Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital
DOI:
https://doi.org/10.30865/resolusi.v2i5.331Keywords:
Digital Signature; MD5; Paillier Cryptosystem; WebAbstract
Of the several benefits of cryptographic techniques is data authentication. Before the digital era, signatures were used as a means to prove the authenticity of printed documents such as letters, certificates, certificates, books and so on. Documents that do not have a signature will be doubtful for their authenticity. One of the characteristics of these signatures is that all the signature patterns are the same, so this situation can easily be manipulated with signature forgery, if the related parties use a different signature on each document that is signed it will also have an impact on changing doubts on the parties who are signed. reserves the right to verify. To overcome the need, documents should be given a digital signature. The intended digital signature is not a manual signature that is scanned and then embedded in a digital document. Digital signatures will be built from cryptographic techniques. In this study, the signature that will be used is a signature with a combination of a hash function algorithm and a web-based public-key cryptography. The methods used are the MD5 algorithm and Paillier Cryptosystem. Paillier cryposystem is a public-key cryptographic algorithm which is believed to be difficult to attack because it uses n-residue class calculations so that it will be very difficult to find the key pair used, this is known as the Composite Residuosity (CR) assumption.
Downloads
References
Rinaldi Munir.Kriptografi Edisi Kedua. Bandung. Penerbit Informatika. 2019.
Rohi Abdullah. 7 in 1 Pemograman Web Untuk Pemula. Jakarta. Penerbit Elex Media Komputindo. 2018.
Kadri Yusuf.” Penerapan Algoritma Md5 Sebagai Pengaman Akun Pada Aplikasi Web Emusrenbang Kota Binjai”. Jurnal Teknik Informatika Kaputama (Jtik) Vol. 4 , No1.
Juni Ade Nawer Purba, Taronisokhi Zebua, Rivalri K Hondro.” Implementasi Algoritma Paillier Cryptosystem Pengamanan Citra Digital Pada Aplikasi Chat”. Komik (Konferensi Nasional Teknologi Informasi Dan Komputer)Volume 3, Nomor1
T. Zebua And E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma Rc4”, J.Teknol. Infomasi Dan Ilmu Komput., Vol. 4, No. 4, Pp. 275–282, 2017.
Janner Simarmata Dkk. Kriptografi Teknik Keamanan Data Dan Informasi. Yogyakarta. Penerbit Andi. 2019.
Muhadi M.Ilyas Gultom1, Darjat Saripurna2,” Perancangan Sistem Keamanan Aplikasi E-Voting Untuk Pemilihan Ketua Badan Eksekutif Mahasiswa Fakultas Teknik Uisu Dengan Menggunakan Algoritma Md5”, Algoritma: Jurnal Ilmu Komputer Dan Informatika, Volume: 03, Number: 02
Juni Ade Nawer Purba, Debora Sinaga, Saima Ronita Purba.” Implementasi Algoritma Paillier Cryptosystem Pengamanan Audio” Seminar Nasional Teknologi Komputer & Sains (Sainteks) 2019.
Menanti Cristian Sianturi, Firman Telaumbanua, Zul Fikri Sofyan.” Pengamanan Citra Digital Dengan Algoritma Paillier Criptosystem”. Eminar Nasional Teknologi Komputer & Sains (Sainteks).2020
Asep Roy Panggabean.” Implementasi Algoritma Paillier Cryptosystem Untuk Keamanan Data Video Mpeg Pada Aplikasi Chat”. Jurnal Informasi Dan Teknologi Ilmiah (Inti)Volume 8, No 1, 2020
Christine Jost1, Ha Lam2, Alexander Maximov3, And Ben Smeets3.” Encryption Performance Improvementsof The Paillier Cryptosystem”.
Junaidy B. Sanger.” Desain Dan Implementasi Mekanisme Tanda Tangan Dijital Dalam Pertukaran Data Dengan Hash Md5 Dan Enkripsi/Dekripsi Menggunakan Algoritma Rsa”. Jurnal Lasallian Vol. 12 No. 2 September 2015
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Benny Sinaga, Muhammad Abdul Rohim, Efori Bu'ulolo

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).














