Penerapan Teknik Digital Signature Dalam Pengamanan Piagam Penghargaan Menggunakan Algoritma SHA-1 dan RSA

  • Nur Hanyfa Sari * Mail Universitas Budi Darma, Indonesia
Keywords: : Kriptografi, Tanda Tangan Digital (Digital Signature), Algoritma SHA-1, Algoritma RSA

Abstract

Competition often occurs between individuals to achieve a certain position or position, such as obtaining postgraduate scholarships, applying for jobs, and pursuing important government positions. In addition to research from the aspects of ability and educational background, experience is also one of the factors supporting a person to succeed in achieving the position he wants. To anticipate manipulation or change, digital files can be a solution. Of course, even digital files still need security in order to ensure safety and authenticity (there are no changes to the contents of the file). Therefore we need a solution to this problem, one of the cryptographic techniques that can be used is a digital signature. Choosing a digital signature as a solution is considered very appropriate, because the digital signature is a sign on the data, which can ensure that the data is real (unchanged). So that by applying the digital signature technique to the award certificate, authentication and identification of ownership of the award certificate can be conceptually guaranteed. To protect the maximum validity of a digital file with a digital signature technique, the algorithms that will be used are the SHA-1 and RSA algorithms which are considered sufficient to ensure the security of a digital file.

References

M. Bobbi, K. Nasution, A. Karim, and S. Esabella, “Sistem Pendukung Keputusan Penilaian Kinerja Ketua Program Studi Menerapkan Metode WASPAS dengan Pembobotan ROC,” vol. 4, no. 1, pp. 130–136, 2022, doi: 10.47065/bits.v4i1.1619.

M. Mesran, S. D. Nasution, S. Syahputra, A. Karim, and E. Purba, “Implementation of the Extended Promethee II in Upgrade Level of Mechanic,” Int. J. Sci. Res. Sci. Technol., vol. 4, no. 2, pp. 125–130, 2018.

S. Dharma Hardi et al., “Implementation of Computer Based Systems for Effective Deci-sions in Acceptance of Vikar,” Int. J. Eng. Technol., vol. 7, no. 3, pp. 101–104, 2018, [Online]. Available: www.sciencepubco.com/index.php/IJET.

Abdul Karim, “Implementasi Metode Multi-Objective Optimization On The Basis Of Ratio Analysis dalam Seleksi Mahasiswa Program Indonesia Pintar,” Bull. Comput. Sci. Res., vol. 3, no. 5, pp. 351–356, 2023, doi: 10.47065/bulletincsr.v3i5.283.

B. S. Hasugian, "PERANAN KRIPTOGRAFI SEBAGAI KEAMANAN SISTEM INFORMASI PADA USAHA KECIL DAN MENENGAH," Jurnal Warta, vol. 53, Juli 2017.

S. and P. D. Atika, "DIGITAL SIGNATURE DENGAN ALGORITMA SHA-1 DAN RSA SEBAGAI AUTENTIKASI," Jurnal Cendikia, vol. XVI, Oktober 2018.

M. A. J, P. O. C van and S. A. Vanstone, Handbook of Applied Cryptography, USA: CRC Press, 1996.

H. Jogiyanto, Analisa dan Desain Sistem Informasi: Pendekatan Terstruktur Teori dan Praktik Aplikasi Bisnis, Yogyakarta: ANDI, 2005.

R. Munir, Kriptografi, Yogyakarta: Informatika Bandung, 2006.

M. Hanafi, "Aplikasi Pengajuan Surat Digital Menggunakan Algoritma RSA Pada LPPM UIN SUSKA," Pekan Baru, 2019.

Dimensions Badge
Published
2024-07-29
Section
Articles