Khasanah, Fauziah Nikmatul (2022) PENERAPAN ALGORITME HASH SHA-256 PADA REKAYASA PERANGKAT LUNAK PENJUALAN BERBASIS WEBSITE. Other thesis, Universitas Amikom Purwokerto.
Preview
Cover.pdf
Download (834kB) | Preview
Preview
Daftar Isi.pdf
Download (233kB) | Preview
Preview
Abstrak.pdf
Download (542kB) | Preview
![[thumbnail of BAB I.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB I.pdf
Restricted to Registered users only
Download (660kB)
![[thumbnail of BAB II.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB II.pdf
Restricted to Registered users only
Download (900kB)
![[thumbnail of BAB III.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB III.pdf
Restricted to Registered users only
Download (789kB)
![[thumbnail of BAB IV.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB IV.pdf
Restricted to Registered users only
Download (1MB)
![[thumbnail of BAB V.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB V.pdf
Restricted to Registered users only
Download (794kB)
![[thumbnail of Daftar Pustaka.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
Daftar Pustaka.pdf
Restricted to Registered users only
Download (500kB)
![[thumbnail of Lampiran.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/text.png)
Lampiran.pdf
Restricted to Repository staff only
Download (499kB)
Abstract
Rapid technological developments can spur changes in the cycle of human activity, one of which is software engineering activities that continue to develop in accordance with technological developments, the development of software engineering is increasingly developing methods of data security to prevent attacks from irresponsible parties. answer. This research was conducted to analyze the performance and security of sha-256 data security with ciphertext customization. The steps that the researchers took in conducting the analysis were collecting theory and case examples, designing programs, implementing programs, testing and saving the results. Based on the process, it can be concluded that ciphertext customization on sha-256 is needed to strengthen security and resistance to attacks from irresponsible parties, besides that the performance of sha-256 calculations by customizing ciphertext and without ciphertext is not too much different where only 65 ms difference based on the results of performance testing that researchers did.
Item Type: | Thesis (Other) |
---|---|
Additional Information: | Dosen Pembimbing: Dr. Taqwa Hariguna, S.T, M.Kom. |
Uncontrolled Keywords: | teknologi, perangkat lunak, hash, sha-256. |
Subjects: | T Technology > T Technology (General) |
Divisions: | Fakultas Ilmu Komputer > Informatika |
Depositing User: | UPT Perpustakaan Pusat Universitas Amikom Purwokerto |
Date Deposited: | 05 Sep 2022 02:59 |
Last Modified: | 05 Sep 2022 02:59 |
URI: | https://eprints.amikompurwokerto.ac.id/id/eprint/1351 |