Show simple item record

dc.contributor.advisorNeyman, Shelvie Nidya
dc.contributor.advisorKustiyo, Aziz
dc.contributor.authorGinting, Ferraro S.Octora
dc.date.accessioned2012-10-08T02:07:31Z
dc.date.available2012-10-08T02:07:31Z
dc.date.issued2012
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/57707
dc.description.abstractSecurity method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation. Modern cryptography uses a key that must be kept secret to overcome the problem of cryptographic security. Problem in the use of the same key by two entities that communicate with each other in exchanging messages is a way to distribute the key. This problem can be overcome by using public-key cryptography, which allows users to communicate securely without a shared secret key. Digital signature is the application of public-key cryptography. When accessing important digital documents, it is necessary to verify the signature given. Implementation of digital signature always requires a hash function. Hash function used in this research namely SHA-256, SHA-384 and Tiger. Federal Information Processing Standards (FIPS) set the cryptographic standard for digital signatures is the Digital Signature Standard (DSS). Algorithms included in the DSS are the Digital Standard Algorithm (DSA), Ron Rives, Adi Shamir, and Leonard Adleman (RSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). Performance testing of the three algorithms is done by making an application using a computer programming language C++. Implementation program using C++ class library for cryptographic scheme that is Crypto++ Library 5.6.0. Class libraries used in the classes functions for digital signatures. On the application of digital signatures generated, conducted tests is done by combining each hash function algorithm with each of the DSS in order to compare their performance in terms of time and memory usage. Against the test results are then analyzed using statistical tests. The result shows that pair of Tiger hash function and DSA algorithm is the best combination.en
dc.subjectBogor Agricultural University (IPB)en
dc.subjectAnoven
dc.subjectCrypto + + Libraryen
dc.subjectHash Functionsen
dc.subjectDigital Signaturesen
dc.subjectCryptographyen
dc.titleAnalisis ImplementasiDigital Signature Standard menggunakan Fungsi Hash SHA-256, SHA-384 dan Tigeren


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record