Implementasi Algoritma SHA-3 Dan AES Sebagai Sistem Keamanan Pada Proses Pensinyalan Mobile IPv6
Main Authors: | Praptodiyono, Supriyanto, Sidiq, Muhammad Akbar, Muhammad, Fadil |
---|---|
Format: | Article PeerReviewed Book |
Bahasa: | ind |
Terbitan: |
Jurusan Teknik Elektro
, 2021
|
Subjects: | |
Online Access: |
https://eprints.untirta.ac.id/9596/5/Paper%20Setrum%202%20Lengkap.pdf https://eprints.untirta.ac.id/9596/ https://jurnal.untirta.ac.id/index.php/jis/index |
Daftar Isi:
- Based on statistical data, accessing the internet via mobile devices is one of the most popular where half of the world's web traffic uses a mobile account. Mobile IP technology can be used as a protocol to maintain connectivity even if the device changes connection channels from the network that is connected to the new network. However, communication on MIPv6 (Mobile IPv6) is at risk of attack. The method to prevent attacks on the MIPv6 signaling process can use IPsec with the tunnel method using the ESP (Encapsulating Security Payload) protocol that supports encryption and authentication. The 3-DES encryption algorithm and the SHA-1 authentication algorithms are the most commonly used today. The 3-DES and SHA-1 algorithms are considered to have security holes, so an updated algorithm is needed. This study uses AES and SHA-3 as algorithms implemented in IPsec which is an update of 3-DES and SHA-1. Based on the research conducted, SHA-3 did not find any security holes of collision attack. AES also has a higher level of security compared to 3-DES against brute-force attacks with respectively an estimated cracking computation time is 2.7 x 10^25 years and 6.2 x 10^21 years.