Comparative Analysis of Data Encryption using the Bcrypt Algorithm and the MD5 Algorithm

Main Article Content

Gema Maulana
Habib Al Huda

Abstract

Information system security is important to protect system user data. One form of information system security implementation is to encrypt data using hashing techniques. The bcrypt algorithm and the MD5 algorithm are hashing techniques that are often used to encrypt data. Both of these algorithms aim to hash data, although they have the same purpose, the characteristics of these two algorithms are different. This study aims to analyze the comparison of hashing techniques using the MD5 algorithm with the bcrypt algorithm in encrypting data. This study uses a qualitative approach with literature study research methods and experiments by conducting direct testing of the bcrypt and MD5 algorithms in the data encryption process using the PHP programming language. The results show that the bcrypt algorithm will produce different hashing values even though the hashed data is the same data with a constant hashing value length of 60 characters and consists of a random combination of symbols, letters and numbers. Meanwhile, the MD5 algorithm will produce the same hashing value with the same hash data with a constant hashing value length of 32 characters and consists of a random combination of letters and numbers.

Article Details

Section
Articles

References

[1] S. Nurul, S. Anggrainy, And S. Aprelyani, “Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi : Keamanan Informasi , Teknologi Informasi Dan Network ( Literature Review Sim ),” Vol. 3, No. 5, Pp. 564–573, 2022.

[2] P. L. Jatika, “Penerapan Keamanan Login Admin Dan Filterisasi Input Untuk Mencegah Sql Injection,” Vol. 4, No. September, Pp. 349–356, 2023.

[3] I. W. Wulandari And H. Hwihanus, “Peran Sistem Informasi Akuntansi Dalam Pengaplikasian Enkripsi Terhadap Peningkatan Keamanan Perusahaan,” J. Kaji. Dan Penal. Ilmu Manaj., Vol. 1, No. 1, Pp. 11–25, 2023, Doi: 10.59031/Jkpim.V1i1.46.

[4] E. S., A. Lande, H. T. Sanjaya, And M. R. Hermawan, “Analisis Sistem Manajemen Keamanan Di Perusahaan Tokopedia Dalam Menigkatkan Proteksi Data Dan Privasi Pengguna,” J. Kewirausahaan Dan Manaj. Bisnis Cuan, Vol. 1, No. 1, Pp. 21–29, 2023, Doi: 10.59603/Cuan.V1i1.14.

[5] A. Wijoyo, T. Rahmawati, W. Agustin, And B. Muhammad Saputra, “Perlindungan Data Sensitif : Enkripsi Sebagai Pilar Utama Keamanan Komputer,” Chipsetjurnal Ilmu Komputer, Tek. Dan Multimed., Vol. 1, No. 2, Pp. 84–91, 2023, [Online]. Available: Https://Jurnal.Publikasimahasiswa.Id/Index.Php/Chipset

[6] D. Febrian Et Al., “Ciptaan Disebarluaskan Di Bawah Lisensi Creative Commons Atribusi 4.0 Internasional. Implementation Of Bcrypt Algorithm On Website-Based Hashing Generator Using Laravel Framework Implementasi Algoritma Bcrypt Pada Hashing Generator Berbasis Website Menggu,” Progr. Stud. Teknol. Inf., Vol. 7, No. 2, Pp. 199–212, 2023, Doi: 10.52362/Jisicom.V7i2.1130.

[7] M. D. Akbar, “Aplikasi Absensi Pegawai Pada Dinas Komunikasi Dan Informatika Kabupaten Deli Serdang Dengan Qr Code Menggunakan Algoritma Bcrypt,” 2022.

[8] A. Technology, J. Nur, P. Studi, T. Informatika, And U. Dayanu, “Implementation Of Bcrypt Algorithm For Sipapeda Website Security At Bappeda Office , Buton Regency,” Vol. 2, No. 2, Pp. 90–96, 2023.

[9] M. A. Fauzi, A. Id Hadiana, And F. R. Umbara, “Penambahan Fitur Multi-Factor Authentication Dalam Studi Kasus Sistem Informasi Rekam Medis Rumah Sakit,” Jati (Jurnal Mhs. Tek. Inform., Vol. 7, No. 4, Pp. 2938–2944, 2024, Doi: 10.36040/Jati.V7i4.7305.

[10] E. Y. Renaldi And S. Sitohang, “Rancangan Sistem Absensi Siswa Otomatis Berbasis Smart Qr Card Menggunakan Algoritma Bcrypt,” Comput. Sci. Ind. Eng., Vol. 9, No. 1, 2023, Doi: 10.33884/Comasiejournal.V9i1.7410.

[11] J. Jtik, J. Teknologi, M. R. Zayana, I. Fitri, And A. Gunaryati, “Penerapan Message Diggest Algorithm Md5 Untuk Pengamanan Data Karyawan Pt . Swifect Berbasis Desktop,” Vol. 6, No. 3, 2022.

[12] A. Ali And E. W. Faida, “Penerapan Algoritma Message Diggest Algorithm 5 Pada Login,” Vol. 7, No. 2, Pp. 590–595, 2022.

[13] Y. Christanto And T. Informatika, “Penerapan Algoritma Binary Search Dan Md5 Pada Sistem Informasi Manajemen Klinik,” Vol. 3, No. 2021, Pp. 353–360, 2024.

[14] B. Zebua, P. Herwanto, And R. Rosida, “Penggunaan Encripsi Md5 Untuk Pencegahan Sql Injection Pada Aplikasi Berbasis Web,” Pros. Semin. Nas. Inov. Dan Adopsi Teknol., Vol. 2, No. 1, Pp. 22–31, 2022, Doi: 10.35969/Inotek.V2i1.206.

[15] W. W. Sari, “Implementasi Metode Md2 Untuk Otentikasi Hasil Scan Citra Ijazah,” Resolusi Rekayasa Tek. Inform. Dan Inf., Vol. 1, No. 5, Pp. 302–311, 2021, [Online]. Available: Http://Ejurnal.Stmik-Budidarma.Ac.Id/Index.Php/Pelita/Article/View/2876