z-logo
open-access-imgOpen Access
Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan
Author(s) -
Santi Sulastri,
Riana Defi Mahadji Putri
Publication year - 2018
Publication title -
jurnal teknik elektro/jurnal teknik elektro
Language(s) - English
Resource type - Journals
eISSN - 2549-1571
pISSN - 1411-0059
DOI - 10.15294/jte.v10i2.18628
Subject(s) - md5 , computer science , hash function , encryption , password , algorithm , cryptographic hash function , brute force attack , computer security
There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD5 and SHA256 collaboration methods. Encryption is applied to the user's password on the web login system. Simulation results can be tested by measuring resistance to brute force attacks and the value of the avalanche effect (AE). From the results of the tests carried out by using attack software, the results of the application are quite safe from brute force attacks. From the AE test obtained the result with an AE value of 71% which means that the encoding result is good enough.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here