Perancangan Aplikasi Pembangkit Identitas File Dokumen Menerapkan Algoritma Fungsi HASH MD2
Abstract
Currently in the digital world era. However, now many industries have switched to digital technology such as photos, videos, music and so on. Of course, this change brings many benefits to us in terms of data access speed. Another advantage of computer technology is in terms of copying and generating digital file identities where the results will have the same identity value. So if you want to distinguish one document file from another, it will be very difficult because you have to check the entire contents of the document file. In cryptography there is a hash function which is a one-way function that can generate the identity of a file. Where if the document file has the same contents, it will produce the same hash value. This can be used to identify the same document file. In the hash function there is an MD2 method or the design of a document file identity generator application applies the MD2 hash function algorithm which is one of the hashing algorithms that is often used to encrypt data with a width of 20 bytes or 160 bits. By applying this algorithm to the identity document application, the results of the document file search are grouped based on the same hash value and users can easily and quickly delete document files with the same identity without having to open and read the contents of the file.
References
K. V Sandeep S. Abdulhayan, Implementation of Data Integrity using MD5 and MD2 Algorithms in IoT Devices, 2020.
Sugiyatno P. D. Atika, Digital Signature Dengan Algoritma Sha-1 Dan Rsa Sebagai Autentikasi 2018.
I. Saputra S. D. Nasution, Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital September, 2019
B. K. Hutasuhut, S. Efendi Z. Situmorang Digital Signature untuk Menjaga Keaslian Data dengan Algoritma MD5 dan Algoritma RSA, 2019.
S. (Vivesvaraya T. U. KVS. (Vivesvaraya T. U. Abdulhayan, Implementation of Data Integrity using MD5 and MD2 2020.
Wi. (Universitas B. D. Wulan Sari, Implementasi Metode Base64 Untuk Otentikasi Hasil Scan Citra Ijazah, 2021.
RusdiantA. Qashlim,「Implementasi Algoritma Md5 Untuk Keamanan Dokumen, J. Ilm. Ilmu Komput., 2016.
S. J. Patil, N. P. Jagtap, S. H. Rajput R. B. Sangore,A Duplicate File Finder System.
M. Huda, keamanan informasi. Surabaya: CV. Garuda Mas Sejahtera, 2020.
D. A. Wijaya, Mengenal Bitcoin dan Cryptocurrency. Puspantara, 2016.
H. Mukhtar, Kriptografi Untuk Keamanan Data. Deepublish, 2018.
F. Muller, International Conference on the Theory and Application of Cryptology and Information Security, 2004
A. Nugroho, Unified Modeling Language (UML), , 2009.
K. Darmayuda,Pemrograman Aplikasi Database dengan Microsoft Visual Basic. Net 2008」, 2008.
W. W. Sari, Implementasi Metode MD2 Untuk Otentikasi Hasil Scan Citra Ijazah」, Resolusi Rekayasa Tek. Inform. dan Inf., 2021.
D. P. Precilia A. Izzuddin, Aplikasi Tanda Tangan Digital (Digital Signature) Menggunakan Algoritma Message Digest 5 (MD5), 2016.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Perancangan Aplikasi Pembangkit Identitas File Dokumen Menerapkan Algoritma Fungsi HASH MD2
Pages: 1-8