DC Field | Value | Language |
dc.contributor.author | Edi, Victor | - |
dc.date.accessioned | 2022-09-30T09:03:01Z | - |
dc.date.available | 2022-09-30T09:03:01Z | - |
dc.date.issued | 2020-01-01 | - |
dc.identifier.uri | http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/5342 | - |
dc.description | In conveying information, security is very important to be implemented in it. In making a data
document, most users use an application called Ms. Office, the software has many types of
applications that can form a document including Ms. Word, Ms. Excel, Ms. Power Point and so on.
Most users use application Ms. Word to form a document data. But there are also many Ms.
Wordusers that does not care about information security in it. Those who are not responsible in the
exchange of information can steal and modify the message in it. Therefore, researchers propose
security in the word file, the security that can be applied is cryptography and hash functions that have
the purpose to test the integrity of a data and prevent third parties from modifying the data. | en_US |
dc.description.abstract | The development of information technology that is increasingly racing today makes it
easy for anyone to exchange data or information. On the other hand, there are problems with data
security which can be disrupted by irresponsible parties such as wiretapping, destruction, data
theft or other misuse. The application of cryptographic techniques is one solution that can be
done to overcome these security problems. Cryptography is the science or art of maintaining data
security by scrambling data or messages. In cryptography the termhashone-wayfunction is
widely used to test the integrity of a file. In this study, cryptographic algorithms
andhashfunctions used are Nihilist Cipher and MD5. Messages or files textthat will be sent are
firstencrypted using thealgorithm Nihilist Cipher. Then the MD5 algorithm is used to get
thehashvalue from the encrypted message. Furthermore, to get the original message back
bydecryption Nihilist Cipher, thefileverification process is first done to ensure that thefile
receivedhas not changed or is still original. The results show that thealgorithms Nihilist Cipher
and MD5can be implemented properly so that data security can be increased because before
decrypting the message, the message has to be verified first. | en_US |
dc.publisher | IOP Publishing | en_US |
dc.title | Paper Implementation Of Nihilist Chiper | en_US |
dc.type | Other | en_US |
Appears in Collections: |
|