Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya. Oleh karena itu diperlukan kriptografi. Tujuan dari penelitian ini adalah mengimplementa...
| Published in: | Techno.Com |
|---|---|
| Main Authors: | Hajra Rasmita Ngemba, - Ifandi, Syaiful Hendra, I Gusti Ngurah Agung Kade Dwi Arsana |
| Format: | Article |
| Language: | Indonesian |
| Published: |
Universitas Dian Nuswantoro
2023-08-01
|
| Subjects: | |
| Online Access: | http://publikasi.dinus.ac.id/index.php/technoc/article/view/8299 |
Similar Items
High-speed SHA-256 algorithm implementation(高速SHA-256算法硬件实现)
by: CHENHua-feng(陈华锋)
Published: (2009-11-01)
by: CHENHua-feng(陈华锋)
Published: (2009-11-01)
SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context
by: Carlos E. B. Santos, et al.
Published: (2024-06-01)
by: Carlos E. B. Santos, et al.
Published: (2024-06-01)
Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices
by: Iain Baird, et al.
Published: (2025-07-01)
by: Iain Baird, et al.
Published: (2025-07-01)
Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA
by: Nizirwan Anwar, et al.
Published: (2018-12-01)
by: Nizirwan Anwar, et al.
Published: (2018-12-01)
Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop
by: Ratno Prasetyo, et al.
Published: (2016-09-01)
by: Ratno Prasetyo, et al.
Published: (2016-09-01)
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
by: Riley Vaughn, et al.
Published: (2024-09-01)
by: Riley Vaughn, et al.
Published: (2024-09-01)
Kombinasi AES dan HMAC SHA-256 untuk Pengamanan Parameter URL dari Serangan SQL Injection
by: Gagan Akhmad Fauzi, et al.
Published: (2025-06-01)
by: Gagan Akhmad Fauzi, et al.
Published: (2025-06-01)
Custom ASIC Design for SHA-256 Using Open-Source Tools
by: Lucas Daudt Franck, et al.
Published: (2023-12-01)
by: Lucas Daudt Franck, et al.
Published: (2023-12-01)
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
by: V. V. Davydov, et al.
Published: (2025-07-01)
by: V. V. Davydov, et al.
Published: (2025-07-01)
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application
by: Kazuki Nakamura, et al.
Published: (2021-10-01)
by: Kazuki Nakamura, et al.
Published: (2021-10-01)
Peningkatan Keamanan Basis Data menggunakan Kombinasi Algoritma RC4 dan SHA3-512
by: Asep Rizal Nurjaman, et al.
Published: (2024-08-01)
by: Asep Rizal Nurjaman, et al.
Published: (2024-08-01)
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
by: Yaacov Belenky, et al.
Published: (2023-06-01)
by: Yaacov Belenky, et al.
Published: (2023-06-01)
A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors
by: Ignacio Algredo-Badillo, et al.
Published: (2022-07-01)
by: Ignacio Algredo-Badillo, et al.
Published: (2022-07-01)
A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords
by: Zhendong Zhang, et al.
Published: (2020-08-01)
by: Zhendong Zhang, et al.
Published: (2020-08-01)
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
by: Shuqin Zhu, et al.
Published: (2018-09-01)
by: Shuqin Zhu, et al.
Published: (2018-09-01)
A Novel Chaotic Image Encryption Algorithm Based on Coordinate Descent and SHA-256
by: Xiyu Sun, et al.
Published: (2022-01-01)
by: Xiyu Sun, et al.
Published: (2022-01-01)
Implementasi Algoritma Rijndael dengan Menggunakan Kunci Enkripsi yang Berukuran Melebihi 256 bit
by: Gracius Cagar Gunawan, et al.
Published: (2013-09-01)
by: Gracius Cagar Gunawan, et al.
Published: (2013-09-01)
Implementasi Pengamanan Citra Digital Berbasis Metode Kriptografi Vernam Cipher
by: Tan Samuel Permana, et al.
Published: (2017-02-01)
by: Tan Samuel Permana, et al.
Published: (2017-02-01)
SENTRIN- IMPLEMENTASI ALGORITMA ENKRIPSI SPECK UNTUK PENGAMANAN MNEMONIC PHRASE PADA CRYPTOCURRENCY WALLET
by: Dimas Tri Mustakim, et al.
Published: (2025-06-01)
by: Dimas Tri Mustakim, et al.
Published: (2025-06-01)
Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES)
by: Ibnu Utomo Wahyu Mulyono, et al.
Published: (2018-08-01)
by: Ibnu Utomo Wahyu Mulyono, et al.
Published: (2018-08-01)
Perancangan Federated Learning Berbasis Homomorphic Encryption untuk Perangkat Internet of Things
by: Yuris Mulya Saputra, et al.
Published: (2023-05-01)
by: Yuris Mulya Saputra, et al.
