Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner
DOI:
https://doi.org/10.30865/resolusi.v2i5.368Keywords:
Cryptography; Duplicate; Document Scanner; SHA-256Abstract
On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new. The selection of the SHA-256 algorithm is inseparable from several previous studies that have examined the performance of this algorithm. The SHA-256 algorithm is able to detect changes that occur in digital images even though the changes that occur are only 1 pixel, the small differences that occur in the image produce a very significant difference from the hash value with an accuracy level of up to 100%. SHA - 256 produces a message digest with 256 bits in length. SHA - 256 is classified as safe because it is designed in such a way that it is not possible to get messages related to the same message digest.
Downloads
References
A. G. Tammam, "Fungsi Hash dan algoritma SHA-256," Keamanan Komputer, 2016.
S. M. Egi Cahyo Prabowo Irawan Afrianto, "Implementasi Aplikasi Digital Signature Menggunakan Fungsi Hash Algoritma SHA-256 dan RSA di Badan Pertanahan Nasional Kota Cimahi," Teknik Informatika, pp. 1-8, 2014.
Imam Saputra, "Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital," in Seminar Nasional Riset Information Science (SENARIS), Pematang Siantar, 2019.
S.J Patil, N.P Jagtap, S.H Rajput, and R.B Sangore, "A Duplicate File Finder System," International Journal of Science Spirituality Business and Technology, pp. 10-14, 2017.
Whitfield Diffie and Martin E Hellman, "New Direction in Cryptography," vol. IT 22, no. 6, November 1976.
Dony Ariyus , PengantarIlmu Kriptografi. Yogyakarta: Andi, 2008.
R Sadikin, Kriptografi keamanan jaringan dan implementasinya dalam bahasa java. Yogyakarta: CV Andi Offset, 2012.
Prayudi , Yudi , and Idham Halik, "Studi Analisis Algoritma Rivest Code 6 (RC6) Dalam Enkripsi/Dekripsi Data," Seminar Nasional Aplikasi Teknologi Informasi 2005(SNATI 2005), 2005.
M Syafriadi, "Analisis Kecepatan dan Keamanan Algoritma Secure Hash Algorithm 256 (SHA-256) Untuk Otentikasi Pesan Teks," 2006.
Booch , G James, and R Ivar, The Unified Modeling Language User Guide Second Edition. United State: Addison Wesley profesional, 2005.
Adi Nugroho, Rekayasa Perangkat Lunak Menggunakan UML dan Java. Yogyakarta: Andi Offset, 2010.
A.S Rosa and M Shalahuddin, Rekayasa Perangkat Lunak Struktur dan berorientasi Objek. Bandung: Informatika, 2014.
Rahmat Priyanto, Lansung bisa Visual Basic Net 2008. Yogyakarta: Andi, 2009.
Nurdin Usman,. Bandung: CV sinar baru, 2002.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Sopiana Nainggolan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).














