Abstract
The development of information technology that is increasingly racing today makes it easy for anyone to exchange data or information. On the other hand, there are problems with data security which can be disrupted by irresponsible parties such as wiretapping, destruction, data theft or other misuse. The application of cryptographic techniques is one solution that can be done to overcome these security problems. Cryptography is the science or art of maintaining data security by scrambling data or messages. In cryptography the term hashone-wayfunction is widely used to test the integrity of a file. In this study, cryptographic algorithms and hash functions used are Nihilist Cipher and MD5. Messages or files textthat will be sent are firstencrypted using thealgorithm Nihilist Cipher. Then the MD5 algorithm is used to get the hash value from the encrypted message. Furthermore, to get the original message back bydecryption Nihilist Cipher, the file verification process is first done to ensure that the file receivedhas not changed or is still original. The results show that thealgorithms Nihilist Cipher and MD5can be implemented properly so that data security can be increased because before decrypting the message, the message has to be verified first.
Cite
CITATION STYLE
Haryannto, E. V., Zulfadly, M., Daifiria, Akbar, M. B., & Lazuly, I. (2019). Implementation of Nihilist Cipher Algorithm in Securing Text Data with Md5 Verification. In Journal of Physics: Conference Series (Vol. 1361). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1361/1/012020
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.