Journal of Computer Networks, Architecture and High Performance Computing
Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing

Data Security System login With MD5 Algorithms in Applications deskresy.com

Ferdiansyah, Rahmat (Unknown)
Hasugian, Paska Marto (Unknown)



Article Info

Publish Date
01 Jan 2020

Abstract

Cryptography is a technique of data security by processing the data (plaintext) using an encryption method so that the the data can not be read directly, especially by unauthorized parties. Confidential Data and information need to get serious attention considering the value of information contained in it so that procedures are needed to hide the messages stored Therein. Data security Becomes very important at this time, Because for every decision or policy making must be based on the data. Md5 is a substitute for MD4, MD5 is one of the most Widely used one-way hash functions, MD5 processes the input into blocks of 512 bits, the output of md5 is 128 bits and has a fixed length. MD5 algorithm is Widely used for various purposes in making security in applications, it is Often used to help login validation on the use of passwords stored in the database system

Copyrights © 2020






Journal Info

Abbrev

CNAPC

Publisher

Subject

Computer Science & IT Education

Description

Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and ...