Analysis of Cryptographic Utilization with Merkle-Damgård Algorithm
##plugins.themes.academic_pro.article.main##
Abstract
Cryptography plays an important role in data security, especially in authentication and digital signatures. One method that is widely used in cryptographic hash functions is the Merkle-Damgård algorithm. This algorithm allows the transformation of variable-sized data into a fixed hash value through an iterative process with a compression function. This study aims to analyze and understand the working mechanism of the Merkle-Damgård algorithm and its implementation in a data security system. The methods used in this study include the hashing process by dividing messages into fixed blocks, adding padding, initializing the initial value, and iterating the compression function. Testing was carried out with the example of the plaintext "ABC" using a simple XOR operation. The results of the analysis show that the Merkle-Damgård algorithm can produce unique and deterministic hash values, making it effective in detecting data changes. However, this algorithm also has weaknesses against collision attacks, which is a challenge in its development. Therefore, a deep understanding of this algorithm is essential in improving the security of modern hash functions.
##plugins.themes.academic_pro.article.details##
References
Fajrin, A. M. (n.d.). Perbandingan Performa Kecepatan dari Algoritma Hash Function untuk Proses Enkripsi Password (Vol. 4, Issue 4).
Indrayani, R., Ferdiansyah, P., & Koprawi, M. (2024). Analisis Penggunaan Kriptografi Metode AES 256 Bit pada Pengamanan File dengan Berbagai Format. 4(2). https://doi.org/10.47709/digitech.v4i2.5457
Patricia, J. (2024). CYBER NOTARY DAN DIGITALISASI TANDA TANGAN. Grup Penerbitan CV BUDI UTAMA.
Sitorus, N., Sharon, J., Sinaga, G., Samosir, S. L., Terapan, S., Rekayasa, T., Lunak, P., & Del, I. T. (2024). Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2. Jurnal Quancom, 2(2).
Tiwari, H. (2017). Merkle-Damgård Construction Method and Alternatives: A Review. In Survey Paper JIOS (Vol. 41, Issue 2).
Ariyus, D., & Wahidah, N. (2018). Analisis Perbandingan Keamanan Algoritma SHA-1 dan SHA-256 pada Aplikasi Keamanan Data. Jurnal Ilmiah Teknologi Informasi, 12(2), 45-56. (t.thn.).
Kurniawan, Y., & Setiawan, E. (2021). Analisis Keamanan Algoritma SHA-256 terhadap Serangan Tabrakan. Jurnal Ilmiah Teknik Informatika, 9(1), 34-42. (t.thn.).
Prasetyo, B., & Hidayat, R. (2019). Implementasi Algoritma MD5 untuk Integritas Data pada Sistem Keamanan Informasi. Jurnal Sistem Informasi dan Teknologi, 7(3), 123-130. (t.thn.).
Rahardjo, B., & Susanto, A. (2017). Penerapan Fungsi Hash dalam Pengamanan Data Transaksi Elektronik. Jurnal Informatika dan Komputer, 10(2), 89-97. (t.thn.).
Saputra, A., & Wijaya, D. (2020). Studi Komparasi Algoritma Kriptografi Hash SHA-1, SHA-256, dan MD5. Jurnal Teknologi dan Sistem Informasi, 5(1), 78-85. (t.thn.).