Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner

  • Nainggolan S
N/ACitations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new. The selection of the SHA-256 algorithm is inseparable from several previous studies that have examined the performance of this algorithm. The SHA-256 algorithm is able to detect changes that occur in digital images even though the changes that occur are only 1 pixel, the small differences that occur in the image produce a very significant difference from the hash value with an accuracy level of up to 100%. SHA - 256 produces a message digest with 256 bits in length. SHA - 256 is classified as safe because it is designed in such a way that it is not possible to get messages related to the same message digest.

Cite

CITATION STYLE

APA

Nainggolan, S. (2022). Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner. Resolusi : Rekayasa Teknik Informatika Dan Informasi, 2(5), 201–213. https://doi.org/10.30865/resolusi.v2i5.368

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free