Analisis Kinerja Algoritma Hash dan MAC terhadap Integritas dan Autentikasi Data
DOI:
https://doi.org/10.62671/jikum.v2i2.166Keywords:
Data Security, Hash Algorithm, Message Authentication CodeAbstract
In information systems, data security plays a crucial role, particularly in ensuring data integrity and authentication during storage and transmission processes. Hash algorithms and Message Authentication Codes (MAC) are two cryptographic techniques commonly employed for these purposes. Hash algorithms are primarily used to maintain data integrity, whereas MAC provides both data integrity and authentication through the use of a shared secret key. This study aims to analyze and compare the performance of hash algorithms and MAC in preserving data integrity and authentication. The research adopts a quantitative experimental method with a comparative analysis approach, using test data of varying sizes and evaluating performance based on specific operational parameters. The results indicate that hash algorithms are effective in detecting data modifications through hash value comparison, while MAC offers stronger guarantees by ensuring both data integrity and authentication using a shared secret key. These findings highlight the strengths and limitations of each mechanism and provide insights into their appropriate application in secure information systems. The findings further suggest that hash algorithms are more suitable for data integrity verification, whereas MAC is more appropriate for systems that require both data integrity and authentication simultaneously.
References
Agusniar, C., Fazira, I., & Wahyunita, L. (2025). Implementation of the Secure Hashing Algorithm-512 (SHA-512) for Sign-Up Page Security in the KelasSeru Tutoring System. Journal of Advanced Computer Knowledge and Algorithms. 2(1), 19-23. https://doi.org/10.29103/jacka.v2i1.20320
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). John Wiley & Sons. ISBN 978-1-119-64278-7.
Article Text 2249. (2022). Analisis kinerja algoritma kriptografi pada sistem informasi. Jurnal Ilmu Komputasi. https://journal.unnes.ac.id/sju/index.php/jik/article/view/3576
Article Text 52. (2020). Penerapan algoritma hash dalam keamanan data. Jurnal Teknik Komputer. https://ejournal.bsi.ac.id/ejurnal/index.php/jtk/article/view/154
Bellare, M., Canetti, R., & Krawczyk, H. (1996). HMAC: Keyed-Hashing for Message Authentication. RFC 2104. Dworkin, M. (2008). Recommendation for Block Cipher Modes of Operation: CMAC. NIST SP 800-38B. NIST. (2018).
Digital Signature Standard (DSS). FIPS PUB 186-4.
Hash algorithm in verification of certificate data integrity and security. (2020). Jurnal Informatika dan Fakultas Ilmu Komputer. https://journal.uad.ac.id/index.php/JIFO/article/view/154
IKRAITH Informatika. (2023). Komparasi fungsi hash MD5 dan SHA-256. IKRAITH Informatika. https://journals.upi- yai.ac.id/index.php/ikraith-informatika/article/view/3576
Iskandar, M. I. (2025). Integritas Data: Menjamin Keutuhan, Keamanan, dan Kualitas Data. Phintraco Technology. Kahn Academy of Sciences & Bellare, M. (2006). HMAC: Keyed-Hashing for Message Authentication. RFC 2104. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography. Chapman & Hall/CRC.
Katz, J., & Lindell, Y. (2021). Introduction to Modern Cryptography (3rd ed.). Chapman & Hall/CRC. Liu, D. (2006). Next Generation SSH2 Implementation: Securing Data in Motion. Syngress Publishing.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
National Institute of Standards and Technology. (2015). FIPS Publication 180-4: Secure Hash Standard (SHS).https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf
National Institute of Standards and Technology. (2023). NIST Special Publication 800-107 Revision 1: Recommendation for Applications Using Approved Hash Algorithms. U.S. Department of Commerce.
Oktavia, D., et al. (2017). Analisis dan implementasi algoritma SHA-1 dan SHA-3 pada sistem autentikasi. Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer (J-PTIIK).https://j-ptiik.ub.ac.id/index.php/j- ptiik/article/view/1052
Schneier, B. (2015). Applied Cryptography. John Wiley & Sons.
Simbolon, I. A. R., Gunawan, I., Kirana, I. O., Dewi, R., & Solikhun, S. (2020). Penerapan Algoritma AES 128-Bit dalam Pengamanan Data Kependudukan pada Dinas Dukcapil Kota Pematangsiantar. Journal of Computer System and Informatics (JoSYC), 1(2), 54-60.



