Notary Deed Security Application Using RC4 Method on Android-Based

  • Reza Saputra Yogyakarta Technology University
  • Yuli Asriningtias Yogyakarta Technology University
Keywords: Notarial Deed, RC4, Encryption, Decryption, Token

Abstract

In the digital era, security concerns related to notary deeds can arise due to several factors, particularly in safeguarding important documents. Without a secure application, these important documents, such as notary deeds, can be threatened by unauthorized access. This could result in material or reputational loss for both the notary and the client. This application provides facilities for users to encrypt and decrypt notarial deeds in several file types, including PDF, Excel, Microsoft Word, and images. The encryption and decryption process in this application utilize the RC4 method. In this application, users can process notarial deeds to be encrypted according to the type of document file they possess in order to obtain an encrypted files ready to be sent or exchanged notary deed data. The application result will display the history of the encrypted document, the date when the file was encrypted, as well as the token in the file for the decryption process.

                                                                                                  

Keywords: Notarial Deed, RC4, Encryption, Decryption, Token

References

Alincia, D., & Sitabuana, T. H. (2021). Urgency of Law Amendment as Foundation of The Implementation of Cyber Notary. Law Reform: Jurnal Pembaharuan Hukum, 17(2). https://doi.org/10.14710/lr.v17i2.41749
Alyafie, Z. Z., & Purnawan, A. (2020). The Implementation of Legal Responsibilities Of Notary on Authentic Deed Which His Made Based On Act No. 2 of 2014 On the Amendment of Act No. 30 of 2004 On Notary in Kendari. Jurnal Akta, 7(2). https://doi.org/10.30659/akta.v7i2.8104
Amudy, N., Gunarto, G., & Sulchan, A. (2020). Implementation of Legal Presumption Principle for Notary Deed Makes Partij According to Law No. 2 of 2014 on the Amendment of Act No. 30 of 2004 Concerning Notary Position. Jurnal Akta, 6(4). https://doi.org/10.30659/akta.v6i4.7900
Anshori, I., Rahmi, E., & Syamsir, S. (2022). Polemik Penerapan Tanda Tangan Elektronik Dalam Pembuatan Akta Otentik. Recital Review, 4(2). https://doi.org/10.22437/rr.v4i2.18863
Arrohim, M. B., & Wahyuningsih, S. E. (2020). Analysis of Judicial Application of Criminal Penalty Against Notary / Land Deed Officials Conducting Making Crime of the Fake Authentic Deed in State Court of Semarang. Jurnal Akta, 7(2). https://doi.org/10.30659/akta.v7i2.7891
Bayu Pratama, E., & Syarif, M. (2021). Pemodelan Extreme Programming Untuk Pengarsipan Akta Pada Kantor Notaris Dan Ppat. Jik), 5(2).
Butarbutar, O. (2021). Use of Rc4 Method In Android-Based Sms Security Application. Jurnal Info Sains : Informatika Dan Sains, 11(2). https://doi.org/10.54209/infosains.v11i2.41
Chakraborty, C., Chakraborty, P., & Maitra, S. (2021). Glimpses are forever in RC4 amidst the spectre of biases. Discrete Applied Mathematics, 298. https://doi.org/10.1016/j.dam.2021.03.021
Iryadi, I., Ansari, T. S., Saputra, J., Afrizal, T., & Thirafi, A. S. (2021). The role of jurisprudence as form of legal prescriptions: A case study of notaries in indonesia. WSEAS Transactions on Environment and Development, 17. https://doi.org/10.37394/232015.2021.17.8
Ito, R., & Miyaji, A. (2021). New iterated RC4 key correlations and their application to plaintext recovery on WPA-TKIP. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E104A(1). https://doi.org/10.1587/transfun.2020CIP0006
Kartikadarma, E., Listyorini, T., & Rahim, R. (2018). An Android mobile RC4 simulation for education. World Transactions on Engineering and Technology Education, 16(1).
Koyama, S., Katagiri, T., Minamikawa, K., Kato, M., & Hayashi, H. (2016). Effects of rice husk charcoal application on rice yield, methane emission, and soil carbon sequestration in andosol paddy soil. Japan Agricultural Research Quarterly, 50(4). https://doi.org/10.6090/jarq.50.319
Rahmatulloh, A. (2017). Source Code PHP dengan Teknik Obfuscation Code pada Extension PHP. Konferensi Nasional Informatika, October 2015.
Riad, A. E. D., Elminir, H. K., Shehata, A. R., & Ibrahim, T. R. (2013). Security evaluation and encryption efficiency analysis of RC4 stream cipher for converged network applications. Journal of Electrical Engineering, 64(3). https://doi.org/10.2478/jee-2013-0029
Ryan, S., Mohammad Taufan Asri, Z., Yuliadi, & Hanif Priabdul, A. (2021). Rancang Bangun Aplikasi Pencatatan Order Akta Notaris dan PPAT I Wayan Pastika. JURIKOM (Jurnal Riset Komputer), 8(4).
Sidharta, R., & Dewi, P. E. T. (2023). THE ROLE OF CYBER NOTARY IN THE FIELD OF DIGITAL INTERNATIONAL TRADE IN INDONESIA. NOTARIIL Jurnal Kenotariatan, 8(1). https://doi.org/10.22225/jn.8.1.2023.1-7
Slamet, C., Syaripudin, U., Kaffah, F. M., & Tiasto, B. E. (2021). Implementation of Rivest Cypher 4 algorithm in Security Assertion Mark-up Language protocols on Single Sign-On services. IOP Conference Series: Materials Science and Engineering, 1098(3). https://doi.org/10.1088/1757-899x/1098/3/032109
Syuaib, A. M., Purnawan, A., & Khisni, A. (2021). Legal Certainty of Application of Electronic Archives in Keeping Minutes of Notary Deed as Authentic Evidence. Sultan Agung Notary Law Review, 3(1). https://doi.org/10.30659/sanlar.3.1.250-256
Xiong, A., Liu, G., Zhu, Q., Jing, A., & Loke, S. W. (2022). A notary group-based cross-chain mechanism. Digital Communications and Networks, 8(6). https://doi.org/10.1016/j.dcan.2022.04.012
Yildiz, G., & Cakmak, E. K. (2021). Investigating the distance education process according to the demographic characteristics of the notary and the notary employee. Contemporary Educational Technology, 13(2). https://doi.org/10.30935/cedtech/9583
Published
2023-10-31
How to Cite
Reza Saputra, & Yuli Asriningtias. (2023). Notary Deed Security Application Using RC4 Method on Android-Based. Journal of Engineering, Electrical and Informatics, 3(3), 19-33. https://doi.org/10.55606/jeei.v3i3.2252