Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra
DOI:
https://doi.org/10.54367/means.v4i1.316Keywords:
Secure Hash Algorithm, Security Algorithm, on ImageAbstract
Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet. Through an internet connection, you can connect with many people. Cryptography aims for messages or images that cannot be seen by other parties who have no interest in the information. Messages or secured images can be data stored in secure computer memory or sent through computer networks. And can protect the confidentiality of images from various threats that arise. To maintain data security, SHA-256 is used when transforming data bytes into string hashes. The system built has been able to implement the SHA 256 algorithm which can change the original image file in the form of unknown files and encrypted images that are difficult to know the original image, unless read using an application that has been built. the image when encrypted and used again at the time of decryption with as many as 45 characters and may be in the form of numbers or letters. The SHA 256 process when encrypted in only one round, can be played with decryption.References
T. Limbong, “Pengujian kriptografi klasik caesar chipper menggunakan matlab,†no. September 2015, 2017.
D. Ariyus, “PENGANTAR ILMU KRIPTOGRAFI Teori Analisis Dan Informasi, Fl,†Yogyakarta CV ANDI OFFSET, 2008.
R. Sadikin, “Kriptografi untuk keamanan jaringan,†Penerbit Andi, Yogyakarta, 2012.
“Kriptografi untuk keamanan jaringan dan implementasinya dalam bahasa Jawa / Rifki Sadikin,†p. 2012, 2012.
I. Wibowo, B. Susanto, and J. Karel T, “Penerapan algoritma Kriptografi Asimetris RSA untuk keamanan data di Oracle,†J. Inform., vol. 5, no. 1, 2009.
T. Sutabri, Analisa Sistem Informasi. Yogyakarta: Andi, 2012.
R. Munir, “Kriptografi,†Inform. Bandung, 2006.
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 MEANS (Media Informasi Analisa dan Sistem)
This work is licensed under a Creative Commons Attribution 4.0 International License.