Author:
Haryannto Edy Victor,Zulfadly Muhammad,Daifiria ,Akbar Muhammad Barkah,Lazuly Ivy
Abstract
Abstract
The development of information technology that is increasingly racing today makes it easy for anyone to exchange data or information. On the other hand, there are problems with data security which can be disrupted by irresponsible parties such as wiretapping, destruction, data theft or other misuse. The application of cryptographic techniques is one solution that can be done to overcome these security problems. Cryptography is the science or art of maintaining data security by scrambling data or messages. In cryptography the term hashone-wayfunction is widely used to test the integrity of a file. In this study, cryptographic algorithms and hash functions used are Nihilist Cipher and MD5. Messages or files textthat will be sent are firstencrypted using thealgorithm Nihilist Cipher. Then the MD5 algorithm is used to get the hash value from the encrypted message. Furthermore, to get the original message back bydecryption Nihilist Cipher, the file verification process is first done to ensure that the file receivedhas not changed or is still original. The results show that thealgorithms Nihilist Cipher and MD5can be implemented properly so that data security can be increased because before decrypting the message, the message has to be verified first.
Subject
General Physics and Astronomy
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CCC-Transformation: Novel Method to Secure Passwords Based on Hash Transformation;Digital Technologies and Applications;2023
2. Securing Caesar Cryptography Using the 2D Geometry;International Conference on Advanced Intelligent Systems for Sustainable Development;2023