Perbandingan Performa Kecepatan dari Algoritma Hash Function untuk Proses Enkripsi Password

Ahmad Miftah Fajrin(1*),

(1) Universitas Surabaya, Indonesia
(*) Corresponding Author

Abstract


Hash Function is a crucial component in the field of cryptography. It is also utilized for authentication processes within a system. Authentication processes need to ensure both security and data processing speed. One vital component in the authentication process is the password. Password security can be enhanced through encryption using hash functions. Algorithms that can be employed include SHA-1 until SHA-3, MD5 and BLAKE2. Performance testing for execution speed and password comparison is conducted on these algorithms. The results indicate that the BLAKE2 algorithm has an average encryption time of 0.9857. Likewise, for the password comparison process, the BLAKE2 algorithm also exhibits a high speed with an average of 0.2230. As a result, the BLAKE2 algorithm is recommended for use in system authentication.

Full Text:

PDF

References


A. Kuznetsov, K. Shekhanin, A. Kolhatin, D. Kovalchuk, V. Babenko, and I. Perevozova, “Performance of Hash Algorithms on GPUs for Use in Blockchain,” 2019 IEEE International Conference on Advanced Trends in Information Theory, ATIT 2019 - Proceedings, pp. 166–170, 2019, doi: 10.1109/ATIT49449.2019.9030442.

P. P. Pittalia, “International Journal of Computer Science and Mobile Computing A Comparative Study of Hash Algorithms in Cryptography,” International Journal of Computer Science and Mobile Computing, vol. 8, no. 6, pp. 147–152, 2019.

R. Pamungkas and F. W. Z. Zaney, “Penerapan Hashing SHA1 dan Algoritma Asimetris RSA untuk Keamanan Data pada Sistem Informasi berbasis Web,” RESEARCH : Journal of Computer, Information System & Technology Management, vol. 4, no. 1, p. 84, 2021, doi: 10.25273/research.v4i1.9099.

A. Fathurrozi, “Penerapan Algoritma Advanced Encryption Standard (AES-256) Dengan Mode CBC DanSecure Hash Algorithm (SHA-256) Untuk Pengamanan Data File,” Journal of Information and Information Security (JIFORTY), vol. 2, no. 2, pp. 227–238, 2021.

M. Almazrooie, A. Samsudin, A. A. A. Gutub, M. S. Salleh, M. A. Omar, and S. A. Hassan, “Integrity verification for digital Holy Quran verses u sing cryptographic hash function and compression,” Journal of King Saud University - Computer and Information Sciences, vol. 32, no. 1, pp. 24–34, 2020, doi: 10.1016/j.jksuci.2018.02.006.

A. Mohammed Ali and A. Kadhim Farhan, “A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-Document,” IEEE Access, vol. 8, pp. 80290–80304, 2020, doi: 10.1109/ACCESS.2020.2989050.

Z. Al-Odat and S. Khan, “The sponge structure modulation application to overcome the security breaches for the MD5 and SHA-1 hash functions,” Proceedings - International Computer Software and Applications Conference, vol. 1, pp. 811–816, 2019, doi: 10.1109/COMPSAC.2019.00119.

M. H. Santoso, N. D. Girsang, H. Siagian, A. Wahyudi, and B. A. Sitorus, “Perbandingan Algoritma Kriptografi Hash MD5 dan SHA-1,” Seminar Nasional Teknologi Informatika, vol. 2, no. 1, pp. 54–59, 2019.

D. Upadhyay, N. Gaikwad, M. Zaman, and S. Sampalli, “Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications,” IEEE Access, vol. 10, no. October, pp. 112472–112486, 2022, doi: 10.1109/ACCESS.2022.3215778.

J. Katz and Y. Lindell, Introduction to Modern Cryptography. Chapman and Hall/CRC, 2014. doi: 10.1201/b17668.

B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition,” in John Wiley and Sons, 1996.

Z. Al-Odat, A. Abbas, and S. U. Khan, “Randomness analyses of the secure hash algorithms, SHA-1, SHA-2 and modified SHA,” in Proceedings - 2019 International Conference on Frontiers of Information Technology, FIT 2019, Institute of Electrical and Electronics Engineers Inc., Dec. 2019, pp. 316–321. doi: 10.1109/FIT47737.2019.00066.

M. J. Dworkin, “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions,” Gaithersburg, MD, Jul. 2015. doi: 10.6028/NIST.FIPS.202.

J.-P. Aumasson, S. Neves, Z. Wilcox-O’hearn, and C. Winnerlein, “BLAKE2: simpler, smaller, fast as MD5.” [Online]. Available: https://blake2.net.




DOI: https://doi.org/10.30645/kesatria.v4i4.256

DOI (PDF): https://doi.org/10.30645/kesatria.v4i4.256.g254

Refbacks

  • There are currently no refbacks.


Published Papers Indexed/Abstracted By: