Implementasi Metode MD2 Untuk Autentikasi Hasil Citra Rontgen (Ronsen)


  • Mahanum Harahap * Mail Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Implementasi; Autentikasi; Metode Message Digest Algorithm 2 (MD2)

Abstract

Implementation is considered as the main form and a crucial stage in the policy-making process or the implementation of a carefully and detailed plan, that without effective implementation, policy decisions will not be successfully executed. Implementation can also be interpreted as a series of actions carried out by various policy implementers with supporting means based on established rules to achieve predetermined goals. Authentication can also be interpreted as a very important thing in delivering information, both in the form of data or text messages. This is because authentication is needed for the authenticity of the contents of the data, with the existence of authentication, the use of authentication systems is expected to form a specific system in that field, one example is the implementation of X-ray image results where the authenticity of the data must be truly real with the results diagnosed by the doctor on the patient. The Message Digest Algorithm 2 (MD2) method can be interpreted as a cryptographic hash function developed by Ron Rivest in 1989, this algorithm is optimized using an 8-bit computer. MD2 is actually specified in RFC 1319 and the MD2 algorithm produces a hash value that is 18 bits in size and accepts input messages with an unspecified length. With this method, it is expected to solve problems that often occur in X-ray results so that the process of applying X-ray image results with doctor's diagnosis is tested for its authenticity value based on the MD2 method, then an application is built using the "Hasher Lite" application to prove the results of the whole process.

Downloads

Download data is not yet available.

References

P. A. Md and D. A. N. Md, “Perbandingan algoritma md2, md4, dan md5,” perbandingan algoritma MD2, MD4, dan MD5, pp. 1–15.

F. Muller, “The MD2 Hash Function Is Not One-Way,” The MD2 Hash function is Not One-Way, pp. 214–229, 2010.

B. A. B. Ii, A. K. Implementasi, and P. Implementasi, “No Title,” pp. 12–75, 1990.

R. Sadikin, “kriptografi untuk keamanan jaringan,” in kriptografi untuk keamanan jaringan, T. A. Prabawati, Ed. Yogyakarta: C.V ANDI OFFSET, 2012.

M. K. Emy Setyaningsih,S.Si., “Kriptografi dan implementasi menggunakan matlab,” in Kriptografi dan implementasi menggunakan matlab, Nikodemus WK, Ed. Yogyakarta, 2015, p. 3.

M. ir.yusuf kurniawan, Kriptografi keamanan internet dan jaringan telekomunikasi. bandung: informatika bandung, 2004.

M. K. T.Sutoyo, S.Si., “Teori pengolahan citra digital,” in Teori pengolahan citra digital, Benedicta Rini W, Ed. Yogyakarta: Andi Offset, 2009, p. 9.

Darma Putra, Pengolahan Citra Digital. Yogyakarta, 2010.

F. Sidik and H. Sunandar, “Perancangan Aplikasi Pengolahan Citra Meningkatkan Kualitas Foto Rontgen Menggunakan Metode Median Filtering,” JURIKOM (Jurnal Riset Komputer), vol. 3, no. 6, pp. 38–41, 2016.

Yusfzal, “Kode Autentikasi Hash pada Pesan Teks Berbasis Android,” Kode Autentikasi Hash pada Pesan Teks Berbasis Android, pp. 1–9, 2018.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Metode MD2 Untuk Autentikasi Hasil Citra Rontgen (Ronsen)

Dimensions Badge
Article History
Published: 2023-02-27
Abstract View: 452 times
PDF Download: 324 times
Section
Articles