Claim Missing Document
Check
Articles

Found 1 Documents
Search

Analisis Kinerja Algoritma Hash dan MAC terhadap Integritas dan Autentikasi Data Putri, Luthfiah; Khairunnisa, Zulfa; Senjani, Junita Rahma; Praramadani, Septia; Hasibuan, Yulandari
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.166

Abstract

In information systems, data security plays a crucial role, particularly in ensuring data integrity and authentication during storage and transmission processes. Hash algorithms and Message Authentication Codes (MAC) are two cryptographic techniques commonly employed for these purposes. Hash algorithms are primarily used to maintain data integrity, whereas MAC provides both data integrity and authentication through the use of a shared secret key. This study aims to analyze and compare the performance of hash algorithms and MAC in preserving data integrity and authentication. The research adopts a quantitative experimental method with a comparative analysis approach, using test data of varying sizes and evaluating performance based on specific operational parameters. The results indicate that hash algorithms are effective in detecting data modifications through hash value comparison, while MAC offers stronger guarantees by ensuring both data integrity and authentication using a shared secret key. These findings highlight the strengths and limitations of each mechanism and provide insights into their appropriate application in secure information systems. The findings further suggest that hash algorithms are more suitable for data integrity verification, whereas MAC is more appropriate for systems that require both data integrity and authentication simultaneously.