Impelementasi Metode N-Hash Untuk Mendeteksi Keaslian File Audio


Authors

  • Udiyani Universitas Budi Darma, Medan, Indonesia

DOI:

https://doi.org/10.47065/jimat.v2i1.145

Keywords:

Cryptography; Hash Method; Audio Files

Abstract

Audio file is a means of information from one person to another or from a group to another. The development of computerized technology has greatly increased. Audio files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of audio files, it can be done by using cryptographic techniques. Cryptography is a collection of techniques that are useful for securing information. Apart from securing information, it also maintains the confidentiality and integrity of the information. Cryptography is used for important communications such as communications among the military, diplomats, and spies. But nowadays cryptography is more non-repudiation.N-Hash is a family of encryption algorithms designed to have an efficient and simple software implementation on 128-bit microprocessors. The original member of this family is called N-hash which has 8 rounds

Downloads

Download data is not yet available.

References

S. miyaguchi, k.ohta, M. Iwata, 128-bit hash Function (N-Hash), proceedings of SECURICOM 90, pp. 123-137, March 1990.

Rinaldi Munir, Kriptografi, Bandung, 2006.

Dony Ariyus, Pengantar Ilmu Kriptografi Teori Analisis dan Impelemetasi, FI. Sigit Suyantoro, Ed. Yogyakarta, Indonesia: Andi, 2008.

Harun Mukhtar, Kriptografi untuk Keamanan Data. Yogyakarta: Deepublish, 2018.

Stinson, D. R. Cryptografi Theory and Practice, (2006).

Eli Biham, Adi samir, Differential Cryptanalysis of Des-like Cryptosystems, accepted by the journal of Crytology,1990


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Impelementasi Metode N-Hash Untuk Mendeteksi Keaslian File Audio

Dimensions Badge

ARTICLE HISTORY

Published: 2022-01-31

Abstract View: 57 times
PDF Download: 58 times

Issue

Section

Articles