Metode One Time Pad sebagai Verifikasi Akun E-Wallet dalam Pencegahan Cybercrime
Abstract
This research aims to improve security when every time a user logs in or makes a transaction, an OTP (One time pad) will be sent via email, the OTP code is generated randomly and can only be accessed by the account party that has a valid and valid OTP key at that time. certain. Using the one time pad algorithm provides a very high level of security, because the resulting OTP is unique for each transaction. However, its implementation requires strict discipline in key management and proper encryption or decryption processes so that it can function optimally. This system is designed for account user security to prevent data leaks, thereby minimizing the potential for crimes such as identity theft and fraud. The research results show that not a single OTP was repeated in the 10 transactions carried out. Each OTP code generated is unique and different from previous OTPs, both on successful and failed transactions, proving the effectiveness of the system. This website was created using Visual Studio Code to ensure a stable and efficient system implementation
References
W. Y. Pradana, M. Irwan, dan P. Nasution, “Keamanan Data Pribadi dalam Penggunaan E-Wallet terhadap Ancaman Cyber Crime,” J. Ekon. dan Bisnis, vol. 2, no. 2, hal. 345–348, 2024.
R. Ni’mah dan I. Yuliana, “E-Wallet: Sistem Pembayaran Dengan Prinsip Hifzul Maal,” J. Ekon. Syariah, vol. 5, no. 2, hal. 52–66, 2020, doi: 10.37058/jes.v5i2.2016.
D. F. Harseno, “Analisis Faktor-Faktor Yang Memengaruhi Penggunaan E-Wallet Di Indonesia,” ABIS Account. Bus. Inf. Syst. J., vol. 9, no. 4, 2021, doi: 10.22146/abis.v9i4.70384.
A. Sentimen, P. E. Dana, dan D. Gopay, “Analisis Sentimen Penguna E-Wallet Dana Dan Gopay Pada Twitter Menggunakan Metode Support Vector Machine (SVM),” vol. 17, no. x, hal. 323–332, 1978.
U. I. N. Maulana dan M. Ibrahim, “Halaman Sampul Fakultas Psikologi Universitas Islam Negeri Maulana Malik Ibrahim Malang 2020,” 2020.
N. E. Saragih, “Implementasi Algoritma One Time Pad pada(Nidia Enjelita Saragih ),” J. Ilm. MATRIK, vol. Vol.20 No., no. 3, hal. 31–40, 2018.
K. Sukmawati dan D. Kowanda, “Keputusan Penggunaan E-Wallet Gopay Berdasarkan Pengaruh Keamanan, Persepsi Kemudahan Dan Persepsi Manfaat,” J. Ilm. Multidisiplin, vol. 1, no. 05, hal. 66–72, 2022, doi: 10.56127/jukim.v1i05.481.
A. A. Permana, R. Taufiq, dan R. Destriana, “Implementasi Aplikasi Pengamanan Pesan Gambar Menggunakan Algoritma One Time Pad,” Proceeding SENDIU 2021, hal. 978–979, 2021.
W. D. A. N. Email, “Mengadopsi kode otp untuk memverifikasi akun aplikasi whatsapp dan email,” no. November, hal. 286–292, 2024.
C. Christian, S. H. Sitorus, dan I. Nirmala, “Implementasi Algoritma Rsa Dan One Time Password (Otp) Untuk Pengamanan Data Pengguna Dan Proses Transaksi Pada Website E-Commerce,” Coding J. Komput. dan Apl., vol. 11, no. 1, hal. 62, 2023, doi: 10.26418/coding.v11i1.58684.
H. Alam, A. K. Habibi, dan H. Widya, “Penggunaan Algoritma Vigenere Cipher Dan One Time Pad Untuk Keamanan Pesan Teks,” Semin. Nas. Tek. …, vol. 5, hal. 160–166, 2022.
O. Dakhi, M. Masril, R. Novalinda, J. Jufrinaldi, dan A. Ambiyar, “Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher,” INVOTEK J. Inov. Vokasional dan Teknol., vol. 20, no. 1, hal. 27–36, 2020, doi: 10.24036/invotek.v20i1.647.
Akhmad Fery Hasanudin dan A Basuki Babussalam, “Perlindungan Hukum Bagi Korban Kejahatan Phising Yang Menguras Saldo M-Banking,” J. Gagasan Huk., vol. 6, no. 01, hal. 16–29, 2024, doi: 10.31849/jgh.v6i01.18827.
S. Richiyanti, “Pengaruh dan Penanganan Cybercrime Dalam Perkembangan Teknologi Informasi,” Kodifikasi, vol. 2, no. 2, hal. 46–56, 2020.
T. Aprilia et al., “Pengaruh Keamanan Two Factor Authentication Terhadap Pencurian Data (Cyber Crime) Pada Media Sosial,” Pengaruh Keamanan Two Factor, vol. 2, no. 5, hal. 449–458, 2024, [Daring]. Tersedia pada: https://doi.org/10.5281/zenodo.11496678
F. Diani dan Y. Widhiyasana, “Enkripsi SMS dengan Menggunakan One Time Pad (OTP) dan Kompresi Lempel-Ziv-Welch (LZW),” J. Nas. Tek. Elektro dan Teknol. Inf., vol. 7, no. 3, hal. 3–8, 2018, doi: 10.22146/jnteti.v7i3.436.
R. Pratiwi, L. C. Utami, R. Bima Sakti, dan Triase, “Perancangan Keamanan Data Pesan Dengan Menggunakan Metode Kriptografi Caesar Cipher,” Bull. Inf. Technol., vol. 3, no. 4, hal. 367–373, 2022, doi: 10.47065/bit.v3i4.420.
O. K. Sulaiman, “Generate Pseudo-Random Numbers Linear-Feedback Shift Register ( LSFR ) Pada Kunci Algoritma One Time Pad ( OTP ),” Semin. Nas. Teknol. Komput. Sains, hal. 171–175, 2020.
Copyright (c) 2025 Sarifah Sarifah, Ilham Faisal, Imran Lubis

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the EXPLORER right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share (copy and redistribute the material in any medium or format) and adapt (remix, transform, and build upon the material) the work for any purpose, even commercially with an acknowledgement of the work's authorship and initial publication in EXPLORER.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in EXPLORER.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).