Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan

Santi Sulastri, Riana Defi Mahadji Putri

Abstract


There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD5 and SHA256 collaboration methods. Encryption is applied to the user's password on the web login system. Simulation results can be tested by measuring resistance to brute force attacks and the value of the avalanche effect (AE). From the results of the tests carried out by using attack software, the results of the application are quite safe from brute force attacks. From the AE test obtained the result with an AE value of 71% which means that the encoding result is good enough.

Keywords


encryption; MD5, SHA-256; brute force; avalanche effect

Full Text:

PDF

References


D. C. Luminita, “Information security in E-learning Platforms,” Procedia - Social and Behavioral Sciences, vol. 15, pp. 2689–2693, 2011, https://doi.org/10.1016/j.sbspro.2011.04.171

C. Chazar, “Standar Manajemen Sistem Informasi Berbasis ISO/IEC 27001:2005,” Jurnal Informasi, vol. 7, no. 2, pp. 48–57, Nov 2015.

D. Abdullah and C. I. Erliana, "Bisnis Rental Mobil Melalui Internet (E-Commerce) Menggunakan Algoritma SHA-1 (Sequre Hash Algorithm-1)," Speed-Sentra Penelitian Engineering dan Edukasi, vol. 4, no. 2, pp. 38–45, 2011.

N. Agani, M. Hardjianto, D. Virgian, “Pengamanan Sistem Menggunakan One Time Password Dengan Pembangkit Password Hash SHA-256 dan Pseudo Random Number Generator (PRNG) Linear Congruential Generator (LCG) di Perangkat Berbasis Android,”, Budi Luhur Information Technology, vol. 13, no . 1, 2016.

S. Bahri, D. Diana, and P. S. Dian, “Studi dan Implementasi Pengamanan Basis Data Menggunakan Metode Enkripsi MD5 (Message-Digest Algorithm 5),” Jurnal Ilmiah, vo. 5, no. 1, pp. 1-15, 2012.

D. M., Khairina, “Analisis Keamanan Sistem Login,” Jurnal Informatika Mulawarman, vol. 6, no. 2: 64-67, 2011.

R. Roshdy, M. Fouad, and M. Aboul-Dahab, “Design and Implementation a New Security Hash Algorithm Based on MD5 and SHA-256,” Intertional Journal of Engineering Sciences & Emerging Technologies, vol. 6, no. 1, pp. 29-36, 2013.

M. Ichwan, M. Gustian, and N. R. Nurjaman, “Implementasi Keyed-Hash Message Authentication Code pada Sistem Keamanan Rumah,” MIND Journal, vol. 1, no. 1, pp. 9-18, 2016.

R. Sadikin, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta: Andi, 2012.

R. Munir, Pengantar Kriptografi. Departemen Teknik Informatika Institut Teknologi Bandung, Bandung, 2004.

S. Ramajunam and M. Karrupiah, “Desaigning an algorithm with high Avalanche Effect,” International Journal of Computer Science and Network Security, vol 11, no. 1, pp.106-111, 2011.

A. Kumar and M. N. Tawiri, “Effective Implementation and Avalanche Effect of AES,” International Journal of Security, Privacy and Trust Management (IJSPTM), vol. 1, no. 3/4, pp. 31-35, 2012.

Dafid, “Kriptografi Kunci Simetris Dengan Menggunakan Algoritma Crypton,” @ lgoritma, vol. 2, no. 3, pp. 20–27, 2006.

Y. Kurniawan, A. S. Ahmad, M. S. Mardiyanto, I. Supriana, and S. Sutikno, “Analisis Sandi Diferensial terhadap AES, DES dan AE1,” Journal of Mathematical and Fundamental Sciences, vol. 38, no. 1, pp. 73–88, 2006.

A. Karima and M. N. Diyatan, “Algoritma Kriptografi Gost Dengan Implementasi MD5 untuk Meningkatkan Nillai Avalanche Effect,” Techno. Com, vol. 15, no. 4, pp. 292–302, 2016.




DOI: https://doi.org/10.15294/jte.v10i2.18628

Refbacks

  • There are currently no refbacks.