Main Article Content

Abstract

This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi. This study uses the Vulnerability Assessment and Penetration Testing (VAPT) method, which combines two forms of vulnerability testing to achieve a much more complete vulnerability analysis by performing different tasks in the same focus area. The vulnerability assessment uses the Common Vulnerability Scoring System (CVSS) method. The results showed that the Vulnerability Assessment and Penetration Testing (VAPT) method was proven to be able to identify the level of security vulnerability in the Reconciliation Application at the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi with a vulnerability level score of 5.3 in the SHA512 environment with a medium rating and 7.5 in the MD5 environment. with high ratings. So, it can be concluded that the best algorithm for implementing OTP is SHA512

Keywords

OTP, SHA512, MD5, VAPT, CVSS

Article Details

How to Cite
[1]
F. Basya, M. Hardjanto, and I. Permana Putra, “SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)”, bit-cs, vol. 3, no. 1, pp. 1-4, Jan. 2022.

References

  1. Perdana, U. P. S. (2016) ‘Pemanfaatan Telegram Bot Api Dalam Layanan Otentikasi Tanpa Password Menggunakan Algoritma Time-Based One-Time Password (Totp)’, pp. 1–12.
  2. Juardi, D. (2017) ‘Kajian vulnerability keamanan data dari eksploitasi hash length extension attack vulnerability data satisfaction study from exploitation hash length extension attack’, 6.
  3. Rizki, R. and Mulyati, S. (2020) ‘Implementasi One Time Password Menggunakan Algoritma SHA-512 Pada Aplikasi Penagihan Hutang PT. XHT’, Edumatic : Jurnal Pendidikan Informatika, 4(1), pp. 111–120. doi: 10.29408/edumatic.v4i1.2158.
  4. Sembiring, J. (2013) ‘Analisis Algoritma Sha-512 Dan Watermarking Dengan Metode Least Significant Bit Pada Data Citra’, Seminar Nasional Sistem Informasi Indonesia, pp. 2–4.
  5. Sulastri, S. and Putri, R. D. M. (2018) ‘Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan’, Jurnal Teknik Elektro, 10(2), pp. 70–74.
  6. Simran, G. and Sasikala, D. (2019) ‘Vulnerability Assessment of Web Applications using Penetration Testing’, International Journal of Recent Technology and Engineering, 8(4), pp. 1552–1556. doi: 10.35940/ijrte.b2133.118419.
  7. Goel, J. N. and Mehtre, B. M. (2015) ‘Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology’, Procedia Computer Science, 57, pp. 710–715. doi: 10.1016/j.procs.2015.07.458.
  8. Setiawan, D. A. et al. (2018) ‘Implementasi One Time Password Menggunakan Algoritma Hash Sha-512 Berbasis Web Pada Badan Kepegawaian Dan Pengembangan Sdm Kota’, Skanika Volume 1 No. 1 Maret 2018 Implementasi, 1(1), pp. 199–204.
  9. D. Kurniawan, A. L. Hananto, and B. Priyatna, “Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android,” Int. J. Comput. Tech.-–, vol. 5, no. 1, pp. 65–70, 2018.
  10. B. Huda, “Sistem Informasi Data Penduduk Berbasis Android Dan Web Monitoring Studi Kasus Pemerintah Kota Karawang (Penelitian dilakukan di Kab. Karawang),” Buana Ilmu, vol. 3, no. 1, pp. 62–69, 2018, doi: 10.36805/bi.v3i1.456.