Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra

Authors

  • Hermansyah Sembiring STMIK Kaputama Binjai
  • Fuzy Yustika Manik STMIK Kaputama Binjai
  • Tengku Zaidah STMIK Kaputama Binjai

DOI:

https://doi.org/10.54367/means.v4i1.316

Keywords:

Secure Hash Algorithm, Security Algorithm, on Image

Abstract

Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet. Through an internet connection, you can connect with many people. Cryptography aims for messages or images that cannot be seen by other parties who have no interest in the information. Messages or secured images can be data stored in secure computer memory or sent through computer networks. And can protect the confidentiality of images from various threats that arise. To maintain data security, SHA-256 is used when transforming data bytes into string hashes. The system built has been able to implement the SHA 256 algorithm which can change the original image file in the form of unknown files and encrypted images that are difficult to know the original image, unless read using an application that has been built. the image when encrypted and used again at the time of decryption with as many as 45 characters and may be in the form of numbers or letters. The SHA 256 process when encrypted in only one round, can be played with decryption.

Author Biographies

Hermansyah Sembiring, STMIK Kaputama Binjai

Dosen Tetap STMIK Kaputama Binjai

Fuzy Yustika Manik, STMIK Kaputama Binjai

Dosen Tetap STMIK Kaputama Binjai

Tengku Zaidah, STMIK Kaputama Binjai

Dosen Tetap STMIK Kaputama Binjai

References

T. Limbong, “Pengujian kriptografi klasik caesar chipper menggunakan matlab,†no. September 2015, 2017.

D. Ariyus, “PENGANTAR ILMU KRIPTOGRAFI Teori Analisis Dan Informasi, Fl,†Yogyakarta CV ANDI OFFSET, 2008.

R. Sadikin, “Kriptografi untuk keamanan jaringan,†Penerbit Andi, Yogyakarta, 2012.

“Kriptografi untuk keamanan jaringan dan implementasinya dalam bahasa Jawa / Rifki Sadikin,†p. 2012, 2012.

I. Wibowo, B. Susanto, and J. Karel T, “Penerapan algoritma Kriptografi Asimetris RSA untuk keamanan data di Oracle,†J. Inform., vol. 5, no. 1, 2009.

T. Sutabri, Analisa Sistem Informasi. Yogyakarta: Andi, 2012.

R. Munir, “Kriptografi,†Inform. Bandung, 2006.

Published

2019-06-30

How to Cite

Sembiring, H., Manik, F. Y., & Zaidah, T. (2019). Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra. MEANS (Media Informasi Analisa Dan Sistem), 4(1), 33–36. https://doi.org/10.54367/means.v4i1.316

Issue

Section

Daftar Artikel

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.