Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital

Imam Saputra, Surya Darma Nasution

Abstract


In the digital era, changing human habits, one of the changing habits is in applying for someone's job. Before the digital era, applying for a job by sending an application to the address of the destination company. In the digital era, as now, applying for jobs can be done boldly, and sent in softcopy. This softcopy file forms a digital image that can be easily manipulated. How would it be difficult for the receiving committee to determine the original file with the manipulated a file. With the existing questions, we need a technique that can be used to request the originality of the job application file. One technique that can be used is the hash function that exists in cryptography. The hash function is a one-way function that can be used to find a message. If applied to digital images, the originality of the image can be recognized. The algorithm in the hash function used is Secure Hash Algorithm 256 (SHA256) until now this algorithm cannot be solved by cryptanalysts. By applying the Secure Hash Algorithm 256 algorithm, it will make it easier and faster to access the originality of digital images.

Full Text:

PDF

References


A. dan D. S. M. Ghosh, “Review Paper on Secure Hash Algorithm With Its Variants,” International Journal of Innovation in Modern Engineering & Science (IJTIMES), vol. III, no. 05, pp. 1-7, 2017.

D. Rachamawati, J. T. Tarigan dan A. B. C. Ginting, “A Comparative Study of Message Digest 5 (MD5) and SHA-256 Algorithm,” dalam 2nd International Conference on Computing and Applied Informatics 2017, Medan, 2018.

T. Kirubakaran, K. Srinivasan, P. J. Vignesh dan V. V. A, “Implementation of Secure Hash Algorithm-256,” International Journal of Engineering Science and Computing (IJESC), pp. 5785-5788, 2017.

T. Sutoyo, E. Mulyanto, V. Suhartono, O. N. Nurhayati dan W. , Teori Pengolahan Citra Digital, Yogyakarta: Andi, 2009.

D. Putra, Pengolahan Citra Digital, Yogyakarta: Andi, 2010.

R. Munir, Kriptografi, Bandung: Informatika Bandung, 2006.

Y. Kurniawan, Kriptografi Keamanan Internet dan Jaringan Komunikasi, Bandung: Informatika, 2017.

F. I. P. Standards Publications, “Secure Hash Standard,” National Institute of Standards and Technology, Amerika Serikat, 2002.




DOI: http://dx.doi.org/10.30645/senaris.v1i0.20

Refbacks

  • There are currently no refbacks.


&nbsp