PENGUJIAN INTEGRITAS DATA MENGGUNAKAN ALGORITMA MD5

  • Rendi Gayu Buana STMIK PPKIA Pradnya Paramita Malang

Abstract

Often the integrity of the data did not change as the original caused by many things such as due to a virus and modified by others, and most people do not pay attention to the integrity of the data so that the data is not complete as the original, then the data can not be used. Thus this study to test the integrity of the data using the MD5 algorithm.

The methods in scientific writing using the MD5 algorithm, which is one of the cryptographic functions that can generate a unique code of a file or files.

MD5 can detect changes in the contents of a file even if the change is very small. Changes can be made up of addition, subtraction or change of the contents of a file. Speed MD5 generate code that is the larger the file size the longer the generated code MD5.

 

Key words: Testing, Integrity, Data, Algorithms, MD5

References

Ariyus, Dony. 2006. Kriptografi Keamanan Data dan Komunikasi. Yogyakarta: Graha Ilmu.

Febriani. 2005 (online) (http://gunadarma.ac.id Diakses 10 juli 2011). Flowchart, SUMBER http://febriani.staff.gunadarma.ac.id/Downloads/files/5616/Flowchart.pdf

Kadir, Abdul. 2003. Pengenalan Sistem Informasi. Yogyakarta: Andi.

Kurniawan, Yusuf. 2004. Kriptografi Keamanan Internet dan Jaringan Telekomunikasi. Bandung Informatika.

Masyarakat Digital Gotong Royong (MDGR). 2003-2006 Pengantar Sistem Operasi Komputer : plus ilustrasi kernel, (online) (. Diakses 11 juni 2011). SUMBER .v06/Kuliah/SistemOperasi/BUKU/SistemOperasi-4.0.pdf

Misky, Dudi. 2005. Kamus Informasi & Teknologi. Jakarta: EDSA Mahkota.

Munir, Rinaldi. 2006. Kriptografi. Bandung: Informatika.

Pascoe, Luke. 2003. MD5summer, (online) (http://md5summer.org Diakses 2 juli 2011) SUMBER http://md5summer.org/source/Source_md5v12005.zip

Taufik, Muhammad. 2011. Kriptografi Password dengan MD5. Sekolah Tinggi Teknologi Nurul Jadid, Probolinggo, 2011.

Williams, Laurie. 2006. Testing Overview and Black-Box Testing Techniques, (online) (Diakses 10 juli 2011) SUMBER http://docs.google.com/viewer?a=v&q=cache:pl- padW3eKgJ:agile.csc.ncsu.edu/SEMaterials/BlackBox.pdf+filetype:pdf+bla ckbox+testing&hl=en&pid=bl&srcid=ADGEESiDc6UdTl2b9VX2B4wNuJI wjGawo7xRMb29jbbgcT6iTCGVkI13Lj9xfUGuu1LAzaOPIUyhPHnQ- czSCNgDe9T9GmdsrZVrkbS_ahbEoR_FiiWbBe-sXv- xXxbP0MVtjHTWpyVK&sig=AHIEtbS5MUGIFoYAk3t-E-pMtK4YrtVxJw

Published
2012-01-19