Mendeteksi Otentikasi File Audio Menerapkan Metode Ripemd-128
Keywords:Audio Files; Ripemd-128 ; Cryptography
Audio file is a means of information from one person to another or from a group to another. The development of computerized technology has greatly increased. Audio files are very vulnerable to fraud, eavesdropping and data theft by irresponsible parties. In order to maintain the security of audio files, this can be done by using cryptographic techniques. Cryptography is a collection of techniques that are useful for securing information. In addition to securing information, it also maintains the confidentiality and integrity of the information. Cryptography is used for important communications such as communications among the military, diplomats, and spies. But nowadays cryptography is more non-repudiation.RIPEMD-128 is a cryptographic hash function designed for implementation on software with 32 bit architecture.
Dobbertin, Hans c.s. (1996). RIPEMD160 A Strengthened Version of RIPEMD. German Information Security Agency.
Masashi, Une c.s. (2006). IMES Discussion Paper Series – Year 2010 issues on cryptographic algorithms. Bank of Japan.
Wang, Xiaoyun c.s. (2004). Collisions for Hash Functions MD4, MD5, HAVAL-128, and RIPEMD. Shandong University, Chinese Academy of Sciences, Shanghai Jiatong University.
Preneel, Bart c.s. (1997). The Cryptographic Hash Function RIPEMD160. RSA Laboratories.
Munir, R. 2004. Fungsi Hash Satu-Arah dan Algoritma MD5.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Mendeteksi Otentikasi File Audio Menerapkan Metode Ripemd-128
Copyright (c) 2021 Maria
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).