Loading

Authenticity Data through Digital Signature Technique with MD5 Algorithm
Arpan1, Nova Mayasari2, Muhammad Muttaqin3

1Arpan*, Lecturer of Computer System Study Program Faculty Of Science And Technology Universitas Pembangunan Panca Budi Medan City, North Sumatera Provincy, Indonesia.
2Nova Mayasari, Lecturer of Computer System Study Program Faculty of Science and Technology Universitas Pembangunan Panca Budi Medan City, North Sumatera Provincy, Indonesia.
3Muhammad Muttaqin, Lecturer of Computer System Study Program Faculty of Science and Technology Universitas Pembangunan Panca Budi Medan City, North Sumatera Provincy, Indonesia
Manuscript received on December 16, 2019. | Revised Manuscript received on December 22, 2019. | Manuscript published on January 10, 2020. | PP: 1689-1692 | Volume-9 Issue-3, January 2020. | Retrieval Number: B6877129219/2020©BEIESP | DOI: 10.35940/ijitee.B6877.019320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data entry must be done by a professional person because this process requires a high level of accuracy. If you enter incorrectly, the results given will also be inaccurate and can even cause misunderstanding. To maintain the authenticity of the data, digital signature techniques are used by using the MD5 algorithm as a hash function that is widely used in cryptographic applications are MD5 and SHA. 
Keywords: Digital Signature, Message Digest, MD5.
Scope of the Article: Digital Rights Management