GENERATE KUNCI SHA1, MD5, SHA-256 PADA JAVA ANDROID STUDIO
Keywords:
SHA1, MD5, SHA-256, Android Studio, JavaAbstract
Data security issues are a very serious problem in the use of information systems. Almost all the data we use is stored in a database that can be accessed online and can be used by any user. Data security can be done in several ways, for example limiting access rights and applying cryptographic methods. Hash algorithm, which is also called message digest algorithm is used to generate a special message digest for random messages. Secure Hash Algorithm (SHA) is a Hash function that is "irreversible" into the original message (one way) which will produce a checksum or fingerprint of the data. The Hash functions used for this research are SHA1, MD5, and SHA-256. On the other hand, accessing and retrieving information in this digital era is getting easier and faster. This development can also affect the way someone carries out the identity verification process to enter a system. The identity verification process that is widely used is using a fingerprint detection tool. It is hoped that Generating SHA1, MD5, SHA-256 Keys and Fingerprint Login Authentication in Java Android Studio Chipmunk can become a basic step in developing login security in the future.
References
A. B. Nasution, “Implementasi Pengamanan Data Dengan Menggunakan Algoritma Caesar Cipher Dan Transposisi Cipher,” J. Teknol. Inf., vol. 3, no. 1, p. 1, 2019, doi: 10.36294/jurti.v3i1.680
B. U. Customer, “Analisis Pengaruh Sistem Keamanan Informasi Perbankan pada Nasabah Pengguna Internet Banking,” vol. 3, no. 1, pp. 1–9, 2019.
D Rachmawati, J T Tarigan and A B C Ginting, “A comparative study of Message Digest 5 (MD5) and SHA256 algorithm,” Journal of Physics: Conference Series 2nd International Conference on Computing and Applied Informatics 2017
F. G. N. Larosa, J. F. Naibaho, and R. M. Tarigan, “Web Storage Berbasis Private Cloud Menggunakan Enkripsi Sha1,” J. METHOMIKA, vol. 4, no. 1, pp. 56–59, 2020, [Online]. Available: http://www.methomika.net/index.php/jm ika/article/view/142/81.
H. Rohman, U. Darussalam, N. D. Natashia, “Sistem Presensi Fingerprint Berbasis Smartphone Android,” Jurnal Informatika Merdeka Pasuruan, Vol 5 No 1 Maret 2020.
Lase, H.,& Mufti. (2018). implementasi one time password (otp) mobile token dengan menggunakan metode algoritma MD5 dan SHA. Jurnal SKANIKA Vol.1 No.1, P.153
R. Pamungkas and S. Saifullah, “Evaluasi Kualitas Website Program Studi Sistem Informasi Universitas PGRI Madiun Menggunakan Webqual 4.0,” INTENSIF J. Ilm. Penelit. dan Penerapan Teknol. Sist. Inf., vol. 3, no. 1, p. 22, Feb. 2019, doi: 10.29407/intensif.v3i1.12137.
R. Pamungkas, “OPTIMALISASI QUERY DALAM BASIS DATA MY SQL MENGGUNAKAN INDEX,” Res. J. Comput. Inf. Syst. Technol. Manag., vol. 1, no. 1, pp. 27–31, 2018
R. Prasetyo and A. Suryana, “Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 5, no. 2, p. 61, 2016, doi: 10.32736/sisfokom.v5i2.40.
Sihan Long, “A comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512,” Journal of Physics: Conference Series ICEMCE 2019
Y. Bin Idris, S. Adli Ismail, N. F. Mohd Azmi, A. Azmi, and A. Azizan, “Enhancement Data Integrity Checking Using Combination MD5 and SHA1 Algorithm in Hadoop Architecture,” J. Comput. Sci. Comput. Math., vol. 7, no. 3, pp. 99–102, 2017, doi: 10.20967/jcscm.2017.03.007