2019
DOI: 10.30645/senaris.v1i0.20
|View full text |Cite
|
Sign up to set email alerts
|

Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital

Abstract: In the digital era, changing human habits, one of the changing habits is in applying for someone's job. Before the digital era, applying for a job by sending an application to the address of the destination company. In the digital era, as now, applying for jobs can be done boldly, and sent in softcopy. This softcopy file forms a digital image that can be easily manipulated. How would it be difficult for the receiving committee to determine the original file with the manipulated a file. With the existing questi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 2 publications
0
2
0
2
Order By: Relevance
“…Fungsi G, H, dan I bekerja sama dengan fungsi F, menghasilkan nilai X, Y, dan Z bitwise secara paralel, dan jika produk X, Y, dan Z independen dan tidak bias, maka setiap keluaran G, H, dan I tidak bias dan independent. Langkah ini menggunakan 64 kata T yang dihasilkan oleh fungsi sinus [20].…”
Section: F (X Y Z) = (X and Y) | ((~X) And Z) G (X Y Z) = (X And Z) |...unclassified
“…Fungsi G, H, dan I bekerja sama dengan fungsi F, menghasilkan nilai X, Y, dan Z bitwise secara paralel, dan jika produk X, Y, dan Z independen dan tidak bias, maka setiap keluaran G, H, dan I tidak bias dan independent. Langkah ini menggunakan 64 kata T yang dihasilkan oleh fungsi sinus [20].…”
Section: F (X Y Z) = (X and Y) | ((~X) And Z) G (X Y Z) = (X And Z) |...unclassified
“…SHA-256 menghasilkan message digest dengan panjang 256 bits. SHA-256 tergolong aman karena didesain sedemikian rupa sehingga tidak memungkinkan mendapatkan pesan yang perhubungan dengan message digest yang sama [1].…”
Section: Pendahuluanunclassified
“…A mathematical function known as a hash algorithm converts input data, or messages, into a set of hash values that uniquely represent that input (Santoso et al, 2019). Integrating digital signatures and hash algorithms with blockchain can increase data security (Saputra & Nasution, 2019). Improving the security of digital certificates can be done with the verification and validation process on the blockchain network [4].…”
Section: Introductionmentioning
confidence: 99%