https://eurogeojournal.eu/ https://jurnal.pendidikanbiologiukaw.ac.id/
https://e-kerja.bnpp.go.id/bkp/https://journal.dkpp.go.id/wow/https://ppid.dkpp.go.id/_fungsi/dana/https://jurnal.pendidikanbiologiukaw.ac.id/https://e-kerja.bnpp.go.id/Pengawas/demo/https://jos.unsoed.ac.id/stats/2024/https://journal.umkendari.ac.id/dm/https://jurnal.radenfatah.ac.id/demo/https://journal.ar-raniry.ac.id/lap/https://sipeg.ui.ac.id/dm/https://e-kerja.bnpp.go.id/Pengawas/dana/
slot gacor 2025slot gacor 2025slot gacor 2025slot gacor 2025slot gacor 2025slot gacor
Analisa Keamanan Tanda Tangan Digital Dengan Menerapkan Metode AHA-1 | Janisah | JURIKOM (Jurnal Riset Komputer)

Analisa Keamanan Tanda Tangan Digital Dengan Menerapkan Metode AHA-1

Janisah Janisah, Lince Tomoria Sianturi, Candra Frenki Sianturi, Murdani Murdani

Abstract


The importance of information value causes often the information desired by certain people can then modify it. To be able to validate the information obtained, authentication must be done so that the authenticity of the information is known. Signature is a marker or identity in a document. Signatures have an important role in verifying and legalizing documents. To secure digital signatures, a hash function can be processed, a hash consisting of a Secure Hash Algorithm. The Secure Hash Algorithm (SHA-1) method is a hash function that works in one direction, this means that messages that have been converted into message digest cannot be returned to the original message. Two different messages will always produce different hash values, and results from different string length input will result in an autput with a fixed string length of 160 bits.


Keywords


Security; Digital Signature; SHA-1

Full Text:

PDF

References


J. Arifin and M. Z. Naf’an, “Verifikasi Tanda Tangan Asli Atau Palsu Berdasarkan Sifat Keacakan (Entropi),†J. Infotel, vol. 9, no. 1, p. 130, 2017.

K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,†vol. 1, no. 1, pp. 57–66, 2014.

D. Prof.Dr.jogiyanto HM, MBA., Ph, “Analisis & Desain Sistem Informasi,†in Analisis & Desain Sistem Informasi, Yogyakarta: C.V ANDI OFFSET, 2005, p. 129.

R. Sadikin, Kriptografi keamanan jaringan dan implementasinya dalam bahasa java. Yogyakarta: CV.ANDI OFFSET, 2012.

M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: CV.ANDI OFFSET, 2015.

H. Hasrul and L. H. Siregar, “Penerapan Teknik Kriptografi pada Database menggunakan Algoritma One Time Pad,†Elektron. Sist. Inf. dan Komput., vol. 2, no. 2, pp. 41–52, 2016.

M. Ir. Yusuf Kurniawan, Kriptografi keamanan internet dan jaringan komunikasi. Bandung: Informatika Bandung, 2004.




DOI: https://doi.org/10.30865/jurikom.v8i3.2833

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 JURIKOM (Jurnal Riset Komputer)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JURIKOM (Jurnal Riset Komputer) 
Dikelola oleh Universitas Budi Darma
Sekretariat : Jln. Sisingamangaraja No. 338 Telp 061-7875998
email : lppm.ubd@gmail.com