Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen
DOI:
https://doi.org/10.47065/bulletincsr.v1i2.94Keywords:
Cryptography; Document Files; SHA-1Abstract
Document file is a means of transforming information from one person to another or from a group of other groups. The development of computerized technology has increased greatly. Document files are very vulnerable to fraud, interception and data theft by irresponsible parties. For the sake of maintaining the security of document files can be done by using cryptographic techniques. Cryptography is the science of maintaining data security. Cryptography is a data security method that can be used to maintain data authenticity, data confidentiality, and data transmission authenticity. SHA stands for Secure Hash Algorithm, a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This research will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process to detect the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.
Downloads
References
K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,” Creat. Inf. Technol. J., vol. 1, no. 1, p. 57, 2018.
Doroty L, Satoto K I, Nurhayati O D, PERANCANGAN IMPLEMENTASI SISTEM INFORMASI PERPUSTAKAAN DIPROGRAM STUDI TEKNIK LINGKUNGAN FAKULTAS TEKNIK UNDIP Vol.2, No.4, Oktober 2014 (e-ISSN:2338-0403)
M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya menggunakan MATLAB. Yogyakarta: ANDI, 2015.
Rifki Sadikin, Kriptografi untuk keamanan jaringan dan implementasi dalam Bahasa Java. Yogyakarta: ANDI, 2012.
Dony Ariyus, PENGANTAR ILMU KRIPTOGRAFI Teori Analisis & Implementasi. Yogyakarta, 2008.
Dimaz A Wijaya, MENGENAL BITCOIN & CRYPTOCURRENCY. Medan, 2016.
R. Prasetyo and A. Suryana, “Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 5, no. 2, p. 61, 2018.
Sugiartowo, Ambo S N, “Implementasi Simulasi Media Pembelajaran Rangkaian Kombinasional Berbasis Kolaburasi Multimedia Simulator Dan Pemograman Delphi,”Junal Informatika Upgris, Vol. 4, No. 2, (2018) P/E-ISSN: 2460-4801/2447-6645 170
Pabokory F.N Astuti I.F Kridalaksana A.H IMPLEMENTASI KRIPTOGRAFI PENGAMANAN DATA PADA PESAN TEKS, ISI FILE DOKUMEN, DAN FILE DOKUMEN MENGGUNAKAN ALGORITMA ADVANCED ENCRYPTION STANDARD. Vol. 10 No. 1 Februari 2015
Crystanti C.Y, Wardati I.U, Sistem Pengolahan Data Simpan Khusus Perempuan (SPP) Pada Unit Pengelola Kegiatan (UPK) Mintra Usaha Mandiri Program Nasional Pemberdayan Masyarakat Mandiri Perdesaan PNPM-MPD Kecamatan Pringkuku Kabupaten Pacitan. Journal Speed – Sentra Penelitian Engineering dan Edukasi – Volume 3 No 1 - 2011 - ijns.org
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2021 Dermawan Lumban Toruan, Rivalri Kristianto Hondro

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).