DocumentCode :
3541281
Title :
Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system
Author :
Putri Ratna, Anak Agung ; Dewi Purnamasari, Prima ; Shaugi, Ahmad ; Salman, Molly
Author_Institution :
Fac. of Eng., Dept. of Electr. Eng., Univ. Indonesia, Depok, Indonesia
fYear :
2013
fDate :
25-28 June 2013
Firstpage :
99
Lastpage :
104
Abstract :
Simple-O, an automated essay grading application was developed at the Department of Electrical Engineering University of Indonesia. This application used MD5 + salt algorithm to perform protection for authentication password of users stored in its database. Unfortunately, due to a number of flaws contained in the MD5 algorithm, SHA-1 + salt algorithm was implemented in this application and then the comparison was carried out between those two algorithms. The experiments include time measurements and estimation of brute force attack for each algorithm. Processing time and CPU usage were also measured. In the brute force hash code scenario, it was tried to find plaintext from the chipertext. In this scenario, both MD5 and SHA-1 was implemented and tested using Hashcat tool. The better the algorithm, the more time needed to brute force the chipertext. In this scenario the password tested has 8 to 10 characters. The result from this testing shows that the implementation of SHA-1 algorithm is more robust against brute force attacks than MD5. The difference in processing time between SHA-1 + salt and MD5 + salt ranged from 0.001 seconds to 0.002 seconds for each length variation of the password from 8 to 10 character. While the difference in CPU usage is 0.545%, 0.985%, and 1.69% respectively for the password with 8, 9, and 10 characters length. These results indicate that while giving better security the implementation of the algorithm SHA-1 + salt does not impose on the performance of Simple-O application.
Keywords :
cryptography; message authentication; CPU usage; Hashcat tool; MD5 + salt algorithm; MD5 algorithm; SHA-1 + salt algorithm; SHA-1 algorithm; Simple-O authentication based security system; authentication password; automated essay grading application; brute force attack estimation; brute force hash code scenario; chipertext; plaintext; processing time; time 0.001 s to 0.002 s; time measurements; Algorithm design and analysis; Authentication; Databases; Estimation; Force; Testing; CPU usage; MD5 algorithm; SHA-1 algorithm; Simple-O authentication system security; brute force attack; processing time;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
QiR (Quality in Research), 2013 International Conference on
Conference_Location :
Yogyakarta
Print_ISBN :
978-1-4673-5784-5
Type :
conf
DOI :
10.1109/QiR.2013.6632545
Filename :
6632545
Link To Document :
بازگشت