Analisa Dan Perbandingan Algoritma Whirpool Dan Sha-512 Dalam Penyandian Data Gambar
Abstract
Image file is a form of collaboration which is located between points, lines, fields and also colors which will be very useful for imaging something, digital images are representations of light intensity functions in discrete form on a two-dimensional plane. An image file can be said to be original or original if the image does not experience the slightest change in any structure of an image. Manipulation of a file often occurs and is carried out by irresponsible people to provide benefits for that person, it is necessary to have a technique used to maintain the originality of a file or detect the authenticity of the image file, a technique can be used, namely Cryptography techniques. Cryptography is a science that studies how to keep data or messages safe when sent, from sender to recipient without experiencing any interference from irresponsible parties. A hash function is a one-way function that converts a set of strings into a set of strings whose size is smaller than the original size. The hash function has many uses, such as to maintain data integrity, delivery time efficiency, and to minimize the length of diverse data. The real-world applications of hash functions vary, such as being used to check the originality of data, to store keywords in databases, and much more. In this study, 2 existing hash functions will be discussed, namely the SHA-512 hash function, and the whirlpool hash function. SHA-512 is a variant of SHA-2 designed by the National Security Agency (NSA), while the Whirlpool hash algorithm was developed by 2 people, Vincent Rijmen and Paulo S.L.M. Barreto. These two hash functions are hash functions that are considered to have high security. In these two hash algorithms, there is still no collision in the hash value. This study will discuss the differences and similarities of the two algorithms
References
Sulianto, “Perancangan Aplikasi Untuk Memeriksa Keaslian Data Yang Telah Didownload Menggunakan Algoritma Message Digest 5 (Md5),” Pelita Inform. Budi Darma, vol. 8, no. 3, pp. 172–177, 2014.
T. S. Denis and S. Johnson, Cryptography for Developers. 2006.
W. Setiawan, “Analisis dan Perbandingan Algoritma Whirlpool dan SHA- 512 sebagai Fungsi Hash,” Makal. IF3058 Kriptografi – Sem. II Tahun 2010/2011, 2011.
Aris Kurniawan, ( 2020, Juli.24) PENGERTIAN Anal. CONTO, TAHAPAN SERTA TUJUAN MENURUT PARA AHLI https//pendidikan.co.id/pengertian- analisis.
N. MARIANA, DEDE, YUNINGSIH, “Perbandingan Pemerintahan,”
Unversitas Terbuka, pp. 1–40, 2015.
J. Maulana, “Teori perbandingan,” Surabaya, 2016.
“Wikipedia (2020, September. 1 ) METODE PERBANDINGAN https://id.m.wikipedia.org/wiki/Metode_perbandingan.”
M. Mufadhol, “KERAHASIAAN DAN KEUTUHAN KEAMANAN DATA DALAM MENJAGA INTEGRITAS DAN KEBERADAAN INFORMASI DATA,” J. Transform., vol. 6, no. 2, p. 78, 2009, doi: 10.26623/transformatika.v6i2.36.
R. Munir, “Pengantar Kriptografi Bahan Kuliah IF4020 Kriptografi.”
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisa Dan Perbandingan Algoritma Whirpool Dan Sha-512 Dalam Penyandian Data Gambar
Pages: 8-12
Copyright (c) 2022 Darwis Pardamean Purba

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).

