Implementasi Digital Signature Pada File Audio Menerapkan Metode SHA-256


Authors

  • Endelina Endelina Universitas Budi Darma, Medan, Indonesia

DOI:

https://doi.org/10.47065/jimat.v1i2.98

Keywords:

Cryptography; Audio; Secure Hash Algorithm 256 method; Hasher Pro

Abstract

In an era of information technology that is growing very rapidly, the use of signatures has been implemented digitally through digital signatures. Digital signatures develop along with the emergence of the need to authenticate data or files that are used digitally. Its use also aims to avoid forgery or interference. Currently, the use of digital signatures has been widely applied to software distribution, financial transactions, and file delivery. The use of digital signatures on audio files can be accomplished by using encryption of messages sent with a key to use a combination of hash functions with public-key cryptography. This method can be used temporarily. The use of a digital signature in the form of an encrypted writing or a hash function will produce a signature document that is clearly visible because it is written in a visible code. This can lead to potential interference by removing the signature so that the document received is deemed not equipped with a digital signature.

Downloads

Download data is not yet available.

References

A. G. Tammam, "Fungsi Hash dan Algoritma SHA-256," Keamanan Komputer, p. 5, 2016.

S. M. Egi Cahyo Prabowo Irawan Afrianto, "Implementasi Aplikasi Digital Signature Menggunakan Fungsi Hash Algoritma SHA-256 dan RSA di Badan Pertanahan Nasional Kota Cimahi," Tekni Informatika, pp. 1-8, 2014.

M. Arinda Firdianti, Arinda Firdianti, Implementasi manajemen Berbasis Sekolah dalam Meningkatkan Prestasi Belajar Siswa., Kota Yogyakarta 55241: CV. GRE PUBLISHING Jl. Kelurahan Karang Waru Lor TR II/22IE , Oktober 2018.

S. Emy Setyaningsih, Kriptografi dan implementasinya menggunakan Matlab, Yogyakarta: CV. ANDI , 2015.

A. Rifki Sadikin, Kriptografi untuk keamanan jaringan dalam implementasinya Bahasa Java, Yogyakarta: Rifki Sadikin, Andi, 2012.

I. J. Kusuma, "Analisis Teknik Steganografi pada Audio MP3 menggunakan Metode Parity coding dan Enkripsi Chiper Transposition," Jurnal Elekronik Sistem Informasi dan Komputer Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Bina Mulia, vol. 3, p. 4, 2017.

M. Syafriadi, "AnalisisKecepatan dan Keamanan Algoritma Secure Hash Algorithm 256 (SHA-256) Untuk Otentikasi Pesan Teks," pp. 2-5, 2016.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Digital Signature Pada File Audio Menerapkan Metode SHA-256

Dimensions Badge

ARTICLE HISTORY

Published: 2021-04-30

Abstract View: 464 times
PDF Download: 405 times

Issue

Section

Articles