ac

Data Security System login With MD5 Algorithms in Applications deskresy.com

Authors

  • Rahmat Ferdiansyah STMIK Pelita Nusantara
  • Paska Marto Hasugian Lecturer Teknik Informatika, STMIK Pelita Nusantara, Medan

DOI:

10.47709/cnapc.v2i1.359

Keywords:

Cryptography, Data Security, md5

Dimension Badge Record



Abstract

Cryptography is a technique of data security by processing the data (plaintext) using an encryption method so that the the data can not be read directly, especially by unauthorized parties. Confidential Data and information need to get serious attention considering the value of information contained in it so that procedures are needed to hide the messages stored Therein. Data security Becomes very important at this time, Because for every decision or policy making must be based on the data. Md5 is a substitute for MD4, MD5 is one of the most Widely used one-way hash functions, MD5 processes the input into blocks of 512 bits, the output of md5 is 128 bits and has a fixed length. MD5 algorithm is Widely used for various purposes in making security in applications, it is Often used to help login validation on the use of passwords stored in the database system

Downloads

Download data is not yet available.
Google Scholar Cite Analysis
Abstract viewed = 292 times

References

D. Atmodjo, “Peningkatan Keamanan Data dengan Metode Cropping Selection Pseudorandom,” vol. 4, no. 3, pp. 132–138, 2016.

D. M. Khairina, “Analisis Keamanan Sistem Login,” J. Inform. Mulawarman, vol. 6, no. 2, pp. 64–67, 2011.

Inayatullah, “Analisis Penerapan Algoritma MD5 Untuk Pengamanan Password,” J. Algoritm., vol. 3, no. 3, pp. 1–5, 2007.

A. Pribadi and K. Kunci, “Perancangan Keamanan Sistem Login Aplikasi Multiuser Dengan Algoritma Message Digest 5 (Md5),” Pelita Inform. Budi Darma Pelita Inform. Budi Darma Pelita Inform. Budi Darma, vol. 8, no. 2, p. 4, 2014.

D. Darius, Kriptografi Keamanan Data dan Komunikasi. 2006.

M. Natsir, “Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi Dan Dekripsi Data Office Menggunakan Metode Blowfish Dengan Bahasa Pemrograman Java,” J. Sist. Inf., vol. 6, no. 2, pp. 87–105, 2016.

P. Informatika et al., “Perancangan Aplikasi Untuk Memeriksa Keaslian Data Yang Telah Didownload Menggunakan Algoritma Message Digest 5 (Md5),” Pelita Inform. Budi Darma, vol. 5, no. 3, pp. 172–177, 2014.

K. Shahbazi, M. Eshghi, and R. Faghih Mirzaee, “Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5,” Eng. Sci. Technol. an Int. J., vol. 20, no. 4, pp. 1308–1317, 2017.

Y. Tian, K. Zhang, P. Wang, Y. Zhang, and J. Yang, “Add ‘salt’ MD5 algorithm’s FPGA implementation,” Procedia Comput. Sci., vol. 131, pp. 255–260, 2018.

M. ir.Yusuf Kurniawan, Kriptografi Keamanan internet dan Jaringan komputer. 2018.

Y. Apridiansyah and M. H. Rifqo, “STUDI MENGGUNAKAN ALGORITMA MESSAGE DIGEST 5 Studi Kasus : Fakultas Teknik Universitas Muhammadiyah Bengkulu,” Nasional, vol. II, no. September, pp. 107–114, 2015.

I. Akil, “Rekayasa Perangkat Lunak Dengan Model Unified Process Studi Kasus: Sistem Informasi Journal,” J. Pilar Nusa Mandiri, vol. 12, no. 1, p. 11, 2016.

m. salahuddi. rosa a.s, Rekayasa Perangkat Lunak. 2013.

G. Windu Gata, “Pemodelan UML sistem informasi Monitoring Penjualan dan stok barang,” Pemodelan Uml Sist. Inf. Monit. Penjualan Dan Stok Barang (Studi Kasus Distro Zhezha Pontianak), vol. IV, no. 2, pp. 107–116, 2016.

muhammad sadeli, Aplikasi Bisnis dengan php dan mysql. palembang: maxicom, 2014.

E. Situmorang and F. Riandari, “Decision Support System For Selection Of The Best Doctors In Sari Mutiara Hospital Using Fuzzy Tsukamoto Method”, mantik, vol. 3, no. 3, Nov, pp. 28-33, Nov. 2019.

F. Ridandari and A. Panjaitan, “Expert System to Diagnose Extra Lung Tuberculosis Using Bayes Theorem”, mantik, vol. 3, no. 3, Nov, pp. 34-39, Nov. 2019.

A. Pamungkas and F. Riandari, “Analysis of Disease in Plants Guava Demspter Shafer Method Using Web Based in the village of Paradise Sei Rampah”, mantik, vol. 3, no. 3, Nov, pp. 69-72, Nov. 2019.

R. Sibagariang and F. Riandari, “Decision Support System for Determining the Best Wood For the Production Cabinet Using Bayes Method”, mantik, vol. 3, no. 3, Nov, pp. 99-103, Nov. 2019.

Downloads

ARTICLE Published HISTORY

Submitted Date: 2019-11-09
Accepted Date: 2019-11-09
Published Date: 2020-01-01

How to Cite

Ferdiansyah, R., & Hasugian, P. M. (2020). Data Security System login With MD5 Algorithms in Applications deskresy.com. Journal of Computer Networks, Architecture and High Performance Computing, 2(1), 72-76. https://doi.org/10.47709/cnapc.v2i1.359

Most read articles by the same author(s)