Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital


Authors

  • Benny Sinaga Universitas Budi Darma, Medan, Indonesia
  • Muhammad Abdul Rohim Universitas Budi Darma, Medan, Indonesia
  • Efori Bu'ulolo Universitas Budi Darma, Medan, Indonesia

DOI:

https://doi.org/10.30865/resolusi.v2i5.331

Keywords:

Digital Signature; MD5; Paillier Cryptosystem; Web

Abstract

Of the several benefits of cryptographic techniques is data authentication. Before the digital era, signatures were used as a means to prove the authenticity of printed documents such as letters, certificates, certificates, books and so on. Documents that do not have a signature will be doubtful for their authenticity. One of the characteristics of these signatures is that all the signature patterns are the same, so this situation can easily be manipulated with signature forgery, if the related parties use a different signature on each document that is signed it will also have an impact on changing doubts on the parties who are signed. reserves the right to verify. To overcome the need, documents should be given a digital signature. The intended digital signature is not a manual signature that is scanned and then embedded in a digital document. Digital signatures will be built from cryptographic techniques. In this study, the signature that will be used is a signature with a combination of a hash function algorithm and a web-based public-key cryptography. The methods used are the MD5 algorithm and Paillier Cryptosystem. Paillier cryposystem is a public-key cryptographic algorithm which is believed to be difficult to attack because it uses n-residue class calculations so that it will be very difficult to find the key pair used, this is known as the Composite Residuosity (CR) assumption.

Downloads

Download data is not yet available.

References

Rinaldi Munir.Kriptografi Edisi Kedua. Bandung. Penerbit Informatika. 2019.

Rohi Abdullah. 7 in 1 Pemograman Web Untuk Pemula. Jakarta. Penerbit Elex Media Komputindo. 2018.

Kadri Yusuf.” Penerapan Algoritma Md5 Sebagai Pengaman Akun Pada Aplikasi Web Emusrenbang Kota Binjai”. Jurnal Teknik Informatika Kaputama (Jtik) Vol. 4 , No1.

Juni Ade Nawer Purba, Taronisokhi Zebua, Rivalri K Hondro.” Implementasi Algoritma Paillier Cryptosystem Pengamanan Citra Digital Pada Aplikasi Chat”. Komik (Konferensi Nasional Teknologi Informasi Dan Komputer)Volume 3, Nomor1

T. Zebua And E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma Rc4”, J.Teknol. Infomasi Dan Ilmu Komput., Vol. 4, No. 4, Pp. 275–282, 2017.

Janner Simarmata Dkk. Kriptografi Teknik Keamanan Data Dan Informasi. Yogyakarta. Penerbit Andi. 2019.

Muhadi M.Ilyas Gultom1, Darjat Saripurna2,” Perancangan Sistem Keamanan Aplikasi E-Voting Untuk Pemilihan Ketua Badan Eksekutif Mahasiswa Fakultas Teknik Uisu Dengan Menggunakan Algoritma Md5”, Algoritma: Jurnal Ilmu Komputer Dan Informatika, Volume: 03, Number: 02

Juni Ade Nawer Purba, Debora Sinaga, Saima Ronita Purba.” Implementasi Algoritma Paillier Cryptosystem Pengamanan Audio” Seminar Nasional Teknologi Komputer & Sains (Sainteks) 2019.

Menanti Cristian Sianturi, Firman Telaumbanua, Zul Fikri Sofyan.” Pengamanan Citra Digital Dengan Algoritma Paillier Criptosystem”. Eminar Nasional Teknologi Komputer & Sains (Sainteks).2020

Asep Roy Panggabean.” Implementasi Algoritma Paillier Cryptosystem Untuk Keamanan Data Video Mpeg Pada Aplikasi Chat”. Jurnal Informasi Dan Teknologi Ilmiah (Inti)Volume 8, No 1, 2020

Christine Jost1, Ha Lam2, Alexander Maximov3, And Ben Smeets3.” Encryption Performance Improvementsof The Paillier Cryptosystem”.

Junaidy B. Sanger.” Desain Dan Implementasi Mekanisme Tanda Tangan Dijital Dalam Pertukaran Data Dengan Hash Md5 Dan Enkripsi/Dekripsi Menggunakan Algoritma Rsa”. Jurnal Lasallian Vol. 12 No. 2 September 2015


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital

Dimensions Badge

ARTICLE HISTORY


Published: 2022-05-25
Abstract View: 479 times
PDF Download: 327 times