Perbandingan Performa Kecepatan dari Algoritma Hash Function untuk Proses Enkripsi Password
(1) Universitas Surabaya, Indonesia
(*) Corresponding Author
Abstract
Full Text:
PDFReferences
A. Kuznetsov, K. Shekhanin, A. Kolhatin, D. Kovalchuk, V. Babenko, and I. Perevozova, “Performance of Hash Algorithms on GPUs for Use in Blockchain,” 2019 IEEE International Conference on Advanced Trends in Information Theory, ATIT 2019 - Proceedings, pp. 166–170, 2019, doi: 10.1109/ATIT49449.2019.9030442.
P. P. Pittalia, “International Journal of Computer Science and Mobile Computing A Comparative Study of Hash Algorithms in Cryptography,” International Journal of Computer Science and Mobile Computing, vol. 8, no. 6, pp. 147–152, 2019.
R. Pamungkas and F. W. Z. Zaney, “Penerapan Hashing SHA1 dan Algoritma Asimetris RSA untuk Keamanan Data pada Sistem Informasi berbasis Web,” RESEARCH : Journal of Computer, Information System & Technology Management, vol. 4, no. 1, p. 84, 2021, doi: 10.25273/research.v4i1.9099.
A. Fathurrozi, “Penerapan Algoritma Advanced Encryption Standard (AES-256) Dengan Mode CBC DanSecure Hash Algorithm (SHA-256) Untuk Pengamanan Data File,” Journal of Information and Information Security (JIFORTY), vol. 2, no. 2, pp. 227–238, 2021.
M. Almazrooie, A. Samsudin, A. A. A. Gutub, M. S. Salleh, M. A. Omar, and S. A. Hassan, “Integrity verification for digital Holy Quran verses u sing cryptographic hash function and compression,” Journal of King Saud University - Computer and Information Sciences, vol. 32, no. 1, pp. 24–34, 2020, doi: 10.1016/j.jksuci.2018.02.006.
A. Mohammed Ali and A. Kadhim Farhan, “A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-Document,” IEEE Access, vol. 8, pp. 80290–80304, 2020, doi: 10.1109/ACCESS.2020.2989050.
Z. Al-Odat and S. Khan, “The sponge structure modulation application to overcome the security breaches for the MD5 and SHA-1 hash functions,” Proceedings - International Computer Software and Applications Conference, vol. 1, pp. 811–816, 2019, doi: 10.1109/COMPSAC.2019.00119.
M. H. Santoso, N. D. Girsang, H. Siagian, A. Wahyudi, and B. A. Sitorus, “Perbandingan Algoritma Kriptografi Hash MD5 dan SHA-1,” Seminar Nasional Teknologi Informatika, vol. 2, no. 1, pp. 54–59, 2019.
D. Upadhyay, N. Gaikwad, M. Zaman, and S. Sampalli, “Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications,” IEEE Access, vol. 10, no. October, pp. 112472–112486, 2022, doi: 10.1109/ACCESS.2022.3215778.
J. Katz and Y. Lindell, Introduction to Modern Cryptography. Chapman and Hall/CRC, 2014. doi: 10.1201/b17668.
B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition,” in John Wiley and Sons, 1996.
Z. Al-Odat, A. Abbas, and S. U. Khan, “Randomness analyses of the secure hash algorithms, SHA-1, SHA-2 and modified SHA,” in Proceedings - 2019 International Conference on Frontiers of Information Technology, FIT 2019, Institute of Electrical and Electronics Engineers Inc., Dec. 2019, pp. 316–321. doi: 10.1109/FIT47737.2019.00066.
M. J. Dworkin, “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions,” Gaithersburg, MD, Jul. 2015. doi: 10.6028/NIST.FIPS.202.
J.-P. Aumasson, S. Neves, Z. Wilcox-O’hearn, and C. Winnerlein, “BLAKE2: simpler, smaller, fast as MD5.” [Online]. Available: https://blake2.net.
DOI: https://doi.org/10.30645/kesatria.v4i4.256
DOI (PDF): https://doi.org/10.30645/kesatria.v4i4.256.g254
Refbacks
- There are currently no refbacks.
Published Papers Indexed/Abstracted By: