Design and Development a Web Token Library for HTTP Data Encryption Using Exclusive-OR (XOR)
Rancang Bangun Library Web Token Untuk Enkripsi HTTP Data Menggunakan Eksklusif-OR (XOR)
DOI:
https://doi.org/10.21070/ups.970Keywords:
XOR, Encryption, BLAKE2b, Web Token, LibraryAbstract
The rise of data hacking in Indonesia is a concerning problem due to the sensitivity of data. Encrypting data is essential to secure data exchange, and the XOR algorithm is a popular option due to its ease of implementation, simplicity, speed, and lightweight. Additionally, using the BLAKE2b hash algorithm provides better security and speed. This research focuses on securing data exchange on HTTP using XOR and BLAKE2b. However, data interception can occur without a digital signature token mechanism. This study proposes the design of a lightweight and easy-to-use web token library to address this issue. The system's suitability was tested using various methods, including encryption time tests for XOR and BLAKE2b algorithms to generate tokens. The results obtained were relatively fast compared to JWT with the HS256 algorithm. The study also tested the API-based authentication process.
Downloads
References
M. Betty Yel and M. K. M Nasution, “Keamanan Informasi Data Pribadi Pada Media Sosial,” J. Inform. Kaputama, vol. 6, no. 1, pp. 92–101, 2022, [Online]. Available: http://jurnal.kaputama.ac.id/index.php/JIK/article/view/768.
F. P. Nugroho, R. W. Abdullah, S. Wulandari, and Hanafi, “Keamanan Big Data di Era Digital di Indonesia,” J. Inf., vol. 5, no. 1, pp. 28–34, 2019.
R. Rosdiana, “Sekuritas Sistem Dengan Kriptografi,” Al-Khwarizmi J. Pendidik. Mat. dan Ilmu Pengetah. Alam, vol. 3, no. 1, 2018, doi: 10.24256/jpmipa.v3i1.216.
Suparyanto dan Rosad, “IMPLEMENTASI ALGORITMA AES DAN ALGORITMA XOR PADA APLIKASI ENKRIPSI DAN DEKRIPSI TEKS BERBASIS ANDROID,” Suparyanto dan Rosad, vol. 5, no. 3, pp. 248–253, 2020.
A. R. Pratama, M. H. H. Ichsan, and A. Kusyanti, “Implementasi Algoritme AES Pada Pengiriman Data Sensor DHT11 Menggunakan Protokol Komunikasi HTTP,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 3, no. 4, pp. 3781–3789, 2019.
C. Mainka, V. Mladenov, T. Guenther, and J. Schwenk, “Automatic recognition, processing and attacking of single sign-on protocols with burp suite,” Lect. Notes Informatics (LNI), Proc. - Ser. Gesellschaft fur Inform., vol. 251, pp. 117–131, 2015.
V. M. Deshpande, M. K. Nair, and D. Shah, “Major Web Application Threats for Data Privacy & Security-Detection, Analysis and Mitigation Strategies,” Accepted, vol. 7, no. 10, pp. 182–198, 2017, [Online]. Available: www.ijsrst.com.
N. F. Sitorus, A. Kusyanti, and A. Bhawiyuga, “Implementasi Autentikasi Berbasis Token Menggunakan Platform Agnostic Security Tokens (PASETO) Sebagai Mekanisme Autentikansi RESTful API,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 11, pp. 3947–3955, 2020, [Online]. Available: http://j-ptiik.ub.ac.id.
V. Ganesh and B. V. H. Sandilya, “Implementation of SIMD Instruction Set Extension for BLAKE2,” 2019 10th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2019, 2019, doi: 10.1109/ICCCNT45670.2019.8944835.
J. Aumasson, S. Neves, Z. W. Hearn, and C. Winnerlein, “BLAKE2 : Simpler , Smaller , Fast as MD5,” pp. 119–135, 2013.
B. Maryanto, “Penggunaan Fungsi Hash Satu-Arah Untuk Enkripsi Data,” Media Inform., vol. 7, no. 3, pp. 138–146, 2008.
M. R. Anwar, D. Apriani, and I. R. Adianita, “Hash Algorithm In Verification Of Certificate Data Integrity And Security,” Aptisi Trans. Technopreneursh., vol. 3, no. 2, pp. 65–72, 2021, doi: 10.34306/att.v3i2.212.
J. Friesen, “Introducing JSON,” in Java XML and JSON, 2019.
F. W. C, A. P. Rahagiar, and F. Fretes, “Penerapan Algoritma Gabungan Rc4 Dan Base64 Pada Sistem Keamanan E-Commerce,” Semin. Nas. Apl. Teknol. Inf., vol. 2012, no. Snati, pp. 47–52, 2012.
J. Y. Lee, W. C. Lin, and Y. H. Huang, “A lightweight authentication protocol for Internet of Things,” 2014 Int. Symp. Next-Generation Electron. ISNE 2014, pp. 1–2, 2014, doi: 10.1109/ISNE.2014.6839375.
Downloads
Additional Files
Posted
Categories
License
Copyright (c) 2023 UMSIDA Preprints Server
This work is licensed under a Creative Commons Attribution 4.0 International License.