Penerapan Hashing SHA1 dan Algoritma Asimetris RSA untuk Keamanan Data pada Sistem Informasi berbasis Web
DOI:
https://doi.org/10.25273/research.v4i1.9099Keywords:
Algoritma Asimetris RSA, Keamanan Sistem Informasi, SHA1Abstract
Downloads
References
R. Pamungkas and S. Saifullah, “Evaluasi Kualitas Website Program Studi Sistem Informasi Universitas PGRI Madiun Menggunakan Webqual 4.0,†INTENSIF J. Ilm. Penelit. dan Penerapan Teknol. Sist. Inf., vol. 3, no. 1, p. 22, Feb. 2019, doi: 10.29407/intensif.v3i1.12137.
R. Pamungkas, “OPTIMALISASI QUERY DALAM BASIS DATA MY SQL MENGGUNAKAN INDEX,†Res. J. Comput. Inf. Syst. Technol. Manag., vol. 1, no. 1, pp. 27–31, 2018.
B. U. Customer, “Analisis Pengaruh Sistem Keamanan Informasi Perbankan pada Nasabah Pengguna Internet Banking,†vol. 3, no. 1, pp. 1–9, 2019.
R. Pamungkas, “Optimalisasi Query Dalam Basis Data My Sql Menggunakan Index,†Res. Comput. Inf. Syst. Technol. Manag., Apr. 2018, doi: 10.25273/research.v1i1.2453.
C. Asiminidis, G. Kokkonis, and S. Kontogiannis, “DATABASE SYSTEMS PERFORMANCE EVALUATION FOR IOT APPLICATIONS,†Int. J. Database Manag. Syst. (IJDMS, vol. 10, no. 6, 2018, doi: 10.5121/ijdms.2018.10601.
M. S. Ramadhan and F. Ariyani, “PENINGKATAN KEAMANAN LOGIN WEBSITE DENGAN IMPLEMENTASI ONE TIME PASSWORD MENGGUNAKAN ALGORITMA SHA1 DAN MD5 BERBASIS MOBILE,†May 2018.
S. Susanto and A. A. Trisusilo, “Penerapan Algoritma Asimetris Rsa Untuk Keamanan Data Pada Aplikasi Penjualan Cv. Sinergi Computer Lubuklinggau Berbasis Web,†Simetris J. Tek. Mesin, Elektro dan Ilmu Komput., vol. 9, no. 2, pp. 1043–1052, 2018, doi: 10.24176/simet.v9i2.2537.
F. Ramadhani, U. Ramadhani, P. Nasution, and L. Basit, “Combination Of Hybrid Cryptography In One Time Pad (OTP) Algorithm And Keyed-Hash Message Authentication Code (HMAC) In Securing The Whatsapp Communication Application,†Mar. 2020.
Y. Bin Idris, S. Adli Ismail, N. F. Mohd Azmi, A. Azmi, and A. Azizan, “Enhancement Data Integrity Checking Using Combination MD5 and SHA1 Algorithm in Hadoop Architecture,†J. Comput. Sci. Comput. Math., vol. 7, no. 3, pp. 99–102, 2017, doi: 10.20967/jcscm.2017.03.007.
A. B. Nasution, “Implementasi Pengamanan Data Dengan Menggunakan Algoritma Caesar Cipher Dan Transposisi Cipher,†J. Teknol. Inf., vol. 3, no. 1, p. 1, 2019, doi: 10.36294/jurti.v3i1.680.
D. Tiwari, A. Singh, and A. Prabhakar, “Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology,†Springer, Singapore, 2020, pp. 413–418.
R. Prasetyo and A. Suryana, “Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop,†J. Sisfokom (Sistem Inf. dan Komputer), vol. 5, no. 2, p. 61, 2016, doi: 10.32736/sisfokom.v5i2.40.
P. Chyan, “Penerapan Sistem Kriptografi Enkripsi Jamak Dan Tanda Tangan Digital Dalam Mendukung Keamanan Informasi,†J. Temat., vol. 6, no. 1, pp. 39–46, 2018.
F. G. N. Larosa, J. F. Naibaho, and R. M. Tarigan, “Web Storage Berbasis Private Cloud Menggunakan Enkripsi Sha1,†J. METHOMIKA, vol. 4, no. 1, pp. 56–59, 2020, [Online]. Available: http://www.methomika.net/index.php/jmika/article/view/142/81.
Sumarno, I. Gunawan, H. S. Tambunan, and E. Irawan, “Analisis Kinerja Kombinasi Algoritma Message-Digest Algorithm 5 (MD5), Rivest Shamir Adleman (RSA) dan Rivest Cipher 4 (RC4) pada Keamanan E-Dokumen,†JUSIKOM PRIMA (Jurnal Sist. Inf. Ilmu Komput. Prima), vol. 2, no. 1, pp. 41–48, 2018.
M. Z. Riyanto and A. Ardian, “Kriptografi Kunci Publik: Sandi RSA.,†J. Kelompok Stud. Sandi, 2008.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).