Code-Based Document Authentication Using SHA-3 and McEliece
Abstract
Keywords
Full Text:
PDFReferences
[1] A. Lorien and T. Wellem, “Implementasi sistem otentikasi dokumen berbasis quick response QR code dan digital signature,” Rekayasa Sistem dan Teknologi Informasi RESTI, vol. 5,no. 4, pp. 663–672, 2021. doi: 10.29207/resti.v5i1.3316.
[2] M. H. Santoso et al., “Perbandingan algoritma kriptografi hash MD5 dan SHA-1,” Semantika, vol. 2, no. 1, pp. 54–59, 2019.
[3] M. P. Sari, “Analisis algoritma SHA-3 keamanan pada data pribadi,” Tecnoscienza, vol. 5, no. 2, pp. 231–242, 2021.
[4] F. Kurniawan, A. Kusyanti, and H. Nurwarsito, “Analisis dan implementasi algoritma
SHA-1 dan SHA-3 pada sistem autentikasi garuda training cost,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 1, no. 9, pp. 803–812, 2017.
[5] N. F. Ilmiyah, “Kajian tentang kriptosistem mceliece dalam menghadapi tantangan komputer kuantum di era revolusi industri 4.0,” Prosiding Seminar Nasional MIPA, pp. 216–226, 2018.
[6] M. Kumar, “Post-quantum cryptography algorithm’s standardization and performance analysis,” Array, vol. 15, 2022. doi: 10.1016/j.array.2022.100242.
[7] Nurhayati, Kastari, and F. Fahrianto, “End-to-end encryption on the instant messaging application based android using AES cryptography algorithm to a text message,” CITSM, 2022. doi: 10.1109/CITSM56380.2022.993596.
[8] R. Munir, Kriptografi. Institut Teknologi Bandung, 2019.
[9] Basri, “Kriptografi simetris dan asimetris dalam perspektif keamanan data dan kompleksitas komputasi,” Jurnal Ilmiah Ilmu Komputer, vol. 2, p. 2, 2016.
[10] K. J. Jaameri, “Code-based cryptography,” School of Science, 2019.
[11] M. Baldi, M. Bianchi, and F. Chiaraluce, “Enhanced public key security for the mceliece cryptosystem,” Journal of Cryptology, vol. 29, 2016. doi: 10.1007/s00145-014-9187-8.
[12] S. Sinurat and E. R. Siagan, “Learning text data security in documents using mceliece’s algorithm,” Jurnal Infokum, vol. 10, p. 5, 2022.
[13] M. H. Harianja, “Analisa fungsi hash untuk mendeteksi otentikasi file video menerapkan metode n-hash,” Management of Information System Journal, vol. 2, p. 1, 2023.
[14] E. C. Prabowo and I. Afrianto, “Penerapan digital signature dan kriptografi pada otentikasi sertifikat tanah digital,” Jurnal Ilmiah Komputer dan Informatika, vol. 6, p. 2, 2017. doi:10.34010/komputa.v6i2.2481.
[15] I. Rahim et al., “Komparasi fungsi hash md5 dan sha256 dalam keamanan gambar dan teks,” Ikraith-Informatika, vol. 7, p. 2, 2023.
[16] C. H. Romine, “Sha-3 standard: Permutation-based hash and extendable-output functions,” Federal Information Processing Standards Publications, 2015.
[17] A. Alahmadi, S. Calkavur, et al., “A new code based signature scheme for blockchain technology,” Mathematics, vol. 11, p. 1177, 2023. doi: 10.3390/math11051177.
[18] D. Upadhyay, N. Gaikwad, et al., “Investigating the avalanche effect of various crypto-graphically secure hash functions and hash-based applications,” IEE Access, vol. 10, 2022. doi: 10.1109/ACCESS.2022.3215778.
DOI: https://doi.org/10.18860/jrmm.v5i2.37652
Refbacks
- There are currently no refbacks.


1.png)
.png)