Published: (2023-05-01)
STEGANOGRAFI PADA CITRA JPEG DENGAN METODE SEQUENTIAL DAN SPREADING
by: I Nyoman Piarsa
Published: (2012-11-01)
by: I Nyoman Piarsa
Published: (2012-11-01)
Rancang Bangun Teknologi Blockchain Pada Sistem Keamanan Data Jaringan Sensor
by: Adharul Muttaqin, et al.
Published: (2021-08-01)
by: Adharul Muttaqin, et al.
Published: (2021-08-01)
A Combination of SHA-256 and DES for Visual Data Protection
by: Aristides Bima Wintaka, et al.
Published: (2025-05-01)
by: Aristides Bima Wintaka, et al.
Published: (2025-05-01)
Perancangan dan Implementasi Algoritma DES untuk Mikroprosesor Enkripsi dan Dekripsi pada FPGA
by: Imaduddin Amrullah Muslim, et al.
Published: (2015-04-01)
by: Imaduddin Amrullah Muslim, et al.
Published: (2015-04-01)
SENTRIN- Implementasi Algoritma Sparkle Schwaemm128-128 Untuk Proses Enkripsi Pengiriman Data Pada Sensor GPS berbasis IoT dengan Protokol Modul NRF24L01
by: Avis Sugianto, et al.
Published: (2025-06-01)
by: Avis Sugianto, et al.
Published: (2025-06-01)
Rancang Bangun Sistem Keamanan RFID Tag menggunakan Metode Caesar Cipher pada Sistem Pembayaran Elektronik
by: DECY NATALIANA, et al.
Published: (2019-09-01)
by: DECY NATALIANA, et al.
Published: (2019-09-01)
Implementasi Sistem Keamanan Database Menggunakan Metode Triangle Chain
by: Yeni Yanti, et al.
Published: (2018-03-01)
by: Yeni Yanti, et al.
Published: (2018-03-01)
Hybrid Chaotic-Based PRNG for Secure Cryptography Applications
by: Abdullah M. Alnajim, et al.
Published: (2023-06-01)
by: Abdullah M. Alnajim, et al.
Published: (2023-06-01)
A Lightweight authentication scheme for IoT against Rogue Base Station Attacks
by: Mikail Mohammed Salim, et al.
Published: (2022-08-01)
by: Mikail Mohammed Salim, et al.
Published: (2022-08-01)
Detection of malware in downloaded files using various machine learning models
by: Akshit Kamboj, et al.
Published: (2023-03-01)
by: Akshit Kamboj, et al.
Published: (2023-03-01)
Enhancing VANET Security using Blockchain and SHA3-256 in Python
by: Liqaa Saadi Mezher, et al.
Published: (2025-06-01)
by: Liqaa Saadi Mezher, et al.
Published: (2025-06-01)
Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm
by: Zainab Abdullah Jasim, et al.
Published: (2025-01-01)
by: Zainab Abdullah Jasim, et al.
Published: (2025-01-01)
Secure Medical Blockchain Model
by: Ibrahim Shawky Farahat, et al.
Published: (2023-01-01)
by: Ibrahim Shawky Farahat, et al.
Published: (2023-01-01)
Benchmark datasets for SARS-CoV-2 surveillance bioinformatics
by: Lingzi Xiaoli, et al.
Published: (2022-09-01)
by: Lingzi Xiaoli, et al.
Published: (2022-09-01)
A Chabot Supported Secured Portal for Affordable Artificial Limbs
by: Chythanya N. Krishna, et al.
Published: (2023-01-01)
by: Chythanya N. Krishna, et al.
Published: (2023-01-01)
An algorithm for securing user credentials by combining Encryption and Hashing method
by: Awlad Hossain, et al.
Published: (2020-12-01)
by: Awlad Hossain, et al.
Published: (2020-12-01)
Hash Algorithm In Verification Of Certificate Data Integrity And Security
by: Muhammad Rehan Anwar, et al.
Published: (2021-09-01)
by: Muhammad Rehan Anwar, et al.
Published: (2021-09-01)
LIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF THINGS USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM
by: Arkan A. Saffer, et al.
Published: (2023-07-01)
by: Arkan A. Saffer, et al.
Published: (2023-07-01)
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
by: Fahmi Basya, et al.
Published: (2022-01-01)
by: Fahmi Basya, et al.
Published: (2022-01-01)
Similar Items
-
High-speed SHA-256 algorithm implementation(高速SHA-256算法硬件实现)
by: CHENHua-feng(陈华锋)
Published: (2009-11-01) -
SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context
by: Carlos E. B. Santos, et al.
Published: (2024-06-01) -
Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices
by: Iain Baird, et al.
Published: (2025-07-01) -
Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA
by: Nizirwan Anwar, et al.
Published: (2018-12-01) -
Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop
by: Ratno Prasetyo, et al.
Published: (2016-09-01)
