Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.

2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Encryption is needed in the digital world. It can help users to secure confidential information that will be sent. Many algorithms can be used to do that. RC4 or Rivest Cipher 4 made by Ron Rivest is a synchronous type of stream cipher that is a cipher that has a symmetric key and encrypts or decrypts plaintext bits per bit by performing XOR operations with a number generated on S-BOX. RC4 can be run with variable key lengths and operate with byte orientation. RC4 encryption method has weaknesses. One of the disadvantages of RC4 is that the attacker can know the sample or the entire plaintext of the ciphertext without having to know the encryption key. RC4 merger with Adler32 will help improve data security. Adler32 still has weaknesses. Although these weaknesses are rare, if a third party can combine the values of A and B according to the modified results in the text, changes in information can occur even though the feature value of the hash function has the same value before and after modification. The hash function value can be solved to get the A and B values; then the information will be modified and adjusted to the A and B values. The result is that the information is no longer original while the hash function indicates that the information is still original. However, Adler32 is very helpful when combined with RC4 where both algorithms work together to improve the security and validity of a document.


Author(s):  
Rahmat Ferdiansyah ◽  
Paska Marto Hasugian

Cryptography is a technique of data security by processing the data (plaintext) using an encryption method so that the the data can not be read directly, especially by unauthorized parties. Confidential Data and information need to get serious attention considering the value of information contained in it so that procedures are needed to hide the messages stored Therein. Data security Becomes very important at this time, Because for every decision or policy making must be based on the data. Md5 is a substitute for MD4, MD5 is one of the most Widely used one-way hash functions, MD5 processes the input into blocks of 512 bits, the output of md5 is 128 bits and has a fixed length. MD5 algorithm is Widely used for various purposes in making security in applications, it is Often used to help login validation on the use of passwords stored in the database system


2021 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Arief Saptono ◽  
Abdul Malik ◽  
Muhamad Satim

Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.


2010 ◽  
Vol 23 (3) ◽  
pp. 357-366
Author(s):  
Miodrag Milic ◽  
Vojin Senk

In this paper we present results of uniform logical cryptanalysis method applied to cryptographic hash function CubeHash. During the last decade, some of the most popular cryptographic hash functions were broken. Therefore, in 2007, National Institute of Standards and Technology (NIST), announced an international competition for a new Hash Standard called SHA-3. Only 14 candidates passed first two selection rounds and CubeHash is one of them. A great effort is made in their analysis and comparison. Uniform logical cryptanalysis presents an interesting method for this purpose. Universal, adjustable to almost any cryptographic hash function, very fast and reliable, it presents a promising method in the world of cryptanalysis.


2017 ◽  
Vol 4 ◽  
pp. 82-86
Author(s):  
Dawid Górniak ◽  
Piotr Kopniak

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.


Sign in / Sign up

Export Citation Format

Share Document