2020
DOI: 10.24036/jptk.v3i4.14823
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of AES-192 cryptography and QR code to verify the authenticity of budi luhur university student certificate

Abstract: Nowadays a letter can easily be falsified and used for things that are not appropriate. Budi Luhur University has a work unit that serves student requests for certificate of active students and certificate of graduation. Students need that certificate for apply a job or get a scholarship. To prevent the falsification of letters, a system using PHP programming language and MariaDB database was used to verify the letters. The certificate released by this system will be equipped with a QR Code containing the URL … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…In another study, to increase document security and facilitate the validation process, the use of digital signatures using the RSA algorithm [16,17] and SHA-512 algorithms can be applied where the method used is to generate a public key and a private key with RSA. The signing process is carried out by encrypting the message digest generated from the message hashing process with SHA-512 and then verifying electronic documents by matching the results of document decryption and SHA-512 hashing of documents [18,19,20,21] in a similar study [3]. With SHA-3 hashing function and super encryption combination of RSA and AES, with QR-Code scheme to accommodate the signature code.…”
Section: Related Workmentioning
confidence: 99%
“…In another study, to increase document security and facilitate the validation process, the use of digital signatures using the RSA algorithm [16,17] and SHA-512 algorithms can be applied where the method used is to generate a public key and a private key with RSA. The signing process is carried out by encrypting the message digest generated from the message hashing process with SHA-512 and then verifying electronic documents by matching the results of document decryption and SHA-512 hashing of documents [18,19,20,21] in a similar study [3]. With SHA-3 hashing function and super encryption combination of RSA and AES, with QR-Code scheme to accommodate the signature code.…”
Section: Related Workmentioning
confidence: 99%