangan digital. Jika username dan password benar, server mengirimkan pesan acak kepada client untuk ditandatangani menggunakan kunci privat ECDSA, lalu hasil tanda tangan dikirim kembali ke server untuk diverifikasi menggunakan kunci publik. Implementasi dilakukan menggunakan bahasa pemrograman Python dengan penyimpanan berbasis file txt. Hasil pengujian menunjukkan bahwa metode ini mampu meningkatkan keamanan autentikasi dengan mencegah akses tanpa izin, meskipun masih memerlukan optimasi lebih lanjut dalam aspek efisiensi dan pengelolaan kunci privat. Selanjutnya, sistem ini dapat dikembangkan lebih lanjut dengan menggunakan basis data untuk penyimpanan yang lebih aman, serta diimplementasikan dalam aplikasi berbasis web atau mobile agar lebih mudah diadopsi secara luas.

    Two-factor authentication (2FA) is a security method that is increasingly being used to improve account login security. This research discusses the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Secure Hash Algorithm 256 (SHA 256) algorithms in a 2FA system. ECDSA is used to generate digital signatures as proof of user authenticity, while SHA 256 is applied in the hashing process to protect sensitive information, such as usernames, passwords and private keys. The authentication process consists of two main stages, such as verifying the user's username and password, and validating the digital signature. If the username and password are correct, the server sends a random message to the client to be signed using the ECDSA private key, then the signature results are sent back to the server to be verified using the public key. Implementation is carried out using the Python programming language with txt file-based storage. Test results show that this method is able to increase authentication security by preventing unauthorized access, although it still requires further optimization in terms of efficiency and private key management. Furthermore, this system can be further developed by using a database for safer storage, as well as implemented in a web-based or mobile application to make it easier to adopt widely.

    [thumbnail of S_MAT_2101111_Title.pdf] Text
    S_MAT_2101111_Title.pdf

    Download (2MB)
    [thumbnail of S_MAT_2101111_Chapter1.pdf] Text
    S_MAT_2101111_Chapter1.pdf

    Download (1MB)
    [thumbnail of S_MAT_2101111_Chapter2.pdf] Text
    S_MAT_2101111_Chapter2.pdf
    Restricted to Staf Perpustakaan

    Download (7MB)
    [thumbnail of S_MAT_2101111_Chapter3.pdf] Text
    S_MAT_2101111_Chapter3.pdf

    Download (2MB)
    [thumbnail of S_MAT_2101111_Chapter4.pdf] Text
    S_MAT_2101111_Chapter4.pdf
    Restricted to Staf Perpustakaan

    Download (4MB)
    [thumbnail of S_MAT_2101111_Chapter5.pdf] Text
    S_MAT_2101111_Chapter5.pdf

    Download (637kB)
    [thumbnail of S_MAT_2101111_Appendix.pdf] Text
    S_MAT_2101111_Appendix.pdf
    Restricted to Staf Perpustakaan

    Download (561kB)
    Official URL: https://repository.upi.edu
    Item Type: Thesis (S1)
    Additional Information: https://scholar.google.com/citations?view_op=new_profile&hl=en ID SINTA Dosen Pembimbing: Siti Fatimah: 5978161 Rini Marwati: 5981279
    Uncontrolled Keywords: Autentikasi Dua Faktor, Elliptic Curve Digital Signature Algorithm, Keamanan Akun, Secure Hash Algorithm 256, Tanda Tangan Digital Account Security, Digital Signature, Elliptic Curve Digital Signature Algorithm, Secure Hash Algorithm 256, Two-Factor Authentication
    Subjects: Q Science > QA Mathematics
    Divisions: Fakultas Pendidikan Matematika dan Ilmu Pengetahuan Alam > Program Studi Matematika - S1
    Depositing User: Hokianto Suseno
    Date Deposited: 06 May 2025 06:32
    Last Modified: 06 May 2025 06:32
    URI: http://repository.upi.edu/id/eprint/133015

    Actions (login required)

    View Item View Item