3 research outputs found

    Perbandingan Performa Kecepatan dari Algoritma Hash Functionuntuk Proses Enkripsi Password

    Get PDF
    Hash Function is a crucial component in the field of cryptography. It is also utilized for authentication processes within a system. Authentication processes need to ensure both security and data processing speed. One vital component in the authentication process is the password. Password security can be enhanced through encryption using hash functions. Algorithms that can be employed include SHA-1until SHA-3, MD5 and BLAKE2. Performance testing for execution speed and password comparison is conducted on these algorithms. The results indicate that the BLAKE2 algorithm has an average encryption time of 0.9857. Likewise, for the password comparison process, the BLAKE2 algorithm also exhibits a high speed with an average of 0.2230. As a result, the BLAKE2 algorithm is recommended for use in system authenticatio

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
    corecore