Implementasi Digital Signature Pada File Audio Menerapkan Metode SHA-256
DOI:
https://doi.org/10.47065/jimat.v1i2.98Keywords:
Cryptography; Audio; Secure Hash Algorithm 256 method; Hasher ProAbstract
In an era of information technology that is growing very rapidly, the use of signatures has been implemented digitally through digital signatures. Digital signatures develop along with the emergence of the need to authenticate data or files that are used digitally. Its use also aims to avoid forgery or interference. Currently, the use of digital signatures has been widely applied to software distribution, financial transactions, and file delivery. The use of digital signatures on audio files can be accomplished by using encryption of messages sent with a key to use a combination of hash functions with public-key cryptography. This method can be used temporarily. The use of a digital signature in the form of an encrypted writing or a hash function will produce a signature document that is clearly visible because it is written in a visible code. This can lead to potential interference by removing the signature so that the document received is deemed not equipped with a digital signature.
Downloads
References
A. G. Tammam, "Fungsi Hash dan Algoritma SHA-256," Keamanan Komputer, p. 5, 2016.
S. M. Egi Cahyo Prabowo Irawan Afrianto, "Implementasi Aplikasi Digital Signature Menggunakan Fungsi Hash Algoritma SHA-256 dan RSA di Badan Pertanahan Nasional Kota Cimahi," Tekni Informatika, pp. 1-8, 2014.
M. Arinda Firdianti, Arinda Firdianti, Implementasi manajemen Berbasis Sekolah dalam Meningkatkan Prestasi Belajar Siswa., Kota Yogyakarta 55241: CV. GRE PUBLISHING Jl. Kelurahan Karang Waru Lor TR II/22IE , Oktober 2018.
S. Emy Setyaningsih, Kriptografi dan implementasinya menggunakan Matlab, Yogyakarta: CV. ANDI , 2015.
A. Rifki Sadikin, Kriptografi untuk keamanan jaringan dalam implementasinya Bahasa Java, Yogyakarta: Rifki Sadikin, Andi, 2012.
I. J. Kusuma, "Analisis Teknik Steganografi pada Audio MP3 menggunakan Metode Parity coding dan Enkripsi Chiper Transposition," Jurnal Elekronik Sistem Informasi dan Komputer Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Bina Mulia, vol. 3, p. 4, 2017.
M. Syafriadi, "AnalisisKecepatan dan Keamanan Algoritma Secure Hash Algorithm 256 (SHA-256) Untuk Otentikasi Pesan Teks," pp. 2-5, 2016.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Digital Signature Pada File Audio Menerapkan Metode SHA-256
ARTICLE HISTORY
Issue
Section
Copyright (c) 2021 Endelina Endelina

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).