Khasanah, Fauziah Nikmatul (2022) PENERAPAN ALGORITME HASH SHA-256 PADA REKAYASA PERANGKAT LUNAK PENJUALAN BERBASIS WEBSITE. Other thesis, Universitas Amikom Purwokerto.
Preview
Cover.pdf
Download (834kB) | Preview
Preview
Daftar Isi.pdf
Download (233kB) | Preview
Preview
Abstrak.pdf
Download (542kB) | Preview
Image
BAB I.pdf
Restricted to Registered users only
Download (660kB)
BAB I.pdf
Restricted to Registered users only
Download (660kB)
Image
BAB II.pdf
Restricted to Registered users only
Download (900kB)
BAB II.pdf
Restricted to Registered users only
Download (900kB)
Image
BAB III.pdf
Restricted to Registered users only
Download (789kB)
BAB III.pdf
Restricted to Registered users only
Download (789kB)
Image
BAB IV.pdf
Restricted to Registered users only
Download (1MB)
BAB IV.pdf
Restricted to Registered users only
Download (1MB)
Image
BAB V.pdf
Restricted to Registered users only
Download (794kB)
BAB V.pdf
Restricted to Registered users only
Download (794kB)
Image
Daftar Pustaka.pdf
Restricted to Registered users only
Download (500kB)
Daftar Pustaka.pdf
Restricted to Registered users only
Download (500kB)
Text
Lampiran.pdf
Restricted to Repository staff only
Download (499kB)
Lampiran.pdf
Restricted to Repository staff only
Download (499kB)
Abstract
Rapid technological developments can spur changes in the cycle of human activity, one of which is software engineering activities that continue to develop in accordance with technological developments, the development of software engineering is increasingly developing methods of data security to prevent attacks from irresponsible parties. answer. This research was conducted to analyze the performance and security of sha-256 data security with ciphertext customization. The steps that the researchers took in conducting the analysis were collecting theory and case examples, designing programs, implementing programs, testing and saving the results. Based on the process, it can be concluded that ciphertext customization on sha-256 is needed to strengthen security and resistance to attacks from irresponsible parties, besides that the performance of sha-256 calculations by customizing ciphertext and without ciphertext is not too much different where only 65 ms difference based on the results of performance testing that researchers did.
Item Type: | Thesis (Other) |
---|---|
Additional Information: | Dosen Pembimbing: Dr. Taqwa Hariguna, S.T, M.Kom. |
Uncontrolled Keywords: | teknologi, perangkat lunak, hash, sha-256. |
Subjects: | T Technology > T Technology (General) |
Divisions: | Fakultas Ilmu Komputer > Informatika |
Depositing User: | UPT Perpustakaan Pusat Universitas Amikom Purwokerto |
Date Deposited: | 05 Sep 2022 02:59 |
Last Modified: | 05 Sep 2022 02:59 |
URI: | https://eprints.amikompurwokerto.ac.id/id/eprint/1351 |