Digital Singnature Pada File Dokumen Menerapkan Fungsi Hash Dengan Metode MD5
Abstract
Documents that have a digital signature are intended to validate where the data comes from. Digital signature can be done through encryption. The algorithm that is usually used for a digital signature on a document file is the Message Digest (MD5) algorithm which is also a hash function. And it is necessary to do the security and authenticity of the Digital signature on the document file so that it is not easily manipulated by others. The method that suits this problem is to use an algorithm that is usually used to create digital signatures, namely the MD5 algorithm which is a hash algorithm of the MD5 type or direction to get the value. hash is 128 bits long. The MD5 algorithm can be used to check data integrity, create digital signatures on document files and others. A digital signature of the security and authenticity of the document file there is also a hash function in the journal entitled Implementing the MD5 algorithm for document security. By using a one-way hash function, it will generate a message Digest from the original message. Developed from the MD5 algorithm developed by Ron Rivest, accepting input messages of various lengths and generating a 128-bit hash code it has become one of the most widely used hash algorithms. This algorithm is basically made for the security and authenticity of digital signatures in document files, the hash function cannot answer all existing problems such as confidentiality issues.
Downloads
References
D. P. Precilia and A. Izzuddin, “Aplikasi Tanda Tangan Digital (Digital Signature) Menggunakan Algoritma Message Digest 5 (MD5),” Energy, vol. 5, no. 1, pp. 14–19, 2016.
O. K. Sulaiman, M. Ihwani, and S. F. Rizki, “MODEL KEAMANAN INFORMASI BERBASIS TANDA TANGAN DIGITAL DENGAN DATA ENCRYPTION STANDARD (DES) ALGORITHM,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 14–19, Sep. 2016.
Endelina, “Implementasi Digital Signature Pada File Audio Menerapkan Metode SHA-256,” J. Informatics Manag. Inf. Technol., vol. 1, no. 2, pp. 60–67, 2021.
D. L. Toruan and R. K. Hondro, “Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen,” Bull. Comput. Sci. Res., vol. 1, no. 2, pp. 48–56, 2021.
S. Agarwal, A. Rungta, R. Padmavathy, M. Shankar, and N. Rajan, “An improved fast and secure hash algorithm,” J. Inf. Process. Syst., vol. 8, no. 1, pp. 119–132, 2012.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Digital Singnature Pada File Dokumen Menerapkan Fungsi Hash Dengan Metode MD5
Pages: 6-15
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).