Implementasi Algoritma MD5 Pada Sistem MBKM Dan Di Universitas Bina Insan
Abstract
The problem in this study is that in the implementation of the MBKM program there are still many weaknesses and shortcomings, including the fact that currently Bina Insan University does not have its own system that can be used as an information media in providing the best service to students, the current system needed is a system with the application of the Md5 algorithm, the MD5 algorithm is one of the algorithms used to find out that the message sent has not changed while on the network, this system provides registration for each existing independent campus program so that all data will be centralized in one system, on the other hand, the MBKM section also requires a system that can convert credits to programs that have been followed, where in the program each student is given the right to get a conversion of 20 credits or the equivalent of one semester. The results of this study are that with this application, it can facilitate the MBKM in processing and converting the MBKM program, as well as speeding up and streamlining the registration process and converting MBKM program values and providing information to students and lecturers about MBKM.
References
P. S. Nugroho and E. Aribowo, “Pengembangan Modul Enkripsi Dan Dekripsi Pada Php,” vol. 2, pp. 333–341, 2014.
M. D. Irawan and S. A. Simargolang, “Implementasi E-Arsip Pada Program Studi Teknik Informatika,” J. Teknol. Inf., vol. 2, no. 1, p. 67, 2018, doi: 10.36294/jurti.v2i1.411.
S. Haryati, A. Sudarsono, and E. Suryana, “Implementasi Data Mining Untuk Memprediksi Masa Studi Mahasiswa Menggunakan Algoritma C4.5 (Studi Kasus: Universitas Dehasen Bengkulu),” J. Media Infotama, vol. 11, no. 2, pp. 130–138, 2015.
A. . Rosa and M. Shalahuddin, Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek. Bandung: Informatika, 2015.
D. Agung, “Perancangan Sistem Informasi Penjualan Barang Bekas pada Relasi Komputer Kota Lubuklingggau Berbasis Web Mobile,” Lubuklinggau, 2016.
M. . Nabawi, “Aplikasi pendukung Proses Distribusi Beras Rumah Tangga Miskin menggunakan Metode Profil Matching,” 2015.
S. Wahyuni, “Aplikasi Pengolahan Data Nilai pada SMA Negeri Jayaloka berbasis Web,” 2015.
Rusdianto and A. Qashlim, “Implementasi Algoritma Md5 Untuk Keamanan Dokumen,” J. Ilm. Ilmu Komput., vol. 2, no. 2, pp. 10–16, 2016.
B. Sinaga, M. Abdul Rohim, and E. Bu’ulolo, “Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital,” Resolusi Rekayasa Tek. Inform. dan Inf., vol. 2, no. 5, pp. 187–194, 2022, doi: 10.30865/resolusi.v2i5.331.
A. Sofwan, A. Budi P, and T. Susanto, “Aplikasi Kriptografi Dengan Algoritma Message Digest 5 (MD5),” Transmisi, vol. 8, no. 1, pp. 22–27, 2006.
Jogiyanto, Analisis Dan Desain. Yogyakarta: Andi, 2011.
I. Mulhim, Desain Web Untuk Desktop dan Mobile dengan Responsive Web Design. Palembang: Maxicom, 2014.
E. P. Utomo, Mobile Web Programming. Yogyakarta: 2010, 2010.
A. Kadir, Pemrograman Database MySQL untuk pemula. Yogyakarta: Mediakom, 2013.
MADCOMS, Aplikasi Web Database Dengan Dreamweaver dan PHP–MySQL. Yogyakarta: C.V ANDI OFFSET, 2011.
Rosa A.S M. Shalahuddin, Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek. Bandung: Informatika, 2013.
R. A.S and M. Shalahuddin, Rekayasa Perangkat Lunak Terstruktur Dan Berorientasi Objek Edisi Revisi. Bandung: Informatika, 2019.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma MD5 Pada Sistem MBKM Dan Di Universitas Bina Insan
Pages: 21 - 28
Copyright (c) 2024 Alvin Anggardha, Fido Rizki, Joni Karman

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).