Implementation of RSA Algorithm For Securing Patient Data using QR Code Technology

Adi Fajaryanto Cobantoro, Fadhlullah Yoga Wicahyono, Ismail Abdurrozzaq Zulkarnain

Abstract


The advancement of digital technology demands improved security systems, especially in protecting users’ personal data. One sector that heavily relies on data confidentiality is the healthcare sector, where patient information must be safeguarded from potential leaks and misuse. This study aims to implement the RSA (Rivest-Shamir-Adleman) cryptographic algorithm in the patient registration system at the dental clinic of Regunawati Cahyaningsih. RSA was chosen for its asymmetric nature and its ability to ensure data security through the use of public and private key pairs. Additionally, this study integrates QR Code technology as a medium for accessing encrypted data, streamlining and accelerating the data authorization process. The encryption process is applied to important information such as NIK, name, address, phone number, and medical records before being stored in the database. Based on the testing results, the system demonstrated excellent performance in terms of functionality, algorithm accuracy, and display speed. Whitebox testing confirmed the accuracy of the RSA algorithm implementation with 100% accuracy. Performance testing using the Largest Contentful Paint (LCP) metric showed very fast load times, ranging from 0.5 to 2.3 milliseconds, with a performance score of 100, making the system highly responsive and optimal in terms of user experience. Therefore, RSA is proven to be effective in enhancing patient data security and maintaining confidentiality within a web-based clinical information system.

Keywords: Rivest-Shamir-Adleman Algorithm, Patient Data Security, Whitebox Testing, QR Code


Full Text:

PDF

References


B. Anwar, N. B. Nugroho, J. Prayudha, and A. Azanuddin, “Implementasi Algoritma RSA Terhadap Keamanan Data Simpan Pinjam,” Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), vol. 18, no. 1, p. 30, Feb. 2019, doi: 10.53513/jis.v18i1.100. https://doi.org/10.53513/jis.v18i1.100

S. Sutejo, “Implementasi Algoritma Kriptografi Rsa (Rivest Shamir Adleman) Untuk Keamanan Data Rekam Medis Pasien,” INTECOMS: Journal of Information Technology and Computer Science, vol. 4, no. 1, pp. 104–114, Jun. 2021, doi: 10.31539/intecoms.v4i1.2437. https://doi.org/10.31539/intecoms.v4i1.2437

R. Zhang and Z. Wang, “Family cohesion moderates the inverted U-shaped curve between resting RSA and children’s empathy,” Psychoneuroendocrinology, vol. 172, p. 107231, Feb. 2025, doi: 10.1016/j.psyneuen.2024.107231. https://doi.org/10.1016/j.psyneuen.2024.107231

Tarisa Auliya Ramadhani, A. Fajaryanto Cobantoro, and S. Sugianti, “Implementasi Algoritma Advanced Encryption Standard 128 untuk Pengamanan Database Sistem Registrasi Pasien,” Jurnal Informatika Polinema, vol. 10, no. 4, pp. 521–526, Aug. 2024, doi: 10.33795/jip.v10i4.5619. https://doi.org/10.33795/jip.v10i4.5619

Ni Kadek Sriyulianti, S. ngurah Ardhya, and M. jodi Setianto, “Kautsar, T. R. (2023). Kajian Literatur Terstruktur Terhadap Kebocoran Data Pribadi Dan Regulasi Perlindungan Data Pribadi. APJII. (2023). Survei APJII Pengguna Internet di Indonesia Tembus 215 Juta Orang. APJII. https://apjii.or.id/berita/d/survei-apjii-,” Jurnal Ilmu Hukum Sui Generis, vol. 4, no. 3, Apr. 2025, doi: 10.23887/jih.v4i3.5035. https://doi.org/10.23887/jih.v4i3.5035

I. Firdaus, “Upaya Perlindungan Hukum Hak Privasi Terhadap Data Pribadi dari Kejahatan Peretasan,” Jurnal Rechten : Riset Hukum dan Hak Asasi Manusia, vol. 4, no. 2, pp. 23–31, Dec. 2022, doi: 10.52005/rechten.v4i2.98. https://doi.org/10.52005/rechten.v4i2.98

