Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan

There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD...

Full description

Saved in:
Bibliographic Details
Published inJurnal teknik elektro Vol. 10; no. 2; pp. 70 - 74
Main Authors Sulastri, Santi, Putri, Riana Defi Mahadji
Format Journal Article
LanguageEnglish
Published 20.12.2018
Online AccessGet full text
ISSN1411-0059
2549-1571
2549-1571
DOI10.15294/jte.v10i2.18628

Cover

Abstract There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD5 and SHA256 collaboration methods. Encryption is applied to the user's password on the web login system. Simulation results can be tested by measuring resistance to brute force attacks and the value of the avalanche effect (AE). From the results of the tests carried out by using attack software, the results of the application are quite safe from brute force attacks. From the AE test obtained the result with an AE value of 71% which means that the encoding result is good enough.
AbstractList There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD5 and SHA256 collaboration methods. Encryption is applied to the user's password on the web login system. Simulation results can be tested by measuring resistance to brute force attacks and the value of the avalanche effect (AE). From the results of the tests carried out by using attack software, the results of the application are quite safe from brute force attacks. From the AE test obtained the result with an AE value of 71% which means that the encoding result is good enough.
Author Putri, Riana Defi Mahadji
Sulastri, Santi
Author_xml – sequence: 1
  givenname: Santi
  surname: Sulastri
  fullname: Sulastri, Santi
– sequence: 2
  givenname: Riana Defi Mahadji
  surname: Putri
  fullname: Putri, Riana Defi Mahadji
BookMark eNqFkD9PwzAQxS0EEuXPzugRhhQ7sZN4rGihFVRUavfoEp-DIXGjOKXis_BlSVMGNqY76e49vfe7IKdu65CQG87GXIZK3L93OP7kzIZjnsZhekJGoRQq4DLhp2TEBecBY1Kdk2vvbc6ESCRjUTwi34u6qbBG14G3dOY-Wtv0yxQ6oGssdi3SOfg3OqnKbWu7t5rerueTIJTxHdXg6BK9hxLp1Jbou79vy6m8ow1ooKt269HTFboSanC96nmwB6ctXVvfYX04voPeQzVc2y_Yg7siZwYqj9e_85JsHmebh3nw8vq0eJi8BEUapUEaqkIKlEYdSkHCVA5JJJAX2igZprnSRqYsL5LIGK10YWKex5gbIQqRahldEn603bkGvvoIVda0tu5DZJxlA9-s55sNfLOBb69hR03Rd_Mtmv8lP66ZgdI
ContentType Journal Article
DBID AAYXX
CITATION
ADTOC
UNPAY
DOI 10.15294/jte.v10i2.18628
DatabaseName CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2549-1571
EndPage 74
ExternalDocumentID 10.15294/jte.v10i2.18628
10_15294_jte_v10i2_18628
GroupedDBID AAYXX
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
ADTOC
UNPAY
ID FETCH-LOGICAL-c838-829c54e5f94750a709ba734e1cdf9528b9df580bc73ffd9dcf61b6ebf44c48d53
IEDL.DBID UNPAY
ISSN 1411-0059
2549-1571
IngestDate Mon Sep 15 08:20:06 EDT 2025
Wed Oct 01 00:57:55 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c838-829c54e5f94750a709ba734e1cdf9528b9df580bc73ffd9dcf61b6ebf44c48d53
OpenAccessLink https://proxy.k.utb.cz/login?url=https://journal.unnes.ac.id/nju/index.php/jte/article/download/18628/9320
PageCount 5
ParticipantIDs unpaywall_primary_10_15294_jte_v10i2_18628
crossref_primary_10_15294_jte_v10i2_18628
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-12-20
PublicationDateYYYYMMDD 2018-12-20
PublicationDate_xml – month: 12
  year: 2018
  text: 2018-12-20
  day: 20
PublicationDecade 2010
PublicationTitle Jurnal teknik elektro
PublicationYear 2018
SSID ssib044750036
ssj0002503874
Score 2.0533323
Snippet There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be...
SourceID unpaywall
crossref
SourceType Open Access Repository
Index Database
StartPage 70
Title Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan
URI https://journal.unnes.ac.id/nju/index.php/jte/article/download/18628/9320
UnpaywallVersion publishedVersion
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2549-1571
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044750036
  issn: 1411-0059
  databaseCode: M~E
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LaxsxEBatcyg99F2a0gYdeqgL-5bW0tE0DqbFwZAE0tMyWkmOHUc29romPfSP9M92JG-K20sp9LagYdDODNI30swnQt55EKJAp5GWWkRM8TKSRhaRZHVmSiFLo0KB7Gk5vGCfLvllSynke2FaC8aI3jBRRJXoEjfbJIE70BNGJLPGJK1VE-0J5RegkwyBuUgQi2D2flByhOUdcnBxOu5_Cd1F_hgwDQ-n-Xwoyngva68seS6ZVxl_zdJpHgc9v21RDzZuCbdbmM_39p2Tx2R2N-Nducl1vGlUXH_7g8zxv_zSE_KoRae0v5N6Su4Z94w83OMsfE5-BD7hUHK-ntKBu8ZVBz-OoQEaDu8NHcL6ivbnk8Vq2lzd0Pdnw36EmKdLNTg68m-uTAzd3Wzti42OeZcuQQMdo13Mmo6Nm4Avr3X0c1DvW3DomQ_MGz84A731lZk4urqFLbgX5PxkcP5xGLUvPES1wIVW5LLmzHArGQIX6KVSQa9gJqu1lTwXSmrLRarqXmEtBlNty0xh9FjGaiY0L16Sjls484pQTMukym1aCo4Yy4DylE2F9nBFFCXYQ9K982m13PF4VD7_8f6v0P5V8H8VjH5IPvxy-l-FX_-L8BvSaVYb8xZxTKOOyP3R98FRG6c_Ae599jE
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LaxsxEBbFOZQe2qYPmtAWHXKoC_uW1tLRNAkmJcGQBNLTMlpJjh1HNvY6Jvkr_bMdyZvg9lIKvS1oGLQzg_SNNPOJkAMPQhToNNJSi4gpXkbSyCKSrM5MKWRpVCiQPSsHl-zkil-1lEK-F6a1YIzoDRNFVIkucZNVErgDPWFEMmlM0lo10Z5QfgY6yRCYiwSxCGbvOyVHWN4hO5dnw_6P0F3kjwHT8HCaz4eijPey9sqS55J5lfFdlo7zOOj5bYt6vnJzuF_DdLq17xy_IpPHGW_KTW7iVaPi-uEPMsf_8kuvycsWndL-RmqXPDPuDXmxxVn4lvwMfMKh5Hw5pkfuBlcd_DiEBmg4vDd0AMtr2p-OZotxc31Lv5wP-hFini7V4Oipf3NlZOjmZmtb7PSQd-kcNNAh2sUs6dC4EfjyWke_B_W-BYee-8C89YMT0GtfmYmji3tYg3tHLo6PLr4NovaFh6gWuNCKXNacGW4lQ-ACvVQq6BXMZLW2kudCSW25SFXdK6zFYKptmSmMHstYzYTmxXvScTNnPhCKaZlUuU1LwRFjGVCesqnQHq6IogS7R7qPPq3mGx6Pyuc_3v8V2r8K_q-C0ffI1yen_1V4_1-EP5JOs1iZT4hjGvW5jdBfLeL1AA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Implementasi+Enkripsi+Data+Secure+Hash+Algorithm+%28SHA-256%29+dan+Message+Digest+Algorithm+%28MD5%29+pada+Proses+Pengamanan+Kata+Sandi+Sistem+Penjadwalan+Karyawan&rft.jtitle=Jurnal+teknik+elektro&rft.au=Sulastri%2C+Santi&rft.au=Putri%2C+Riana+Defi+Mahadji&rft.date=2018-12-20&rft.issn=1411-0059&rft.eissn=2549-1571&rft.volume=10&rft.issue=2&rft.spage=70&rft.epage=74&rft_id=info:doi/10.15294%2Fjte.v10i2.18628&rft.externalDBID=n%2Fa&rft.externalDocID=10_15294_jte_v10i2_18628
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1411-0059&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1411-0059&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1411-0059&client=summon