Implementasi SHA-256 dalam Program Verifikasi Originalitas Video Sebelum dan Sesudah Proses Kriptografi

  • Daniel Surya Wijaya Universitas Udayana
  • I Ketut Gede Suhartana Universitas Udayana

Abstract

This research aims to develop a computer program utilizing the SHA-256 algorithm to compare the authenticity between the original video and the video that has undergone cryptographic processes, particularly during the decryption phase. The program is designed to provide additional verification regarding the success of the decryption process in restoring the video to its original condition. The program development is conducted using the Python programming language. The SHA-256 algorithm is employed to generate hash values for both the original video and the decrypted video. The resulting hash values of the two videos are then compared to evaluate their similarity. The developed program successfully compares the authenticity between the original video and the decrypted video. Through the analysis of hash values using SHA-256, the program concludes whether the decryption process successfully restores the video to its original state or not.


Keywords: SHA-256, Cryptography,Video,Hash,Python

Published
2024-08-01
How to Cite
WIJAYA, Daniel Surya; SUHARTANA, I Ketut Gede. Implementasi SHA-256 dalam Program Verifikasi Originalitas Video Sebelum dan Sesudah Proses Kriptografi. Jurnal Nasional Teknologi Informasi dan Aplikasnya, [S.l.], v. 2, n. 4, p. 747-752, aug. 2024. ISSN 3032-1948. Available at: <https://ojs.unud.ac.id/index.php/jnatia/article/view/116098>. Date accessed: 27 sep. 2024. doi: https://doi.org/10.24843/JNATIA.2024.v02.i04.p10.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.