ANALISIS DAN PERANCANGAN KEAMANAN DATA TEKS MENGGUNAKAN ALGORITMA KRIPTOGRAFI SECURE HASH ALGORITHM
DOI:
https://doi.org/10.33884/comasiejournal.v10i5.8611Keywords:
Cryptographic Algorithm, Data Security, Hash Value, Secure Hash Algorithm, Authenticity Verification.Abstract
Data security is a crucial aspect in today's digital era, especially with the increasing exchange of information over the network, so network security seeks to secure from physical and logical dangers and threats that can steal personal data. This research aims to analyse and design a text data security system by utilising the Secure Hash Algorithm (SHA) cryptographic algorithm in order to increase the level of security and integrity of text data through the application of reliable cryptographic technology. The research method used is Secure Hash Algorithm (SHA) 256 to analyse text data, and later the text data will be processed using the SHA 256 application to find out how it works and its implementation on securing text data. The results for how SHA works have a predetermined initial value for each hash literacy generated from several prime numbers, the message to be hashed is divided into smaller blocks, each of which has a length of 512 bits and padding is done so that the length of the text can be divided by 512 which later for each text block is processed repeatedly for 64 rounds, after all text blocks are processed, the resulting hash value is a series of bits with a certain length. The results for the SHA implementation steps are first to take the text data to be secured, then convert the text data into ASCII/Unicode format, run the SHA algorithm to find the hash value, save the hash value into the database, then verify the authenticity of the text data, run the SHA algorithm on the data and compare the hash value generated with the hash value previously stored, if the result is the same, then the text data is original. Recommendations that can be given are to explore and develop the blockhchain side and improve the SHA 256 application in the testing section.fritzing.
References
Amarudin. (2018). Analisis Dan Implementasi Keamanan Jaringan Pada Mikrotik Router Menggunakan Metode Port Knocking. Seminar Nasional Sains Dan Teknologi 2018, 1–7.
Aryasa, K., & Paulus, Y. T. (2015). Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java. Creative Information Technology Journal, 1(1), 57. https://doi.org/10.24076/citec.20
v1i1.10
Sari, I. Y., Muttaqin, Jamaludin, Simarmata, J., Rahman, M. A., Iskandar, A., Pakpahan, A. F., Karim, A., Sugianto, Giap, Y.
C., Hazriani, Yendrianof, D., & Manullang, S. O. (2021).
Keamanan Data dan Informasi. Silalahi, L., & Sindar, A. (2020). Penerapan Kriptografi
Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1. Jurnal Nasional Komputasi Dan Teknologi Informasi (JNKTI), 3(2), 182–186. https://doi.org/10.32672/jnkti.v3 i2.2413
Sulistiyawati, A., & Supriyanto, E. (2021). Implementasi Algoritma K-means Clustring dalam Penetuan Siswa Kelas
Unggulan. Jurnal Tekno Kompak, 15(2), 25. https://doi.org/10.33365/jtk.v15i 2.1162
Sutejo, S. (2021). Implementasi Algoritma Kriptografi Rsa (Rivest Shamir Adleman) Untuk Keamanan Data Rekam Medis
Pasien. INTECOMS: Journal of Information Technology and Computer Science, 4(1), 104– 114. https://doi.org/10.31539/intecom s.v4i1.2437
Saragih, S. P. (2018a). Implementasi Octave-S Dalam Evaluasi Manajemen Resiko Sistem Informasi Pada Balai Pelatihan Kesehatan Batam. JURNAL ILMIAH INFORMATIKA, 6(01), 17. https://doi.org/10.33884/jif.v6i01.413