Penerapan Hashing SHA1 dan Algoritma Asimetris RSA untuk Keamanan Data pada Sistem Informasi berbasis Web
Abstract
Keywords
Full Text:
PDFReferences
R. Pamungkas and S. Saifullah, “Evaluasi Kualitas Website Program Studi Sistem Informasi Universitas PGRI Madiun Menggunakan Webqual 4.0,” INTENSIF J. Ilm. Penelit. dan Penerapan Teknol. Sist. Inf., vol. 3, no. 1, p. 22, Feb. 2019, doi: 10.29407/intensif.v3i1.12137.
R. Pamungkas, “OPTIMALISASI QUERY DALAM BASIS DATA MY SQL MENGGUNAKAN INDEX,” Res. J. Comput. Inf. Syst. Technol. Manag., vol. 1, no. 1, pp. 27–31, 2018.
B. U. Customer, “Analisis Pengaruh Sistem Keamanan Informasi Perbankan pada Nasabah Pengguna Internet Banking,” vol. 3, no. 1, pp. 1–9, 2019.
R. Pamungkas, “Optimalisasi Query Dalam Basis Data My Sql Menggunakan Index,” Res. Comput. Inf. Syst. Technol. Manag., Apr. 2018, doi: 10.25273/research.v1i1.2453.
C. Asiminidis, G. Kokkonis, and S. Kontogiannis, “DATABASE SYSTEMS PERFORMANCE EVALUATION FOR IOT APPLICATIONS,” Int. J. Database Manag. Syst. (IJDMS, vol. 10, no. 6, 2018, doi: 10.5121/ijdms.2018.10601.
M. S. Ramadhan and F. Ariyani, “PENINGKATAN KEAMANAN LOGIN WEBSITE DENGAN IMPLEMENTASI ONE TIME PASSWORD MENGGUNAKAN ALGORITMA SHA1 DAN MD5 BERBASIS MOBILE,” May 2018.
S. Susanto and A. A. Trisusilo, “Penerapan Algoritma Asimetris Rsa Untuk Keamanan Data Pada Aplikasi Penjualan Cv. Sinergi Computer Lubuklinggau Berbasis Web,” Simetris J. Tek. Mesin, Elektro dan Ilmu Komput., vol. 9, no. 2, pp. 1043–1052, 2018, doi: 10.24176/simet.v9i2.2537.
F. Ramadhani, U. Ramadhani, P. Nasution, and L. Basit, “Combination Of Hybrid Cryptography In One Time Pad (OTP) Algorithm And Keyed-Hash Message Authentication Code (HMAC) In Securing The Whatsapp Communication Application,” Mar. 2020.
Y. Bin Idris, S. Adli Ismail, N. F. Mohd Azmi, A. Azmi, and A. Azizan, “Enhancement Data Integrity Checking Using Combination MD5 and SHA1 Algorithm in Hadoop Architecture,” J. Comput. Sci. Comput. Math., vol. 7, no. 3, pp. 99–102, 2017, doi: 10.20967/jcscm.2017.03.007.
A. B. Nasution, “Implementasi Pengamanan Data Dengan Menggunakan Algoritma Caesar Cipher Dan Transposisi Cipher,” J. Teknol. Inf., vol. 3, no. 1, p. 1, 2019, doi: 10.36294/jurti.v3i1.680.
D. Tiwari, A. Singh, and A. Prabhakar, “Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology,” Springer, Singapore, 2020, pp. 413–418.
R. Prasetyo and A. Suryana, “Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 5, no. 2, p. 61, 2016, doi: 10.32736/sisfokom.v5i2.40.
P. Chyan, “Penerapan Sistem Kriptografi Enkripsi Jamak Dan Tanda Tangan Digital Dalam Mendukung Keamanan Informasi,” J. Temat., vol. 6, no. 1, pp. 39–46, 2018.
F. G. N. Larosa, J. F. Naibaho, and R. M. Tarigan, “Web Storage Berbasis Private Cloud Menggunakan Enkripsi Sha1,” J. METHOMIKA, vol. 4, no. 1, pp. 56–59, 2020, [Online]. Available: http://www.methomika.net/index.php/jmika/article/view/142/81.
Sumarno, I. Gunawan, H. S. Tambunan, and E. Irawan, “Analisis Kinerja Kombinasi Algoritma Message-Digest Algorithm 5 (MD5), Rivest Shamir Adleman (RSA) dan Rivest Cipher 4 (RC4) pada Keamanan E-Dokumen,” JUSIKOM PRIMA (Jurnal Sist. Inf. Ilmu Komput. Prima), vol. 2, no. 1, pp. 41–48, 2018.
M. Z. Riyanto and A. Ardian, “Kriptografi Kunci Publik: Sandi RSA.,” J. Kelompok Stud. Sandi, 2008.
Article Metrics
Abstract has been read : 927 timesPDF file viewed/downloaded: 0 times
DOI: http://doi.org/10.25273/research.v4i1.9099
Refbacks
- There are currently no refbacks.
This work by Research is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.