Perancangan Aplikasi Duplicate Document Scanner Menerapkan Algoritma SHA 1

Authors

  • Nur Indah Utami Universitas Budi Darma, Medan
  • Berto Nadeak Universitas Budi Darma, Medan
  • Imam Saputra Universitas Budi Darma, Medan

DOI:

https://doi.org/10.30865/jurikom.v8i5.3627

Keywords:

Scan, Design, SHA-1 Algorithm, Documents

Abstract

We are now in the era of the digital world. Many industries have switched to digital technology such as photos, videos, music, and so on. Of course, this change brings many benefits for us in terms of speed and data access. This has an impact on the number of the same files or duplicate files stored on one computer, this is certainly not needed and takes up storage space. As with document files, it will be very difficult to distinguish document files without seeing the contents of the document file. In cryptography there is a hash function which is a one-way function that can generate the identity of a file, where if the document file contains the same content, it will produce the same hash value. This can be used to identify the same or duplicate document files. In the hash function there is the SHA-1 method or the Secure Hash Algorithm 1 which is one of the hashing algorithms that is often used to encrypt data with a width of 20 bytes or 160 bits.

References

R. A. Mollin, An Introduction to Cryptography Second Edition, Florida: Chapman & Hall/CRC, 2007.

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition, New York: John Wiley & Sons, 1996.

F. SUDIRMAN, "Analisis dan Perancangan Sistem Autentikasi Pengguna," Universitas Sumatera Utara, Medan, 2013.

A. Dalimunthe, "Otentikasi Pesan Menggunakan Elliptical Curve Digital Signature Algorithm," Universitas Sumatera Utara, Medan, 2013.

Y. T. P. K. Aryasa, "Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java," Creative Information Technology Journal, vol. 1, no. 1, p. 57, 2015.

Andrus, "Implementasi Modifikasi Sistem Kriptografi RSA dan Elliptic Curve," Universitas Sumatera Utara, Medan, 2016.

S. Patil, N. Jagtap, S. Rajput and R. Sangore, "A Duplicate File Finder System," International Journal of Science Spirituality Business and Technology, pp. 10-14, 2017.

J. Enterprise, Rahasia Manajemen File, Jakarta: Elex Media Komputindo, 2013.

Additional Files

Published

2021-10-30

How to Cite

Utami, N. I., Nadeak, B., & Saputra, I. (2021). Perancangan Aplikasi Duplicate Document Scanner Menerapkan Algoritma SHA 1. JURNAL RISET KOMPUTER (JURIKOM), 8(5), 163–169. https://doi.org/10.30865/jurikom.v8i5.3627