Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio
DOI:
https://doi.org/10.47065/bulletincsr.v2i3.140Keywords:
Kriptografi; File Audio; SHA-1Abstract
Audio file is a means of information from one person to another. Audio files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of audio files, this can be done by using cryptographic techniques. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA stands for Secure Hash Algorithm is a standard hash function published by NIST (National Institute of Standards and Technology). SHA is published with a digest size of 512 bits. SHA-1 will output 160 bits of the string and the output string is called a message digest. The length of the message digest can range from 160 to 512 bits depending on the algorithm. This study describes the security process for detecting the authenticity of audio files using the SHA-1 method in the form of detection so that confidential audio sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of audio files.
Downloads
References
K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,” Creat. Inf. Technol. J., vol. 1, no. 1, p. 57, 2018.
K. D. Wandani and S. Sinurat, “IMPLEMENTASI SECURE HASH ALGORITMA UNTUK PENGAMANAN PADA FILE VIDEO,” vol. 13, pp. 165–168, 2018.
M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya menggunakan MATLAB. Yogyakarta: ANDI, 2015.
Rifki Sadikin, Kriptografi untuk keamanan jaringan dan implementasi dalam Bahasa Java. Yogyakarta: ANDI, 2012.
Dony Ariyus, PENGANTAR ILMU KRIPTOGRAFI Teori Analisis & Implementasi. Yogyakarta, 2008.
Dimaz A Wijaya, MENGENAL BITCOIN & CRYPTOCURRENCY. Medan, 2016.
R. Prasetyo and A. Suryana, “Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 5, no. 2, p. 61, 2018.
H. Santoso and M. Fakhriza, “Perancangan Aplikasi File Audio Format Wav ( Waveform ) Menggunakan Algoritma Rsa,” Algoritm. J. Ilmu Komput. dan Inform., vol. 2, no. 1, pp. 47–54, 2018.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2022 Rezky M. Nasution

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).