Analisa Keamanan Tanda Tangan Digital Dengan Menerapkan Metode AHA-1
DOI:
https://doi.org/10.30865/jurikom.v8i3.2833Keywords:
Security, Digital Signature, SHA-1Abstract
The importance of information value causes often the information desired by certain people can then modify it. To be able to validate the information obtained, authentication must be done so that the authenticity of the information is known. Signature is a marker or identity in a document. Signatures have an important role in verifying and legalizing documents. To secure digital signatures, a hash function can be processed, a hash consisting of a Secure Hash Algorithm. The Secure Hash Algorithm (SHA-1) method is a hash function that works in one direction, this means that messages that have been converted into message digest cannot be returned to the original message. Two different messages will always produce different hash values, and results from different string length input will result in an autput with a fixed string length of 160 bits.
References
J. Arifin and M. Z. Naf’an, “Verifikasi Tanda Tangan Asli Atau Palsu Berdasarkan Sifat Keacakan (Entropi),†J. Infotel, vol. 9, no. 1, p. 130, 2017.
K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,†vol. 1, no. 1, pp. 57–66, 2014.
D. Prof.Dr.jogiyanto HM, MBA., Ph, “Analisis & Desain Sistem Informasi,†in Analisis & Desain Sistem Informasi, Yogyakarta: C.V ANDI OFFSET, 2005, p. 129.
R. Sadikin, Kriptografi keamanan jaringan dan implementasinya dalam bahasa java. Yogyakarta: CV.ANDI OFFSET, 2012.
M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: CV.ANDI OFFSET, 2015.
H. Hasrul and L. H. Siregar, “Penerapan Teknik Kriptografi pada Database menggunakan Algoritma One Time Pad,†Elektron. Sist. Inf. dan Komput., vol. 2, no. 2, pp. 41–52, 2016.
M. Ir. Yusuf Kurniawan, Kriptografi keamanan internet dan jaringan komunikasi. Bandung: Informatika Bandung, 2004.



