Implementasi Metode MD2 Untuk Autentikasi Hasil Citra Rontgen (Ronsen)
Abstract
Implementation is considered as the main form and a crucial stage in the policy-making process or the implementation of a carefully and detailed plan, that without effective implementation, policy decisions will not be successfully executed. Implementation can also be interpreted as a series of actions carried out by various policy implementers with supporting means based on established rules to achieve predetermined goals. Authentication can also be interpreted as a very important thing in delivering information, both in the form of data or text messages. This is because authentication is needed for the authenticity of the contents of the data, with the existence of authentication, the use of authentication systems is expected to form a specific system in that field, one example is the implementation of X-ray image results where the authenticity of the data must be truly real with the results diagnosed by the doctor on the patient. The Message Digest Algorithm 2 (MD2) method can be interpreted as a cryptographic hash function developed by Ron Rivest in 1989, this algorithm is optimized using an 8-bit computer. MD2 is actually specified in RFC 1319 and the MD2 algorithm produces a hash value that is 18 bits in size and accepts input messages with an unspecified length. With this method, it is expected to solve problems that often occur in X-ray results so that the process of applying X-ray image results with doctor's diagnosis is tested for its authenticity value based on the MD2 method, then an application is built using the "Hasher Lite" application to prove the results of the whole process.
Downloads
References
P. A. Md and D. A. N. Md, “Perbandingan algoritma md2, md4, dan md5,” perbandingan algoritma MD2, MD4, dan MD5, pp. 1–15.
F. Muller, “The MD2 Hash Function Is Not One-Way,” The MD2 Hash function is Not One-Way, pp. 214–229, 2010.
B. A. B. Ii, A. K. Implementasi, and P. Implementasi, “No Title,” pp. 12–75, 1990.
R. Sadikin, “kriptografi untuk keamanan jaringan,” in kriptografi untuk keamanan jaringan, T. A. Prabawati, Ed. Yogyakarta: C.V ANDI OFFSET, 2012.
M. K. Emy Setyaningsih,S.Si., “Kriptografi dan implementasi menggunakan matlab,” in Kriptografi dan implementasi menggunakan matlab, Nikodemus WK, Ed. Yogyakarta, 2015, p. 3.
M. ir.yusuf kurniawan, Kriptografi keamanan internet dan jaringan telekomunikasi. bandung: informatika bandung, 2004.
M. K. T.Sutoyo, S.Si., “Teori pengolahan citra digital,” in Teori pengolahan citra digital, Benedicta Rini W, Ed. Yogyakarta: Andi Offset, 2009, p. 9.
Darma Putra, Pengolahan Citra Digital. Yogyakarta, 2010.
F. Sidik and H. Sunandar, “Perancangan Aplikasi Pengolahan Citra Meningkatkan Kualitas Foto Rontgen Menggunakan Metode Median Filtering,” JURIKOM (Jurnal Riset Komputer), vol. 3, no. 6, pp. 38–41, 2016.
Yusfzal, “Kode Autentikasi Hash pada Pesan Teks Berbasis Android,” Kode Autentikasi Hash pada Pesan Teks Berbasis Android, pp. 1–9, 2018.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Metode MD2 Untuk Autentikasi Hasil Citra Rontgen (Ronsen)
Pages: 56-63
Copyright (c) 2023 Mahanum Harahap

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).