scholarly journals Perancangan Kios Buku Online Dengan Menerapkan Algoritma MD5 Dalam Pengamanan Record Login

Author(s):  
Amin Setiawan Lahagu ◽  
Harvei Desmon Hutahaean

Online book stall is one form of e-commerce in cyberspace, all the time the sale and purchase transactions of books can be done at any time, but along with the development of online transactions, data controls should also be improved. To avoid data from damage caused by irresponsible people, it is necessary to secure data by applying cryptography to the data. In modern times there are many methods or algorithms that can be used to protect and control data from various attacks, but each of these algorithms certainly has its own weaknesses and strengths. The need for long-distance transactions and the importance of data security caused developers to continue to develop cryptography. MD5 algorithm is a one-way hash function that is often used in cryptography, especially in web-based transactions. The MD5 algorithm encodes data in a constant form of 32 bits. All processes from sales and purchase transactions in online bookstores will be safe and durable when the bookstore database is designed in such a way. The book stall database records are encoded with the MD5 algorithm, especially for logging records as a gateway for hackers or hackers to infiltrate. All transactions in the online book kiosk system are detected by the database, the resilience of the database from all attacks is the control of the system from all kinds of damage.

Author(s):  
K. Ramprakaash ◽  
S. Ramkumar ◽  
R. K. Santhosh ◽  
P. Shanmuga Priya

Steganography and Cryptography are two major fields which is widely used for data security. With the help of these technologies, data security is provided in banking system. In the proposed method, the online transactions are done virtually using hash function. Encryption of data is done by using the cryptographic hash function algorithm. The proposed approach implements an efficient algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network. The authentication details of the sender and the receiver is hidden to achieve a secure transmission. The proposed approach provides better integrity and confidentiality. This paper implemented a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sensi Journal ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 236-246
Author(s):  
Ilamsyah Ilamsyah ◽  
Yulianto Yulianto ◽  
Tri Vita Febriani

The right and appropriate system of receiving and transferring goods is needed by the company. In the process of receiving and transferring goods from the central warehouse to the branch warehouse at PDAM Tirta Kerta Raharja, Tangerang Regency, which is currently done manually is still ineffective and inaccurate because the Head of Subdivision uses receipt documents, namely PPBP and mutation of goods, namely MPPW in the form of paper as a submission media. The Head of Subdivision enters the data of receipt and mutation of goods manually and requires a relatively long time because at the time of demand for the transfer of goods the Head of Subdivision must check the inventory of goods in the central warehouse first. Therefore, it is necessary to hold a design of information systems for the receipt and transfer of goods from the central warehouse to a web-based branch warehouse that is already database so that it is more effective, efficient and accurate. With the web-based system of receiving and transferring goods that are already datatabed, it can facilitate the Head of Subdivision in inputing data on the receipt and transfer of goods and control of stock inventory so that the Sub Head of Subdivision can do it periodically to make it more effective, efficient and accurate. The method of data collection is done by observing, interviewing and studying literature from various previous studies, while the system analysis method uses the Waterfall method which aims to solve a problem and uses design methods with visual modeling that is object oriented with UML while programming using PHP and MySQL as a database.


2010 ◽  
Vol 130 (12) ◽  
pp. 2276-2285
Author(s):  
Shintaro Yanagihara ◽  
Akira Ishihara ◽  
Toshinao Ishii ◽  
Junichi Kitsuki ◽  
Kazuo Seo

Sign in / Sign up

Export Citation Format

Share Document