Analisa Keamanan Tanda Tangan Digital Dengan Menerapkan Metode AHA-1

 (*)Janisah Janisah Mail (Universitas Budi Darma, Medan, Indonesia)
 Lince Tomoria Sianturi (Universitas Budi Darma, Medan, Indonesia)
 Candra Frenki Sianturi (Universitas Budi Darma, Medan, Indonesia)
 Murdani Murdani (Universitas Budi Darma, Medan, Indonesia)

(*) Corresponding Author

Abstract

The importance of information value causes often the information desired by certain people can then modify it. To be able to validate the information obtained, authentication must be done so that the authenticity of the information is known. Signature is a marker or identity in a document. Signatures have an important role in verifying and legalizing documents. To secure digital signatures, a hash function can be processed, a hash consisting of a Secure Hash Algorithm. The Secure Hash Algorithm (SHA-1) method is a hash function that works in one direction, this means that messages that have been converted into message digest cannot be returned to the original message. Two different messages will always produce different hash values, and results from different string length input will result in an autput with a fixed string length of 160 bits.

Keywords


Security; Digital Signature; SHA-1

Full Text:

PDF


Article Metrics

Abstract view : 389 times
PDF - 207 times

References

J. Arifin and M. Z. Naf’an, “Verifikasi Tanda Tangan Asli Atau Palsu Berdasarkan Sifat Keacakan (Entropi),” J. Infotel, vol. 9, no. 1, p. 130, 2017.

K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,” vol. 1, no. 1, pp. 57–66, 2014.

D. Prof.Dr.jogiyanto HM, MBA., Ph, “Analisis & Desain Sistem Informasi,” in Analisis & Desain Sistem Informasi, Yogyakarta: C.V ANDI OFFSET, 2005, p. 129.

R. Sadikin, Kriptografi keamanan jaringan dan implementasinya dalam bahasa java. Yogyakarta: CV.ANDI OFFSET, 2012.

M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: CV.ANDI OFFSET, 2015.

H. Hasrul and L. H. Siregar, “Penerapan Teknik Kriptografi pada Database menggunakan Algoritma One Time Pad,” Elektron. Sist. Inf. dan Komput., vol. 2, no. 2, pp. 41–52, 2016.

M. Ir. Yusuf Kurniawan, Kriptografi keamanan internet dan jaringan komunikasi. Bandung: Informatika Bandung, 2004.

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 JURIKOM (Jurnal Riset Komputer)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JURIKOM (Jurnal Riset Komputer)
Publish by Universitas Budi Darma (before STMIK BUDI DARMA (P3M))
Email: jurikom.stmikbd@gmail.com

Creative Commons License
 This work is licensed under a Creative Commons Attribution 4.0 International.