Implementasi Algoritma SHA-3 Dan AES Sebagai Sistem Keamanan Pada Proses Pensinyalan Mobile IPv6

Main Authors: Praptodiyono, Supriyanto, Sidiq, Muhammad Akbar, Muhammad, Fadil
Format: Article PeerReviewed Book
Bahasa: ind
Terbitan: Jurusan Teknik Elektro , 2021
Subjects:
Online Access: https://eprints.untirta.ac.id/8369/1/13075-33947-1-PB.pdf
https://eprints.untirta.ac.id/8369/
https://jurnal.untirta.ac.id/index.php/jis/index
Daftar Isi:
  • Based on statistical data, accessing the internet via mobile devices is one of the most popular where half of the world's web traffic uses a mobile account. Mobile IP technology can be used as a protocol to maintain connectivity even if the device changes connection channels from the network that is connected to the new network. However, communication on MIPv6 (Mobile IPv6) is at risk of attack. The method to prevent attacks on the MIPv6 signaling process can use IPsec with the tunnel method using the ESP (Encapsulating Security Payload) protocol that supports encryption and authentication. The 3-DES encryption algorithm and the SHA-1 authentication algorithms are the most commonly used today. The 3-DES and SHA-1 algorithms are considered to have security holes, so an updated algorithm is needed. This study uses AES and SHA-3 as algorithms implemented in IPsec which is an update of 3-DES and SHA-1. Based on the research conducted, SHA-3 did not find any security holes of collision attack. AES also has a higher level of security compared to 3-DES against brute-force attacks with respectively an estimated cracking computation time is 2.7 x 10^25 years and 6.2 x 10^21 years.