Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen


  • Dermawan Lumban Toruan * Mail Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Cryptography; Document Files; SHA-1

Abstract

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.

Downloads

Download data is not yet available.

References

K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,” Creat. Inf. Technol. J., vol. 1, no. 1, p. 57, 2018.

Doroty L, Satoto K I, Nurhayati O D, PERANCANGAN IMPLEMENTASI SISTEM INFORMASI PERPUSTAKAAN DIPROGRAM STUDI TEKNIK LINGKUNGAN FAKULTAS TEKNIK UNDIP Vol.2, No.4, Oktober 2014 (e-ISSN:2338-0403)

M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya menggunakan MATLAB. Yogyakarta: ANDI, 2015.

Rifki Sadikin, Kriptografi untuk keamanan jaringan dan implementasi dalam Bahasa Java. Yogyakarta: ANDI, 2012.

Dony Ariyus, PENGANTAR ILMU KRIPTOGRAFI Teori Analisis & Implementasi. Yogyakarta, 2008.

Dimaz A Wijaya, MENGENAL BITCOIN & CRYPTOCURRENCY. Medan, 2016.

R. Prasetyo and A. Suryana, “Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 5, no. 2, p. 61, 2018.

Sugiartowo, Ambo S N, “Implementasi Simulasi Media Pembelajaran Rangkaian Kombinasional Berbasis Kolaburasi Multimedia Simulator Dan Pemograman Delphi,”Junal Informatika Upgris, Vol. 4, No. 2, (2018) P/E-ISSN: 2460-4801/2447-6645 170

Pabokory F.N Astuti I.F Kridalaksana A.H IMPLEMENTASI KRIPTOGRAFI PENGAMANAN DATA PADA PESAN TEKS, ISI FILE DOKUMEN, DAN FILE DOKUMEN MENGGUNAKAN ALGORITMA ADVANCED ENCRYPTION STANDARD. Vol. 10 No. 1 Februari 2015

Crystanti C.Y, Wardati I.U, Sistem Pengolahan Data Simpan Khusus Perempuan (SPP) Pada Unit Pengelola Kegiatan (UPK) Mintra Usaha Mandiri Program Nasional Pemberdayan Masyarakat Mandiri Perdesaan PNPM-MPD Kecamatan Pringkuku Kabupaten Pacitan. Journal Speed – Sentra Penelitian Engineering dan Edukasi – Volume 3 No 1 - 2011 - ijns.org

http://www.den4b.com/products/hasher/


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen

Article History
Submitted: 2020-11-23 Published: 2021-07-24
How to Cite
Toruan, D. (2021). Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen. Journal of Information System Research (JOSH), 2(4), 227-234. https://doi.org/10.47065/josh.v2i4.568
Section
Articles