Title: Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application

Issue Number: Vol. 7, No. 4
Year of Publication: Dec - 2018
Page Numbers: 373-381
Authors: Meiliana Sumagita, Imam Riadi
Journal Name: International Journal of Cyber-Security and Digital Forensics (IJCSDF)
- Hong Kong
DOI:  http://dx.doi.org/10.17781/P002476


The login mechanism in web-based applications implements the MD5 hash function as a form of password encryption that proves to have weaknesses in the form of Collision Attack that is likely to have the same hash value on two different input values that can threaten the security and confidentiality of the data. Implementation of password security in web-based applications requires updating to improve reliability and ensure system security by using SHA 512 method. Data collection was done by literature study, data collection from internet, and observation. The research method is divided into several processes, namely needs analysis and system vulnerability, and analysis for improvement. The program design consists of flowchart design and conceptual design of a hash function calling mechanism. Mitigation is carried out with the implementation of the new hash function calling a method, code change for system repair (patching) and test results from implementation. Testing is done by penetration testing and user acceptance test (UAT) Testing after application of patch, the inputted password has been converted to more reliable hash function using SHA 512 method, and the result of UAT shows the result agreed and strongly agree with 86, 00%, so the implementation of the patch used to secure the password that was made during login can run as required.