IMPLEMENTASI TWO FACTOR AUTHENTICATION SEBAGAI OTENTIKASI TRANSAKSI NON TUNAI

Ramdhon, Muhammad (2019) IMPLEMENTASI TWO FACTOR AUTHENTICATION SEBAGAI OTENTIKASI TRANSAKSI NON TUNAI. Skripsi thesis, Universitas Muhammadiyah Sukabumi.

[img] Text
COVER.pdf

Download (282kB)
[img] Text
LEMBAR PENGESAHAN PEMBIMBING.pdf

Download (96kB)
[img] Text
LEMBAR PERNYATAAN BEBAS PLAGIAT.pdf

Download (385kB)
[img] Text
BAB I.pdf

Download (318kB)
[img] Text
BAB II.pdf
Restricted to Repository staff only

Download (629kB) | Request a copy
[img] Text
BAB III.pdf
Restricted to Repository staff only

Download (350kB) | Request a copy
[img] Text
BAB IV.pdf
Restricted to Repository staff only

Download (1MB) | Request a copy
[img] Text
BAB V.pdf
Restricted to Repository staff only

Download (1MB) | Request a copy
[img] Text
BAB VI.pdf

Download (187kB)

Abstract

The Era of Revolution 4.0 changed consumer behavior patterns and gave a new way in transactions. Today the trend of payment used electronic money. Because according to a survey released in 2017 that electronic money makes things easier and faster. No exception of Muhammadiyah Sukabumi University campus the students want to apply non-cash payments to make payment transactions such as SKS payment until food court payments because just with smartphones everything is very fast and without queuing. in the Revolutionary Era 4.0 there will be more data collected over time. the same for cyber criminals, it will be bigger in data that can be stolen both personal and mass. Before a data leak happen ,best to protect data. the Data not only involve the server side, from the client server side it also needs to be secured. By applying the Two Factor Authentication method on the client server application it is expected that there will be an additional layer when 1 layer has been broken. Combine 2 factors namely "something you know" and "something you have" where the first layer is an account to enter a login and the second layer is the OTP code that will be sent using a third party application is TELEGRAM where useful in every transaction. Because TELEGRAM has a data security called MTProto that uses the AES encryption algorithm, the Diffie- Hellman method. And the hashing function.

Item Type: Thesis (Skripsi)
Uncontrolled Keywords: Digital Curenccy, two factor authentication, Security , authentication , Mobile
Subjects: T Technology > T Technology (General)
T Technology > TA Engineering (General). Civil engineering (General)
Divisions: Fakultas Sains dan Teknologi > Teknik Informatika
Depositing User: Perpus ID UMMI
Date Deposited: 03 Jan 2020 01:50
Last Modified: 03 Jan 2020 01:50
URI: http://eprints.ummi.ac.id/id/eprint/1192

Actions (login required)

View Item View Item