Penerapan Digital Signature Untuk Identitas File Audio Dengan Metode Snefru
Abstract
In the era of information technology that is developing very rapidly, the use of signatures has been widely applied digitally through digital signatures. Digital signatures along with the times have led to the need for authentication of data or files that are used digitally. Its use also aims to avoid counterfeiting or interference. Currently, the use of digital signatures has been widely applied to software distribution, financial transactions, file transfers. The crime of falsifying audio files is a serious problem in various fields. Audio authenticity testing is important and significant in all social areas, especially when audio is used as evidence for conclusions in courts, the basis for judicial decision-making, and corporate reports. Forgery of audio files will cause losses that cannot be estimated. One solution to the problems mentioned above is to perform the process of assigning an identity to the audio file, so that it can be seen that the audio cannot be manipulated. The SNEFRU method is a hash function to detect changes in digital audio. SNEFRU has several variants, varying in number of operands and hash size. The supported hash sizes are 128 and 256 bits. The number of passes in the final 2-pass variant source of SNEFRU is two passes, while a more secure 4-pass version is also available. After the previous attack was published, the 8-pass version was introduced as well. This 8-pass version is still considered safe.
References
Munir, R. (2005). Penggunaan Tanda-Tangan Digital untuk Menjaga Integritas Berkas Perangkat Lunak. In Seminar Nasional Aplikasi Teknologi Informasi (SNATI).
Bruce, S. (1996). Applied cryptography. 2nd John Wiley and Sons, Inc.
Biham, E. (2008, February). New techniques for cryptanalysis of hash functions and improved attacks on Snefru. In International Workshop on Fast Software Encryption (pp. 444-461). Springer, Berlin, Heidelberg.
Arifin, R., & Oktoviana, L. T. (2013). Implementasi Kriptografi dan Steganografi menggunakan Algoritma RSA dan metode LSB. Universitas Malang.
Zebua, T. (2018). Encoding the record database of computer based test exam based on spritz algorithm. Lontar Komput. J. Ilm. Teknol. Inf, 9(1), 52-62.c
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International Journal of Security and Its Applications, 9(7), 241-246.
Thakur, J., & Kumar, N. (2011). DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International journal of emerging technology and advanced engineering, 1(2), 6-12.
Mohtashim, (2015,apr.9). Cryptografy Hash Functions [online]. Available:https://www.tutorialspoint.com/cryptography/cryptography.htm
Indrawan, R. (2004). Penerapan metode enkripsi IDEA dan fungsi hash SNEFRU untuk keamanan dokumen (Doctoral dissertation, Petra Christian University).
Kusuma, I. J. (2017). ANALISIS TEKNIK STEGANOGRAFI PADA AUDIO MP3 MENGGUNAKAN METODE PARITY CODING DAN ENKRIPSI CIPHER TRANSPOSITION. Jurnal Elektronik Sistem Informasi dan Komputer, 3(2), 1-8.
Setyaningsih, E., & Si, S. (2015). Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: Andi.
Munir, R. (2005). Penggunaan Tanda-Tangan Digital untuk Menjaga Integritas Berkas Perangkat Lunak. In Seminar Nasional Aplikasi Teknologi Informasi (SNATI).
Iswahyudi, C., & Risgianto, I. (2008). Penyisipan Pesan Rahasia pada Teks Digital dengan Teknik Steganografi. Jurnal Teknologi, 1(1), 24-29.
Djuwitaningrum, E. R., & Apriyani, M. (2017). Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator. JUITA: Jurnal Informatika, 4(2), 79-85.
Arini, G. M., & Widyawan, T. I. (2012). Pengamanan Pesan Steganografi dengan Metode LSB Berlapis Enkripsi dalam PHP. Pengamanan Pesan Steganografi dengan Metod. LSB Berlapis Enkripsi dalam PHP, 3, 11.
Sukamto, R. A., & Shalahuddin, M. (2011). Modul pembelajaran rekayasa perangkat lunak (terstruktur dan berorientasi objek). Bandung: Modula.
Nugroho, A. (2010). Rekayasa perangkat lunak berorientasi objek dengan metode USDP. Penerbit Andi.
Hendrayudi, V. B. (2009). untuk Berbagai Keperluan Programming. Jakarta: PT Elex Media Komputindo.
Copyright (c) 2022 Muhammad Fajri

This work is licensed under a Creative Commons Attribution 4.0 International License.



