Huzain Azis(1*); Farniawati Fattah(2);

(1) Universitas Muslim Indonesia
(2) Universitas Muslim Indonesia
(*) Corresponding Author



Payment transactions developed along with technological developments, now days technology supports digital payment, each type of digital transaction has its own security services,  this study focus on the analysis of security services (confidentiality, integrity and availability) using the Penetration Testing method on magnetic stripe cards as a payment transaction playground facility, then comparing security services to the Radio Frequency Identification (RFID) electronic transaction tool. The results of this study are RFID electronic transaction cards that provide a more complete security service as an electronic payment transaction.


electronic payment transaction; magnetic stripe; radio frequency identification (RFID); penetration testing; security services


Full Text:


Article Metrics

Abstract view: 861 times
PDF view: 324 times

Digital Object Identifier




H. Azis, “Penerapan Modifikasi Lack Steganography Dan Layanan Message Authentication Code Pada Komunikasi Multimedia,” 2013.

Y. Salim and H. Azis, “Metode Digital Watermark Pada File Penelitian Dosen,” Ilk. J. Ilm., vol. 9, no. 2, pp. 161–166, 2017.

F. Muharram, H. Azis, and A. R. Manga, “Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES),” Pros. Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 3, no. 2, pp. 112–115, 2018.

W. C. Easttom, Computer Security Fundamentals, 3rd ed. United States of America: PEARSON, 2011.

C. Meijer and R. Verdult, “Ciphertext-only cryptanalysis on hardened Mifare classic cards,” Proc. ACM Conf. Comput. Commun. Secur., vol. 2015-Octob, pp. 18–30, 2015.

W. D. Wallis, Mathematics in the Real World. London: Birkhausher, 2013.

R. Verdult, “A Toolbox for RFID Protocol Analysis,” CCS’15, 2009.

I. B. Ryzhkov and O. N. Isaev, “Current Status and Trends in Cone Penetration Testing of Soil,” Springer Sci. Media New York, vol. 52, no. 3, pp. 31–32, 2015.

G. Weidmen, Penetration Testing - A hands-on introduction to Hacking.pdf. USA: No Starch Press, Inc., 2014.

S. P. Oriyano, CEHv9 Certified Ethical Hacker Version 9 Study Guide. 2016.

S. A. Rahalkar, Certified Ethical Hacker ( CEH ) Foundation Guide. 2016.

Silicon Labs, Magnetic Stripe Reader. 2008.

Magtek, “Dimensions - Financial Transaction Cards Magnetic Stripe Encoding - Financial Transaction Cards Card Data Format - Track 1 Card Data Format - Track 2 Card Data Format - Track 3 ( ISO 4909 ),” MagTek Inc. P/N 99800004 Rev. 1.03 11/0, no. Cvv, pp. 2–3, 2011.

R. Want, “An Introduction to RFID,” IEEE CS IEEE ComSoc, vol. 4, no. 8, pp. 25–33, 2016.


  • There are currently no refbacks.

Copyright (c) 2019 Huzain Azis, Farniawati Fattah

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 ILKOM Jurnal Ilmiah indexed by


ILKOM Jurnal Ilmiah
ISSN 2548-7779
Published by Teknik Informatika Fakultas Ilmu Komputer Universitas Muslim Indonesia
W :
E :

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0