A. R. Pradina, R. G. Tayibnafis, and V. Sevilla, “Signifikansi Informasi Isu Kebocoran Data Privasi Tokopedia Terhadap Perilaku Fandom,” Jurnal Pustaka Komunikasi, vol. 5, no. 2, pp. 331–343, Sep. 2022, doi: 10.32509/pustakom.v5i2.2186. https://doi.org/10.32509/pustakom.v5i2.2186

Vanesha Marcelliana et al., “Penerapan Perlindungan Konsumen Terhadap Nasabah PT. Bank Syariah Indonesia Dalam Kasus Kebocoran Data Nasabah,” Deposisi: Jurnal Publikasi Ilmu Hukum, vol. 1, no. 2, pp. 180–194, Jun. 2023, doi: 10.59581/deposisi.v1i2.577. https://doi.org/10.59581/deposisi.v1i2.577

A. H. Satria Nusantara, I. Kahirul Umam, and M. Lubis, “Jaminan Informasi dan Keamanan yang Lebih Baik: Studi Kasus BPJS Kesehatan,” NUANSA INFORMATIKA, vol. 18, no. 2, pp. 120–127, Jul. 2024, doi: 10.25134/ilkom.v18i2.202. https://doi.org/10.25134/ilkom.v18i2.202

D. Singh and S. Kumar, “Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps,” Expert Syst Appl, vol. 274, p. 126883, May 2025, doi: 10.1016/j.eswa.2025.126883. https://doi.org/10.1016/j.eswa.2025.126883

M. Rahmani, A. Nitaj, and M. Ziane, “A novel cryptanalytic attack on a family of RSA-like cryptosystems,” Discrete Math, vol. 349, no. 1, p. 114660, Jan. 2026, doi: 10.1016/j.disc.2025.114660. https://doi.org/10.1016/j.disc.2025.114660

H. Huang and Z. Han, “Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform,” Results Phys, vol. 56, p. 107282, Jan. 2024, doi: 10.1016/j.rinp.2023.107282. https://doi.org/10.1016/j.rinp.2023.107282

A. F. Cobantoro, M. B. Setyawan, and H. Oktavianto, “Rekayasa Aplikasi Eposal Menggunakan Algoritma Base64 Untuk Menyimpan Data Pengguna,” Jurnal Komtika (Komputasi dan Informatika), vol. 7, no. 1, pp. 31–38, May 2023, doi: 10.31603/komtika.v7i1.8711. https://doi.org/10.31603/komtika.v7i1.8711

Y. Litanianda, D. April Riyanto, A. Prasetyo, A. Fajaryanto Cobantoro, and I. Abdurrozaq Zulkarnain, “Identifikasi Performa Algoritma Fuzzy Mamdani Sebagai Kendali Proses Koagulasi pada Internet of Thing Pembuatan Tahu,” bit-Tech, vol. 7, no. 2, pp. 608–617, Dec. 2024, doi: 10.32877/bt.v7i2.1972. https://doi.org/10.32877/bt.v7i2.1972

H. Pramudya, A. Fajaryanto Cobantoro, and J. Karaman, “Implementasi Algoritma Selection Sort Dalam Sistem Absensi Siswa Untuk Pengurutan Keaktifan Berdasarkan Kehadiran,” JATI (Jurnal Mahasiswa Teknik Informatika), vol. 9, no. 2, pp. 2887–2895, Mar. 2025, doi: 10.36040/jati.v9i2.13212. https://doi.org/10.36040/jati.v9i2.13212

D. T. Tobing, “Implementasi Algoritma Rivest Shamir Adleman (RSA) Untuk Keamanan Data Rekam Medik Penyakit Pasien Rumah Sakit,” Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer, vol. 2, no. 2, pp. 65–73, May 2024, doi: 10.62866/jutik.v2i2.131. https://doi.org/10.62866/jutik.v2i2.131

S. Kinney, “The RSA Encryption and Decryption Command Suite,” in Trusted Platform Module Basics, Elsevier, 2006, pp. 207–221. doi: 10.1016/B978-075067960-2/50017-8. https://doi.org/10.1016/B978-075067960-2/50017-8




DOI: https://doi.org/10.21107/nero.v10i1.30052

Refbacks

  • There are currently no refbacks.


Copyright (c) Adi Fajaryanto Cobantoro, Fadhlullah Yoga Wicahyono, Ismail Abdurrozzaq Zulkarnain