Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms

Arif Indra Irawan, Iman Hedi Santoso, Maya Rahayu, Arif Indra, Irawan
{"title":"Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms","authors":"Arif Indra Irawan, Iman Hedi Santoso, Maya Rahayu, Arif Indra, Irawan","doi":"10.22146/jnteti.v13i1.4395","DOIUrl":null,"url":null,"abstract":"The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent students can fake their attendance for themselves or friends. This type of attack is known as fake QR code generation. This research proposes a security authentication system using the Rivest–Shamir–Adleman (RSA) encryption algorithm and the secure hash algorithm 1 (SHA-1) to secure QR code-based attendance applications from fake QR code generation attacks. The RSA algorithm encrypts QR code data to maintain privacy, while the SHA-1 algorithm ensures data integrity. Based on this method, the mutual authentication process between the QR code data generated by the student and the attendance reading application by the teacher can be established. The results obtained from a series of tests showed that the security system in the student attendance recording application that had been implemented at Madrasah Aliyah (MA) Al-Mukhlishin could detect and prevent fake QR code generation attacks. The test was conducted by changing the impact of the key length on RSA-1024 bits and RSA-2048 bits. The results showed that in RSA-1024 bits, energy consumption of 0.14 J and time of 1.66 s is more efficient than that in RSA-2048 bits, with energy consumption of 0.19 J and time of 2.09 s. Interestingly, if a higher level of security is required, the key length should be increased at the expense of some energy and time efficiency.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"15 10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22146/jnteti.v13i1.4395","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent students can fake their attendance for themselves or friends. This type of attack is known as fake QR code generation. This research proposes a security authentication system using the Rivest–Shamir–Adleman (RSA) encryption algorithm and the secure hash algorithm 1 (SHA-1) to secure QR code-based attendance applications from fake QR code generation attacks. The RSA algorithm encrypts QR code data to maintain privacy, while the SHA-1 algorithm ensures data integrity. Based on this method, the mutual authentication process between the QR code data generated by the student and the attendance reading application by the teacher can be established. The results obtained from a series of tests showed that the security system in the student attendance recording application that had been implemented at Madrasah Aliyah (MA) Al-Mukhlishin could detect and prevent fake QR code generation attacks. The test was conducted by changing the impact of the key length on RSA-1024 bits and RSA-2048 bits. The results showed that in RSA-1024 bits, energy consumption of 0.14 J and time of 1.66 s is more efficient than that in RSA-2048 bits, with energy consumption of 0.19 J and time of 2.09 s. Interestingly, if a higher level of security is required, the key length should be increased at the expense of some energy and time efficiency.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用 RSA 和哈希算法实现 QR 码考勤安全系统
基于快速反应(QR)代码的考勤应用程序有助于减少纸张使用量和考勤输入错误。然而,在万隆一所学校的实施过程中,基于 QR 码的考勤显示出了一些弱点。缺席的学生可以为自己或朋友伪造考勤。这种攻击被称为生成假二维码。本研究提出了一种使用 Rivest-Shamir-Adleman (RSA) 加密算法和安全散列算法 1 (SHA-1) 的安全认证系统,以确保基于二维码的考勤应用程序免受假冒二维码生成攻击。RSA 算法对二维码数据进行加密以维护隐私,而 SHA-1 算法则确保数据的完整性。基于这种方法,学生生成的二维码数据与教师的考勤读取应用程序之间可以建立起相互认证过程。一系列测试结果表明,Madrasah Aliyah (MA) Al-Mukhlishin 的学生考勤记录应用程序中的安全系统能够检测和防止伪造二维码生成攻击。测试是通过改变密钥长度对 RSA-1024 位和 RSA-2048 位的影响进行的。结果表明,RSA-1024 位的能耗为 0.14 J,时间为 1.66 s,比 RSA-2048 位的能耗 0.19 J,时间 2.09 s 更有效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
24 weeks
期刊最新文献
Citra Tekstur Terbaik Untuk Gaussian Naïve Bayes Dengan Interpolasi Nearest Neighbor Research and Analysis of IndoBERT Hyperparameter Tuning in Fake News Detection Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms Fog Computing-Based System for Decentralized Smart Parking System by Using Firebase Pemantauan dan Pengendalian Parameter Greenhouse Berbasis IoT Dengan Protokol MQTT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1