Perbandingan Performa Algoritma Md5 Dan Sha-256 Dalam Membangkitkan Identitas File

Imam Saputra(1*), Surya Darma Nasution(2),

(1) Universitas Budi Darma
(2) Universitas Budi Darma
(*) Corresponding Author


The ease of accessing the internet makes it very easy for humans to share various kinds of files. These files are very easy to download, so it is not uncommon for these files to become duplicates or the same files are stored on personal storage media. This of course will take up personal storage space owned. To avoid this, the steps that can be taken are to provide the identity of each file that represents the contents of the file. So that it can be known whether the contents of the file are the same or not. To generate the identity of a file, a special algorithm is needed that can represent the contents of the file. Algorithms that can be used to generate file identities are algorithms that fall into the hash function category. But in its development there are many algorithms in hash functions that can be used to generate file identities. The algorithms that are often used are the MD5 algorithm and the SHA-256 algorithm. The MD5 and SHA-256 algorithms have different algorithm structures so they have different performance when generating the identity of a file. By comparing the performance between the MD5 and SHA-256 algorithms, we will get an algorithm that has better performance when used to generate file identities.

Full Text:



N. Hayati, M. A. Budiman dan A. Sharif, “Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks,” Sinkron, vol. I, no. 2, pp. 51-57, 2017.

G. H. Editya dan S. Mulyati, “Aplikasi Mobile One Time Password Menggunakan Algoritma MD5 dan SHA-1 Untuk Meningkatkan Keamanan Website,” SNIKA, vol. I, no. 2, pp. 618-623, 2018.

A. Y. Mulyadi, E. P. Nugroho dan R. R. JP, “Implementasi Algoritma AES 128 dan SHA –256 Dalam Pengkodean pada Sebagian Frame Video CCTV MPEG-2,” JATIKOM, vol. II, no. 1, pp. 33-39, 2018.

I. Saputra dan S. D. Nasution, “Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital,” dalam Prosiding Seminar Nasional Riset Information Science (SENARIS), Pematang Siantar, 2019.

R. Munir, Kriptografi, Bandung: Informatika Bandung, 2006.

Y. Kurniawan, Kriptografi Keamanan Internet dan Jaringan Komunikasi, Bandung: Informatika, 2017.

R. L. Rivest, “The MD5 Message-Digest Algorithm,” Massachusetts Institute of Technology Laboratory for Computer Science, Cambridge, 1990.

D. Rachamawati, J. T. Tarigan dan A. B. C. Ginting, “A Comparative Study of Message Digest 5 (MD5) and SHA-256 Algorithm,” dalam 2nd International Conference on Computing and Applied Informatics 2017, Medan, 2018.

F. I. P. Standards Publications, “Secure Hash Standard,” National Institute of Standards and Technology, Amerika Serikat, 2002.

A. dan D. S. M. Ghosh, “Review Paper on Secure Hash Algorithm With Its Variants,” International Journal of Innovation in Modern Engineering & Science (IJTIMES), vol. III, no. 05, pp. 1-7, 2017.

T. Kirubakaran, K. Srinivasan, P. J. Vignesh dan V. V. A, “Implementation of Secure Hash Algorithm-256,” International Journal of Engineering Science and Computing (IJESC), pp. 5785-5788, 2017.



  • There are currently no refbacks.

J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan :

View My Stats