Analisa Keamanan Tanda Tangan Digital Dengan Menerapkan Metode AHA-1
Abstract
The importance of information value causes often the information desired by certain people can then modify it. To be able to validate the information obtained, authentication must be done so that the authenticity of the information is known. Signature is a marker or identity in a document. Signatures have an important role in verifying and legalizing documents. To secure digital signatures, a hash function can be processed, a hash consisting of a Secure Hash Algorithm. The Secure Hash Algorithm (SHA-1) method is a hash function that works in one direction, this means that messages that have been converted into message digest cannot be returned to the original message. Two different messages will always produce different hash values, and results from different string length input will result in an autput with a fixed string length of 160 bits.
Keywords
Full Text:
PDFArticle Metrics
Abstract view : 389 timesPDF - 207 times
References
J. Arifin and M. Z. Naf’an, “Verifikasi Tanda Tangan Asli Atau Palsu Berdasarkan Sifat Keacakan (Entropi),” J. Infotel, vol. 9, no. 1, p. 130, 2017.
K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,” vol. 1, no. 1, pp. 57–66, 2014.
D. Prof.Dr.jogiyanto HM, MBA., Ph, “Analisis & Desain Sistem Informasi,” in Analisis & Desain Sistem Informasi, Yogyakarta: C.V ANDI OFFSET, 2005, p. 129.
R. Sadikin, Kriptografi keamanan jaringan dan implementasinya dalam bahasa java. Yogyakarta: CV.ANDI OFFSET, 2012.
M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: CV.ANDI OFFSET, 2015.
H. Hasrul and L. H. Siregar, “Penerapan Teknik Kriptografi pada Database menggunakan Algoritma One Time Pad,” Elektron. Sist. Inf. dan Komput., vol. 2, no. 2, pp. 41–52, 2016.
M. Ir. Yusuf Kurniawan, Kriptografi keamanan internet dan jaringan komunikasi. Bandung: Informatika Bandung, 2004.
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 JURIKOM (Jurnal Riset Komputer)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
JURIKOM (Jurnal Riset Komputer)
Publish by Universitas Budi Darma (before STMIK BUDI DARMA (P3M))
Email: jurikom.stmikbd@gmail.com
This work is licensed under a Creative Commons Attribution 4.0 International.