PENERAPAN ALGORITME HASH SHA-256 PADA REKAYASA PERANGKAT LUNAK PENJUALAN BERBASIS WEBSITE

Khasanah, Fauziah Nikmatul (2022) PENERAPAN ALGORITME HASH SHA-256 PADA REKAYASA PERANGKAT LUNAK PENJUALAN BERBASIS WEBSITE. Other thesis, Universitas Amikom Purwokerto.

[thumbnail of Cover.pdf]
Preview
Text
Cover.pdf

Download (834kB) | Preview
[thumbnail of Daftar Isi.pdf]
Preview
Text
Daftar Isi.pdf

Download (233kB) | Preview
[thumbnail of Abstrak.pdf]
Preview
Text
Abstrak.pdf

Download (542kB) | Preview
[thumbnail of BAB I.pdf] Image
BAB I.pdf
Restricted to Registered users only

Download (660kB)
[thumbnail of BAB II.pdf] Image
BAB II.pdf
Restricted to Registered users only

Download (900kB)
[thumbnail of BAB III.pdf] Image
BAB III.pdf
Restricted to Registered users only

Download (789kB)
[thumbnail of BAB IV.pdf] Image
BAB IV.pdf
Restricted to Registered users only

Download (1MB)
[thumbnail of BAB V.pdf] Image
BAB V.pdf
Restricted to Registered users only

Download (794kB)
[thumbnail of Daftar Pustaka.pdf] Image
Daftar Pustaka.pdf
Restricted to Registered users only

Download (500kB)
[thumbnail of Lampiran.pdf] Text
Lampiran.pdf
Restricted to Repository staff only

Download (499kB)

Abstract

Rapid technological developments can spur changes in the cycle of human activity, one of which is software engineering activities that continue to develop in accordance with technological developments, the development of software engineering is increasingly developing methods of data security to prevent attacks from irresponsible parties. answer. This research was conducted to analyze the performance and security of sha-256 data security with ciphertext customization. The steps that the researchers took in conducting the analysis were collecting theory and case examples, designing programs, implementing programs, testing and saving the results. Based on the process, it can be concluded that ciphertext customization on sha-256 is needed to strengthen security and resistance to attacks from irresponsible parties, besides that the performance of sha-256 calculations by customizing ciphertext and without ciphertext is not too much different where only 65 ms difference based on the results of performance testing that researchers did.
Item Type: Thesis (Other)
Additional Information: Dosen Pembimbing: Dr. Taqwa Hariguna, S.T, M.Kom.
Uncontrolled Keywords: teknologi, perangkat lunak, hash, sha-256.
Subjects: T Technology > T Technology (General)
Divisions: Fakultas Ilmu Komputer > Informatika
Depositing User: UPT Perpustakaan Pusat Universitas Amikom Purwokerto
Date Deposited: 05 Sep 2022 02:59
Last Modified: 05 Sep 2022 02:59
URI: https://eprints.amikompurwokerto.ac.id/id/eprint/1351

Actions (login required)

View Item
View Item