Documente Academic
Documente Profesional
Documente Cultură
Departement of Multimedia Creative, Electronic Engineering Polytechnic Institute of Surabaya, Surabaya, Indonesia
erikarahmawatiaziz@gmail.com, kakamariska@gmail.com, aziz.addam@gmail.com, dhoto@pens.ac.id,
fardani@pens.ac.id, mochamadmobed@gmail.com, amang@pens.ac.id
Abstract—Digital signature is a term that use a key pair of Using biometric technology, people can doing
user for sign and verify a document. People can create their authentication with simply process. People no need to remind
digital signature using biometric technology. Biometric word or number when they want to verify them self digitally.
technology is a concept that allows people to doing an digitally One of biometric technology in demand is fingerprint.
authentication using their bodies, for example by using their Biometric fingerprint has now been applied in security system
fingerprint. Now, fingerprint biometric technology system was access, such as is for access to the door. Even,
available in some smartphone product, so that allows user to now smartphone technology also use
unlocking their smartphone only by scanning their fingerprint fingerprint authentication system for unlocking the device. It’s
into smartphone’s fingerprint sensor. The combination of that’s
allows people to unlocking their smartphone only by scanning
all technology (digital signature, biometric fingerprint,
smartphone with fingerprint sensor) can arise an innovation to
their fingerprint into their smartphone fingerprint sensor. In this
make a system that can create a digital signature only using paper, we will explain about the integrated system between
fingerprint on smartphone. This system applied to a method of fingerprint technology and fingerprint sensor technology
signing document digitally. When user sending a document to on smartphone that would be applied in the digital signature
other, user who send the document have to put their fingerprint concept. The goal of this paper is to develop a system that
into smartphone fingerprint sensor and the the document will be allows people to digitally sign document safely by simply
encrypted. Then, user who receive the encrypted message will scanning their fingerprint into their smartphone’s fingerprint
decrypt the message using public key of user who as a sender. In sensor.
this case, fingerprint is a medium to call the value of user private
key from the database. Key pair algorithm for this system is II. ADOPTED ALGORITHM
using RSA algorithm.
A. Biometric Fingerprint
Keywords— Digital Signature, Biometric Fingerprint,
Ecryption-Decryption. Biometric fingerprint is a personal authentication technique
based on their polar fingerprint. Fingerprint authentication
I. INTRODUCTION techniques have a little possibility to being attacked by
someone who did not have an access to the privacy. This
In the digital era, people’s digital authentication system is technique was safe and cannot be attacked by others because
something familiar. Digital authentication of a person has everyone has different fingerprint polar pattern though they are
been done using a password, token, or PIN. However, a twins. Fingerprint authentication allows people to verify them
self with simply process. People only need to put their
authenticating with that technique is not safe because it
fingerprint into fingerprint scanner when they want to
susceptible to stolen by others and allows people to get access
authenticate themselves. This technique assumed better than
to our privacy. Another technique to identifying people authentication technique such as password, PIN, or token that
digitally is using biometric technology. Biometric technology requires people to remember many word and counts.
analyze person through their unique feature such as their face,
eyes, fingerprint, and many more. Biometric technology also B. Digital Signature
sustain to doing person identifying according to their smell,
voice, signature, and the other person unique feature. The digital signature system uses a key pairs for signatures
and verification that called private key and public key. The key
Excellence system of biometric is this system allows people to
pairs have values that are different from each other. Signatures
authenticate them self securely because the data could not be
process on digital signature system using private key and
stolen, shared, duplicated, or lost [1]. verification process using public key. A key pairs that has
different value was referred to asymmetric key pairs [2]. Using
235
decryption process and the implementation of generating Explainations :
digital signature using biometric fingerprint on smartphone. A : User A S : Signature
B : User B PkA : Public Key User A
M : Message SkA : Private Key User A
A. Encryption Decryption System on Server C : Chipertext PkB : Public Key User B
E : Encryption SkB : Private Key User B
D : Decryption T/F : True/False
236
TABLE I. SERVER SPESIFICATION time for doing digital signature using fingerprint on
Device Spesification
smartphone is due to AES algorithm usage.
Device Spesification
Android Version 6.0.1
Fig. 6. Decryption process on server side
CPU Hexa-core Max 1.8GHz
Although this system using a symmetric cryptography
RAM 2.00 GB which is the encryption and decryption process was using a
Supported sSensors Fingerprint symmetric key, but in the practice, receiver who want to
decrypt an encrypted file must have a public key of sender.
According to figure 6, decryption process was done by using
With those specification device, time that needed for doing public key that generated by RSA algorithm. If receiver did
encryption is 15 second. 15 second time is a time for process not have a public key of sender, the receiver would never
the load key or key generating key for encryption and signature doing decryption process on document.
and also process to encrypting the file. The use of this short
237
V. CONCLUSION Science, Engineering and Information Technology (IJCSEIT). 2(1): 57-
65.
In encryption and decryption, the choices of key-length [2] Isobe, Y, et al. 2001. Development of Personal Authentication System
influence the filesize of encrypted file and also the long-time of Using Fingerprint with Digital Signature Technologies. Proceedings of
encryption process. Fingerprint program for smartphone can be the 34th Hawaii International Conference on System Science. 06 Januari
used to authenticate user. The user id of fingerprint cannot be 2001, Maui, Hawaii. pp. 1-9.
reach because it’s stored on a secure system of smartphone. [3] Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure
Fingerprint on smartphone can perform encryption and Data Sensor In Environmental Monitoring System Using Attribute-
Based Encryption With Encryption”, International Journal on Advanced
decryption process by connected to the server and call the PHP Science, Engineering and Information Technology, Vol 7, pp.609-624,
program functions. In this system, fingerprint is as a medium to 2017.
perform the process of encryption and decryption and create a [4] Yadav, Prasant Singh. Sharma, Pankaj. Yadav, Dr K.P. 2012.
signature on the document. Implementation Of Rsa Algorithm Using Elliptic Curve Algorithm For
Security And Performance Enhancement. International Journal of
Scientific & Technology Research 1(4):102-105.
ACKNOWLEDGMENT [5] Sadikin, Mohamad Ali. Wardhani, Rini Wisnu. 2016. Implementation of
The author would like to thanks to ministry of Research, RSA 2048-bit and AES 256-bit with Digital Signature for Secure
Technology, Higher Education of Indonesia. Electronic Health Record Application.
[6] Zhang, Xinmiao. Parhi, K Keshab. 2004. High-Speed VLSI
Architectures for the AES Algorithm. High-Speed VLSI Architectures
REFERENCES for the AES Algorithm. 12(9):957-967.
[1] Mudholkar, Smita, S. Shende, Pradnya, M. Sarode, Milind, V. 2012.
Biometrics Authentication Technique for Intrusion Detection System
Using Fingerprint Recognition. International Journal of Computer
238