Pengamanan Kunci Pintu Brankas Menggunakan Kriptografi One Time Pad (OTP) Berbasis Android
Abstract
A safe is a place used to store valuable items. Generally, safes use buttons to open the door. However, using buttons that only require entering a password is considered less secure. Therefore, a device has been created to enhance the security of the entered password. The device utilizes Arduino as the central data processing unit for user input and an Android smartphone as the device for entering the password. The security is implemented using the cryptographic technique known as One Time Pad, where the user is prompted to input the password to be used. During the password storage process, the password is encrypted before being stored. To use it, the user simply enters the stored password into the system. If the device is forcefully tampered with, a thief attempting to retrieve the password will be unable to understand the stored password within the device, as it has undergone encryption. With this dual security measure in place, it is expected that the safe will be even more secure.
References
E. C. Setianingrum and B. E. Purnama, “SISTEM PENGAMAN BRANKAS DENGAN MENGGUNAKAN HANDPHONE BERBASIS MIKROKONTROLER AT89S51,” in Seminar Riset Unggulan Nasional Informatika dan Komputer FTI UNSA, 2013, pp. 1–7.
A. Z. Hasibuan, H. Harahap, and Z. Sarumaha, “Penerapan Teknologi RFID Untuk Pengendalian Ruang Kelas Berbasis Mikrokontroler,” Jutikomp, vol. 1, no. 1, pp. 71–77, 2019.
M. S. Asih, A. Z. Hasibuan, and N. I. Syahputri, “Pendingin Otomatis Akuarium Menggunakan Mikrokontroler,” Jutikomp, vol. 1, no. 1, pp. 66–70, 2019.
S. F. Pane, I. H. Hardy, and E. C. Sujadi, Pengembangan Smart Conveyor Dengan Arduino (Menggunakan GPS Tracking Berbasis Android). Bandung: Buku Pedia, 2022.
H. Kurniadi, “Implementasi Algoritma Kriptografi Elgamal Untuk File Citra 2 Dimensi,” Universitas Brawijaya, Malang, 2015.
M. Sholeh and J. V Hamokwarong, “Aplikasi Kriptografi Dengan Metode Vernam Cipher Dan Metode Permutasi Biner,” Momentum, vol. 7, no. 2, pp. 8–13, 2011.
Copyright (c) 2023 Munjiat Setiani Asih, Ade Zulkarnain Hasibuan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the EXPLORER right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share (copy and redistribute the material in any medium or format) and adapt (remix, transform, and build upon the material) the work for any purpose, even commercially with an acknowledgement of the work's authorship and initial publication in EXPLORER.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in EXPLORER.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).






.png)















