Analisa Metode SHA-512 Untuk Tanda Tangan Digital Pada File Video
DOI:
https://doi.org/10.47065/jimat.v1i1.87Keywords:
Cryptography; Digital Signature; Video File; SHA-512Abstract
Cryptography is the science of maintaining data security. Cryptography is a data security method that can be used to maintain data authenticity, data confidentiality, and data transmission authenticity. SHA-512 is a one-way hash function designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST) as the Federal Information Processing Standard (FIPS) in 1993 and referred to as SHA-0, two years later. published next generation SHA 1 which is an improvement of the SHA-0 algorithm. In 2002 four other variations were published, namely SHA-224, SHA-256, SHA-384, and SHA-512, four of which were referred to as SHA-2. The SHA-512 hash function is a function that produces a message digest of 512 bits in size and 1024 bits in length. There are 80 loops in this function. This research will use the SHA-512 Method to secure the authenticity, confidentiality, integrity, and authentication of digital signatures on video files. This study describes the security process to detect the authenticity of digital signatures on video files using the SHA-512 method in the form of detecting digital signatures on confidential video files sent via public telecommunications that cannot be changed or modified by unauthorized persons or persons who not concerned. This is done as an effort to minimize fraudulent acts, forgery, hoaxes, or misuse of digital signatures on video files.
Downloads
References
A. Massey-omura, M. Reza, M. A. Budiman, and D. Arisandi, “Simulasi Pengamanan File Teks Menggunakan,” vol. 1, no. 1, pp. 20–27, 2012.
T. Zebua, R. K. Hondro, and E. Ndruru, “Message Security on Chat App based on Massey Omura Algorithm,” vol. 1, no. 2, pp. 16–23, 2018.
I. Pendahuluan, “PENGAMANAN APLIKASI CHATTING MENGGUNAKAN METODE,” vol. 12, no. September, pp. 295–300, 2017.
A. Rohmanu, “Implementasi Kriptografi dan Steganografi Dengan Metode Algoritma Des dan Metode End Of File Ajar Rohmanu,” J. Inform. SIMANTIK, vol. 1, no. 2, pp. 1–11, 2017.
V. M. Amal and A. R. Yohannis, “Aplikasi Steganografi,” pp. 77–88.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisa Metode SHA-512 Untuk Tanda Tangan Digital Pada File Video
ARTICLE HISTORY
Issue
Section
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).