NPWP ENCRYPTION USES A COMBINATION OF ONE TIME PAD ALGORITHM AND EXCLUSIVE-OR OPERATION
Abstract
Nomor Pokok Wajib Pajak (NPWP) is the 20 distinct code characteristics that are confidential only to the taxpayer when it comes
to making tax transactions. The many tax payers who use NPWP others in their business activities make NPWP a very important
aspect of maintaining confidentiality and the authenticity of their data. Therefore, solutions are needed that can be used to make
the necessary information secure. Cryptography involves the secret science of code writing using certain mathematical models.
The study discusses NPWP encryption using a combination algorithm One Time Pad (OTP) and an operation Exclusive-OR
(XOR). The encryption process involves generating random numbers for an OTP algorithm, after which it is followed by an XOR
operation. The key on XOR encryption is generated from an algorithm generating random numbers Blum Blum Shub. Encryption
keys generated as much as the number of plaquic characters. The encryption keys used by each character would vary and not
occur again. Therefore, ciphertext results from an encrypted process using an OTP algorithm and an XOR operation more
complicated and more difficult to decipher by crypts.
References
Ariyus, Doni. (2008) Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi. Andi. Yogyakarta.
Batten, L. M. (2012). Public Key Cryptography Applications and Attacks. Netherlands: IEEE Press.
Das, A. (2013). Computational Number Theory. Boca Raton: Taylor & Francis Group.
Halim, Abdul, Icuk Rangga Bawono, dan Amin Dara. (2016). Perpajakan, Edisi Kedua. Salemba Empat. Jakarta.
Irawan, W. H. (2014). Pengantar Teori Bilangan. Malang: UIN-Malang Press.
Kumar, D. S., Suneetha, C. H., & Chandrasekhar, A. (2012). A Block Cipher Using Rotation and Logical XOR Operations. IJCSI International Journal of Computer Science Issues, 8(6).142-147.
Munir, Rinaldi. (2006). Kriptografi. Informatika. Bandung.
Munir, Rinaldi. (2019). Kriptografi edisi dua. Informatika. Bandung.
Sanjaya, M. B. (2017). Perancangan dan Implementasi Random Number Blum Blum Shub pada Dynamic Cell Spreading untuk Pengamanan Berkas. Seminar Nasional Multi Disiplin Ilmu.
Sidik, A. P., Efendi, S., dan Suherman, S. (2019). Improving One-Time Pad Algorithm on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms. Journal of Physics: Conference Series 1235(1).
Stallings, W. (2003). Cryptography and Network Security. New Jersey: Pearson Education.
Trisnawati, T. T., Yurinanda, S., Syafmen, W & Multahadah. C. (2023). Penerapan Algoritma Rivest-Shamir-Adleman (RSA) pada Enkripsi Uniform Resource Locator (URL) Website untuk Keamanan Data. EULER: Jurnal Ilmiah Matematika, Sains dan Teknologi, 11(2). 205-215.
Undang- Undang Nomor 28 tahun 2007 Perubahan Ketiga atas Undang-Undang Nomor 6 Tahun 1983 tentang Ketentuan Umum dan Tata Cara Perpajakan.
https://mediasuara.com/2020/08/18/jangan-gunakan-npwp-orang-lain-atau-faktur-tbts-untuk-kegiatan-usaha-anda/ diakses pada tanggal 10 Maret 2023.
- View 113 times Download 113 times PDF
Copyright (c) 2024 Margaretha Pasaribu, SHERLI YURINANDA, NIKEN RARASATI
This work is licensed under a Creative Commons Attribution 4.0 International License.