Willy Sudiarto Raharjo, Ignatia Dhian E.K. Ratri, Henry Susilo


Abstract — This paper describes a login system utilizing Two Factor Authentication and Zero Knowledge Proof using Schnorr NIZK. The proposed system is designed to prevent password leak when being sent over insecure network or when used in an untrusted devices. Zero Knowledge Proof is used  for maintaining the confidentiality of the password and Two Factor Authentication is used to secure login process on untrusted devices. The proposed system has been tested and initial results indicates that such system is able to secure the login process without leaking the user’s password.


Keywords— Authentication, Security, Two Factor Authentication, Password, Zero Knowledge Proof

Full Text:



(2010) Website Firesheep [Online]. Tersedia:

(2009) Website Proyek SSLStrip [Online]. Tersedia:

S. Renfro (2013) “Secure browsing by default” [Online]. Tersedia:

S. Schillace (2010) "Default https access for Gmail" [Online]. Tersedia:

N. Lidzborski (2014) “Staying at the forefront of email security and reliability: HTTPS-only and 99.978% availability” [Online]. Tersedia:

B. Möller, et al. (2014) “This POODLE Bites: Exploiting The SSL 3.0 Fallback” [Online]. Tersedia:

T. Duong (2011) “BEAST” [Online]. Tersedia:

B. Beurdouche, et al (Mei, 2015) “A Messy State of the Union: Taming the Composite State Machines of TLS” dalam IEEE Symposium on Security and Privacy [Online]. Tersedia:

D. Adrian, et al (Oktober, 2015) “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice” dalam 22nd ACM Conference on Computer and Communications Security (CCS ’15) [Online]. Tersedia:

N. Aviram, et al (Agustus, 2016) “DROWN: Breaking TLS using SSLv2” dalam 25th USENIX Security Symposium [Online]. Tersedia:

(2014) Website Heartbleed Bug [Online]. Tersedia:

(2017) Website SSL Pulse [Online]. Tersedia:

M. De Soete (2011), “Two-Factor Authentication,” dalam Encyclopedia of Cryptography and Security, Springer US, hal. 1341.

N. Shah (2011) “Advanced sign-in security for your Google account” [Online]. Tersedia:

Jimio (2013) “Getting started with login verification” [Online]. Tersedia:

A. Song (2011) “Introducing Login Approvals” [Online]. Tersedia:

Feige, U., et al. (1988) “Zero-knowledge proofs of identity” dalam Journal of Cryptology Vol 1, Issue 2, hal 77.

S. Goldwasser, et al (Desember 1985) “The knowledge complexity of interactive proof-systems” dalam STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing, hal. 291-304.

U. Feige, et al (Juni 1988), “Zero-knowledge proofs of identity” dalam Jurnal of Cryptology, Springer, 1: 77. doi:10.1007/BF02351717

T.N. Situngkir “Implementasi zero knowledge proof dengan feige fiat shamir dan quadratic linear congruential generator” Skripsi, Ilmu Komputer, Universitas Sumatera Utara, Medan, Indonesia, 2013

D. Raffo, “Digital certificates and the feige-fiat shamir zero knowledge protocol. France : Traineeship report, 2012.

J. Katz dan Y. Lindel, “Introduction to Modern Cryptography”, Boca Raton, FL: CRC Press, 2015.

J.S. Kraft, L.C. Washington, “An Introduction to Number Theory with Cryptography”, Boca Raton, FL: CRC Press, 2014

F. Hao (2016) “Schnorr NIZK Proof: Non-interactive Zero Knowledge Proof for Discrete Logarithm version 5” [Online]. Tersedia:

W.S. Raharjo dan D. Susanti, “Implementasi Zero Knowledge Proof Menggunakan Protokol Feige Fiat Shamir Untuk Verifikasi Tiket Rahasia” Jurnal ULTIMATICS UMN, Vol 2, No 2, 2015, hal 91-97.

M. Stamp, “Information Security: Principles and Practices” San Jose, CA: Wiley, 2011, hal 276.

J.S., Railton, K. Kleemola (2015) “London Calling: Two-Factor Authentication Phishing From Iran” [Online]. Tersedia: phishing/

J. Lang, et al (Februari, 2016) “Security Keys: Practical Cryptographic Second Factors for the Modern Web” dalam Financial Cryptography and Data Security 2016 [Online]. Tersedia:

B. Hill (Januari, 2017) “Security Key for safer logins with a touch” [Online]. Tersedia:

M. Coates (Juni, 2016) “Keeping your account safe” [Online]. Tersedia:

Neil H. (Februari, 1994) "The S/KEY One-Time Password System", Proceedings of the ISOC Symposium on Network and Distributed System Security, San Diego, CA

N. Haller, (1995) "The S/KEY One-Time Password System", RFC 1760 [Online]. Tersedia

L. Lamport (November, 1981) "Password Authentication with Insecure Communication" dalam Communications of the ACM 24.11 hal. 770-772

D. M'Raihi, et al (Desember, 2005) “HOTP: An HMAC-Based One-Time Password Algorithm” RFC 4226 [Online]. Tersedia

D. M'Raihi, et al (Mei, 2011) “TOTP: Time-Based One-Time Password Algorithm” RFC 6238 [Online]. Tersedia

(2017) Website Let’s Encrypt [Online]. Tersedia

(2017) Website Proyek Certbot [Online]. Tersedia

R. Nikhil (2013) “Two Factor Authentication Using Mobile Phones” dalam ASM International of E-Journal of Ongoing Research in Management and IT, INCON13 [Online]. Tersedia:

K.P., Kaliyamurthie dan D. Parameswari (Desember 2011) “Two Factor Authentication Using Mobile Phones” International Journal of Computer Trends and Technology (IJCTT), vol 2, issue 2 number 4 [Online]. Tersedia:

F. Aloul, et al (Mei, 2009) “Two factor authentication using mobile phones” 2009 IEEE/ACS International Conference on Computer Systems and Applications.



  • There are currently no refbacks.

Copyright (c) 2017 Jurnal Teknik Informatika dan Sistem Informasi