Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner


Authors

  • Sopiana Nainggolan Universitas Budi Darma, Medan, Indonesia

DOI:

https://doi.org/10.30865/resolusi.v2i5.368

Keywords:

Cryptography; Duplicate; Document Scanner; SHA-256

Abstract

On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new. The selection of the SHA-256 algorithm is inseparable from several previous studies that have examined the performance of this algorithm. The SHA-256 algorithm is able to detect changes that occur in digital images even though the changes that occur are only 1 pixel, the small differences that occur in the image produce a very significant difference from the hash value with an accuracy level of up to 100%. SHA - 256 produces a message digest with 256 bits in length. SHA - 256 is classified as safe because it is designed in such a way that it is not possible to get messages related to the same message digest.

Downloads

Download data is not yet available.

References

A. G. Tammam, "Fungsi Hash dan algoritma SHA-256," Keamanan Komputer, 2016.

S. M. Egi Cahyo Prabowo Irawan Afrianto, "Implementasi Aplikasi Digital Signature Menggunakan Fungsi Hash Algoritma SHA-256 dan RSA di Badan Pertanahan Nasional Kota Cimahi," Teknik Informatika, pp. 1-8, 2014.

Imam Saputra, "Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital," in Seminar Nasional Riset Information Science (SENARIS), Pematang Siantar, 2019.

S.J Patil, N.P Jagtap, S.H Rajput, and R.B Sangore, "A Duplicate File Finder System," International Journal of Science Spirituality Business and Technology, pp. 10-14, 2017.

Whitfield Diffie and Martin E Hellman, "New Direction in Cryptography," vol. IT 22, no. 6, November 1976.

Dony Ariyus , PengantarIlmu Kriptografi. Yogyakarta: Andi, 2008.

R Sadikin, Kriptografi keamanan jaringan dan implementasinya dalam bahasa java. Yogyakarta: CV Andi Offset, 2012.

Prayudi , Yudi , and Idham Halik, "Studi Analisis Algoritma Rivest Code 6 (RC6) Dalam Enkripsi/Dekripsi Data," Seminar Nasional Aplikasi Teknologi Informasi 2005(SNATI 2005), 2005.

M Syafriadi, "Analisis Kecepatan dan Keamanan Algoritma Secure Hash Algorithm 256 (SHA-256) Untuk Otentikasi Pesan Teks," 2006.

Booch , G James, and R Ivar, The Unified Modeling Language User Guide Second Edition. United State: Addison Wesley profesional, 2005.

Adi Nugroho, Rekayasa Perangkat Lunak Menggunakan UML dan Java. Yogyakarta: Andi Offset, 2010.

A.S Rosa and M Shalahuddin, Rekayasa Perangkat Lunak Struktur dan berorientasi Objek. Bandung: Informatika, 2014.

Rahmat Priyanto, Lansung bisa Visual Basic Net 2008. Yogyakarta: Andi, 2009.

Nurdin Usman,. Bandung: CV sinar baru, 2002.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner

Dimensions Badge

ARTICLE HISTORY


Published: 2022-05-25
Abstract View: 653 times
PDF Download: 993 times