Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio


Authors

  • Rezky M. Nasution Universitas Budi Darma, Medan, Indonesia

DOI:

https://doi.org/10.47065/bulletincsr.v2i3.140

Keywords:

Kriptografi; File Audio; SHA-1

Abstract

Audio file is a means of information from one person to another. Audio files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of audio files, this can be done by using cryptographic techniques. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA stands for Secure Hash Algorithm is a standard hash function published by NIST (National Institute of Standards and Technology). SHA is published with a digest size of 512 bits. SHA-1 will output 160 bits of the string and the output string is called a message digest. The length of the message digest can range from 160 to 512 bits depending on the algorithm. This study describes the security process for detecting the authenticity of audio files using the SHA-1 method in the form of detection so that confidential audio sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of audio files.

Downloads

Download data is not yet available.

References

K. Aryasa and Y. T. Paulus, “Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java,” Creat. Inf. Technol. J., vol. 1, no. 1, p. 57, 2018.

K. D. Wandani and S. Sinurat, “IMPLEMENTASI SECURE HASH ALGORITMA UNTUK PENGAMANAN PADA FILE VIDEO,” vol. 13, pp. 165–168, 2018.

M. K. Emy Setyaningsih, S.Si., Kriptografi & Implementasinya menggunakan MATLAB. Yogyakarta: ANDI, 2015.

Rifki Sadikin, Kriptografi untuk keamanan jaringan dan implementasi dalam Bahasa Java. Yogyakarta: ANDI, 2012.

Dony Ariyus, PENGANTAR ILMU KRIPTOGRAFI Teori Analisis & Implementasi. Yogyakarta, 2008.

Dimaz A Wijaya, MENGENAL BITCOIN & CRYPTOCURRENCY. Medan, 2016.

R. Prasetyo and A. Suryana, “Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 5, no. 2, p. 61, 2018.

H. Santoso and M. Fakhriza, “Perancangan Aplikasi File Audio Format Wav ( Waveform ) Menggunakan Algoritma Rsa,” Algoritm. J. Ilmu Komput. dan Inform., vol. 2, no. 1, pp. 47–54, 2018.

http://www.den4b.com/products/hasher/


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio

Dimensions Badge

ARTICLE HISTORY

Published: 2022-08-31

Abstract View: 483 times
PDF Download: 959 times

How to Cite

M. Nasution, R. (2022). Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio. Bulletin of Computer Science Research, 2(3), 73-84. https://doi.org/10.47065/bulletincsr.v2i3.140

Issue

Section

Articles