Implementation of QR Code and Digital Signature to Determine the Validity of KRS and KHS Documents

Fatich Fazlur Rochman, Indra Kharisma Raharjana, Taufik Taufik

Abstract


Universitas Airlangga students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS) is called Study Result Card or courses taken in the Kartu Rencana Studi (KRS) is called Study Plan Card, if there are changes to the data on the system used Universitas Airlangga. This complicated KRS and KHS verification process happened because the KRS and KHS documents that owned by student is easier to counterfeit than the data in the system. Implementation digital signature and QR Code technology as a solution that can prove the validity of KRS or KHS. The KRS and KHS validation system developed by Digital Signature and QR Code. QR Code is a type of matrix code that was developed as a code that allows its contents to be decoded at high speed while the Digital Signature has a function as a marker on the data to ensure that the data is the original data. The verification process was divided into two types are reading the Digital Signature and printing document that works by scanning the data from QR Code. The application of the system is carried out were the addition of the QR Code on KRS and KHS, required a readiness of human resources.


Keywords


Study Plan Card, Study Result Card, Digital Signature, QR Code

Full Text:

PDF

References


Husain, A., Bakhtiari, M., and Zainal, A. 2014. Printed Document Integrity Verification Using Barcode. Jurnal Teknologi (Sciences & Engineering), pp. 99- 106.

Rouillard, J. 2008. Contextual QR codes. InComputing in the Global Information Technology. ICCGI'08. The Third International Multi-Conference on (pp. 50-55).

Singhal, A. and Pavithr, R.S. 2015. Degree Certificate Authentication using QR Code and Smartphone. International Journal of Computer Applications, 120(16).

Hidayat, E. Y. and Firdausillah, F. 2014. Sistem Legalisir Scan Ijasah Online. Universitas Dian Nuswantoro, Semarang.

Dwiperdana, A. 2008. Cryptographic Hash Function dan Penggunaannya Dalam Digital Signature. Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung, pp. 1-10.

Lee, S. 2012. Unified Modeling Language (UML) for Database Systems and Computer Applications. International Journal of Database Theory and Application, vol. 5, no. 1, pp. 157-164.

Arya, P.K., Aswal, M.S. and Kumar, V. 2012. Comparative Study of Asymmetric Key Cryptographic Algorithms. International Journal of Computer Science & Communication Networks, 5(1), pp.17-21.

Wibisono, W. and Baskoro, F. 2002. Pengujian Perangkat Lunak dengan Menggunakan Model Behaviour UML. JUTI: Jurnal Ilmiah Teknologi Informasi, 1(1), pp.43-50.




DOI: https://doi.org/10.15294/sji.v4i1.7198

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.