Please use this identifier to cite or link to this item: http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/5342
Full metadata record
DC FieldValueLanguage
dc.contributor.authorEdi, Victor-
dc.date.accessioned2022-09-30T09:03:01Z-
dc.date.available2022-09-30T09:03:01Z-
dc.date.issued2020-01-01-
dc.identifier.urihttp://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/5342-
dc.descriptionIn conveying information, security is very important to be implemented in it. In making a data document, most users use an application called Ms. Office, the software has many types of applications that can form a document including Ms. Word, Ms. Excel, Ms. Power Point and so on. Most users use application Ms. Word to form a document data. But there are also many Ms. Wordusers that does not care about information security in it. Those who are not responsible in the exchange of information can steal and modify the message in it. Therefore, researchers propose security in the word file, the security that can be applied is cryptography and hash functions that have the purpose to test the integrity of a data and prevent third parties from modifying the data.en_US
dc.description.abstractThe development of information technology that is increasingly racing today makes it easy for anyone to exchange data or information. On the other hand, there are problems with data security which can be disrupted by irresponsible parties such as wiretapping, destruction, data theft or other misuse. The application of cryptographic techniques is one solution that can be done to overcome these security problems. Cryptography is the science or art of maintaining data security by scrambling data or messages. In cryptography the termhashone-wayfunction is widely used to test the integrity of a file. In this study, cryptographic algorithms andhashfunctions used are Nihilist Cipher and MD5. Messages or files textthat will be sent are firstencrypted using thealgorithm Nihilist Cipher. Then the MD5 algorithm is used to get thehashvalue from the encrypted message. Furthermore, to get the original message back bydecryption Nihilist Cipher, thefileverification process is first done to ensure that thefile receivedhas not changed or is still original. The results show that thealgorithms Nihilist Cipher and MD5can be implemented properly so that data security can be increased because before decrypting the message, the message has to be verified first.en_US
dc.publisherIOP Publishingen_US
dc.titlePaper Implementation Of Nihilist Chiperen_US
dc.typeOtheren_US
Appears in Collections:

Files in This Item:
File Description SizeFormat 
11. Paper Implementation Of Nihilist Chiper_Edy_001.pdf556.71 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.