scholarly journals Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java

2015 ◽  
Vol 1 (1) ◽  
pp. 57 ◽  
Author(s):  
Komang Aryasa ◽  
Yeyasa Tommy Paulus

Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapat memodifikasi informasi tersebut. Untuk dapat mengesahkan informasi yang didapatkan, maka harus dilakukan authentication pada informasi sehingga diketahui keaslian informasi. Dalam penelitian ini diimplementasikan suatu metode secure hash algorithm-1, sehingga penerima informasi dapat mengetahui adanya perubahan terhadap data penting yang diterima dari pihak lain. Metode ini mampu membangkitkan nilai hash dari sebuah string atau file. Dengan perubahan sekecil apapun pada informasi yang diterima, dapat diketahui keasliannya. Secure Hash Algorithm adalah fungsi hash yang bekerja satu arah, ini berarti pesan yang sudah diubah menjadi message digest tidak dapat dikembalikan menjadi pesan semula. Dua pesan yang berbeda akan selalu menghasilkan nilai hash yang berbeda pula. Hasil rancangan perangkat lunak ini dengan input panjang string yang berbeda akan menghasilkan output dengan panjang string tetap yaitu 160 bit, yang dapat dibuat dalam bentuk library pada pemrograman java sehingga dapat langsung digunakan untuk proses otentikasi dan keamanan data.Security problem is one of the important aspects of the information system. Once the importance of the value of information causes information is often desired by a particular person can then modify that information. To be able to certify that the information obtained, it must be done so that the authentication on the information known to the authenticity of the information. In this study implemented a method of secure hash algorithm-1, so that the recipient can know the information of changes to important data received from the other party. This method is able to generate a hash value from a string or file. With the slightest change to the information received, it is known authenticity. Secure Hash Algorithm is a hash function that works in one direction, this means that the message has been converted into a message digest can not be restored to its original message. Two different messages will always produce a different hash value. Software design results with different input string length would produce output with fixed string length is 160 bits, which can be made in the form of the Java programming library that can be directly used for authentication and data security.

Author(s):  
Muhammad Asghar Nazal ◽  
Reza Pulungan ◽  
Mardhani Riasetiawan

Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA).DSA is one of the key algorithms used for digital signatures, but because DSA still uses Secure Hash Algorithm (SHA-1) as an algorithm for hashes, DSA rarely used for data security purposes, so Keccak is used instead of the hash algorithm on DSA. Now, Keccak become the standard for the new SHA-3 hash function algorithm. Because of the above problems, the focus of this research is about data verification using Keccak and DSA. The results of the research are proven that Keccak can run on DSA work system, obtained a comparison of execution time process between DSA and RSA where both use Keccak.


2018 ◽  
Vol 10 (2) ◽  
pp. 70-74
Author(s):  
Santi Sulastri ◽  
Riana Defi Mahadji Putri

There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD5 and SHA256 collaboration methods. Encryption is applied to the user's password on the web login system. Simulation results can be tested by measuring resistance to brute force attacks and the value of the avalanche effect (AE). From the results of the tests carried out by using attack software, the results of the application are quite safe from brute force attacks. From the AE test obtained the result with an AE value of 71% which means that the encoding result is good enough.


Author(s):  
Bayu Priyatna ◽  
April Lia Hananto

Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses. MD5 is one technique that is widely used in password data security issues, which algorithm has many advantages including. MD5 has a one-way hash function so that the message has been converted to a message digest, and it is complicated to restore it to the original message (plaintext). In addition to the advantages of MD5 also has a variety of shortcomings including; very easy to solve because MD5 has a fixed encryption result, using the MD5 modifier generator will be easily guessed, and MD5 is not proper because it is vulnerable to collision attacks. The research method used in this study uses Computer Science Engineering by conducting experiments combining two cryptographic arrangements. The results obtained from this study after being tested with Avalanche Effect technique get ciphertext randomness results of 43.69%, which tends to be very strong to be implemented in password data authentication.


Symmetry ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 137 ◽  
Author(s):  
Sahib Khan ◽  
Khalil Khan ◽  
Farman Ali ◽  
Kyung-Sup Kwak

In this paper, we present a new technique of image forgery detection. The proposed technique uses digital signatures embedded in the least significant bits of the selected pixels of each row and column. The process maintains a symmetry in the use of pixels for computing and hiding the digital signatures. Each row and column of the image symmetrically contributes to both processes, with the number of pixels per row or column used for computing the signature, and the pixels used for embedding are not equal and are asymmetric. The pixels in each row and column of an image are divided into two groups. One group contains pixels of a row or column used in the calculation of digital signatures, and the second group of pixels is used for embedding the digital signatures of the respective row or column. The digital signatures are computed using the hash algorithm, e.g., message digest five (MD5). The least significant bits substitution technique is used for embedding the computed digital signature in the least significant bits of the selected pixels of the corresponding row or column. The proposed technique can successfully detect the modification made in an image. The technique detects pixel level modification in a single or multiple pixels.


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


Author(s):  
Akhilesh S Narayan ◽  
Ashish J ◽  
Noor Afreen ◽  
Lithesh V S ◽  
Sandeep R

In this project we are comparing different architectures and adding the features that increases the efficiency of our architecture. Few of them are including multiplexers in the message digester, using different adder architectures in the required places, reducing the critical path by breaking the longest path and making them to operate parallelly. Use of multiplexers reduces the number of registers required in the message expander. It simply transfers the output of expander to compressor block in every clock cycle. Whenever the number of cycle is greater than 16, the multiplexer switches the select line so that the computed message digest to send as output to the compressor. Using of a carry save adder and adder array takes lesser time to perform addition than a pair of adders array. Finally we all know that reducing the critical path reduces the overall operation time and hence increases the efficiency. Considering all these factors in the design we are designing the microarchitecture for SHA-256 algorithm and obtain the RTL code for that architecture. We have also verified the design by designing a test-bench, and finally synthesized the design.


2019 ◽  
Vol 2 (1) ◽  
Author(s):  
Wildatunnisa Fahriah ◽  
Tulus Febrianto

Short Message Service (SMS) is a communication technology that is very popular. By using SMS someone can exchange messages with others. However, with the wiretapping issue sms, a person no longer has the right to privacy. So the program was made on a mobile phone-based application that will change the android SMS messages into codes so that information from SMS in not known by others. When sending SMS, this application will encrypt the message into shape with a key codes entered by the sender. And when the acceptance of SMS, this application will describe the codes message into form of the original message using the same key with the sender. This application was made in the android based application to send an important message to others without fear of being noticed by others. The method used in the application to encrypt and decrypt the messages are methods Block Cipher Algorithm or also called blowfish method and its implementation using the java programming language with the android mobile platform.


Sign in / Sign up

Export Citation Format

Share Document