Optimization of the SHA-256 Algorithm and Salt Method for Securing New Student Accounts at Almuslim Islamic Boarding School

Authors

  • Syauqa Mardhatillah Universitas Almuslim
  • Sri Universitas Almuslim
  • Dedy Universitas Almuslim

Keywords:

SHA-256, Salt, OpenSSL 3

Abstract

This is due to the various techniques used by unauthorized parties to gain access to account information. Therefore, protecting passwords must be a top priority, including in the management of prospective student accounts at Almuslim Islamic boarding school. This study aims to design and implement a login system for online student registration by securing user accounts using the SHA-256 hashing algorithm combined with the salt method. The security process is carried out by hashing the password after adding a unique salt, ensuring that the stored data is not in plain text. The results of testing show that the system is able to securely store account data and successfully verify users during login through hash and salt matching

Downloads

Download data is not yet available.

References

[1] O. Dakhi, M. Masril, R. Novalinda, J. Jufrinaldi, and A. Ambiyar, “Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher,” INVOTEK: Jurnal Inovasi Vokasional dan Teknologi, vol. 20, no. 1, 2020, doi: 10.24036/invotek.v20i1.647.

[2] R. Rivaldi and S. Subandi, “IMPLEMENTASI KEAMANAN DATA ARSITEKTUR MENGGUNAKAN ALGORITMA KRIPTOGRAFI DENGAN METODE RIVEST CODE (4 RC4)PADA PT.NAVIRI INDAH CEMERLANG,” SKANIKA, vol. 4, no. 2, 2021, doi: 10.36080/skanika.v4i2.2249.

[3] F. D. Putra, J. Riyanto, and A. F. Zulfikar, “Rancang Bangun Sistem Informasi Manajemen Aset pada Universitas Pamulang Berbasis WEB,” Journal of Engineering, Technology, and Applied Science, vol. 2, no. 1, 2020, doi: 10.36079/lamintang.jetas-0201.93.

[4] F. Fitriani and I. Muslem R, “E-Absensi Mahasiswa Fakultas Ilmu Komputer Universitas Almuslim Berbasis Web,” JURNAL TIKA, vol. 5, no. 3, 2021, doi: 10.51179/tika.v5i3.141.

[5] S. Winar, E. Rizki Putra, and I. Muslem R., “Sistem Informasi Kalkulasi Zakat Pada Kantor Baitul Mal Kabupaten Bireuen Berbasis Android,” Jurnal TIKA, vol. 7, no. 3, 2022, doi: 10.51179/tika.v7i3.1584.

[6] A. R. Gunawan, N. P. Sastra, and D. M. Wiharta, “Penerapan Keamanan Jaringan Menggunakan Sistem Snort dan Honeypot Sebagai Pendeteksi dan Pencegah Malware,” Majalah Ilmiah Teknologi Elektro, vol. 20, no. 1, 2021, doi: 10.24843/mite.2021.v20i01.p09.

[7] D. W. Wesson, “Sniffing behavior communicates social hierarchy,” Current Biology, vol. 23, no. 7, 2013, doi: 10.1016/j.cub.2013.02.012.

[8] R. Dewi, T. M. Johan, and I. Muslem R., “Aplikasi Kriptografi Dalam Mengamankan Pesan Teks Dengan Metode Algoritma Rc4 Berbasis Android,” JURNAL TIKA, vol. 6, no. 01, 2021, doi: 10.51179/tika.v6i01.416.

[9] A. Wijaya and T. Sutabri, “ANALISIS INFORMATION TECHNOLOGY SERVICE MANAGEMENT (ITSM) APLIKASI ABSENSI ONLINE PADA BADAN KEPEGAWAIAN DAN PENGEMBANGAN SUMBER DAYA MANUSIA OGAN ILIR,” Blantika : Multidisciplinary Journal, vol. 2, no. 1, 2023, doi: 10.57096/blantika.v2i1.7.

[10] U. Aedi and Asep Amaludin, “Modernisasi Sistem Manajemen Pesantren Dengan SIAP(Sistem Informasi Administrasi Pesantren) Pada Pondok Pesantren Sirojuth Tholibin,” Journal of Islamic Management, vol. 2, no. 2, 2022, doi: 10.15642/jim.v2i2.830.

[11] A. B. Setiawan and J. Sulaksono, “SISTEM INFORMASI MANAJEMEN SANTRI DI PONDOK PESANTREN AL ISHLAH KOTA KEDIRI,” Network Engineering Research Operation, vol. 4, no. 2, 2019, doi: 10.21107/nero.v4i2.122.

[12] R. Dewi, T. M. Johan, and I. Muslem R., “Aplikasi Kriptografi Dalam Mengamankan Pesan Teks Dengan Metode Algoritma Rc4 Berbasis Android,” JURNAL TIKA, vol. 6, no. 01, 2021, doi: 10.51179/tika.v6i01.416.

[13] A. S. Assaidi and A. Amborowati, “Perancangan Aplikasi Diary Menggunakan Algoritma Kriptografi Rc6 Berbasis Android,” Seminar Nasional Teknologi Informasi dan Multimedia, vol. 4, no. 7, 2016.

[14] S. Suhaili and N. Julai, “FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation,” Pertanika J Sci Technol, vol. 30, no. 1, 2022, doi: 10.47836/PJST.30.1.32.

[15] T. H. Tran, H. L. Pham, and Y. Nakashima, “A High-Performance Multimem SHA-256 Accelerator for Society 5.0,” IEEE Access, vol. 9, 2021, doi: 10.1109/ACCESS.2021.3063485.

[16] Sutriman and B. Sugiantoro, “Analysis of password and salt combination scheme to improve hash algorithm security,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 11, 2019, doi: 10.14569/IJACSA.2019.0101158.

[17] S. E. S. Castelo, R. J. L. Apostol, D. M. A. Cortez, R. M. Dioses, M. C. R. Blanco, and V. A. Agustin, “Modification of SHA-512 using Bcrypt and salt for secure email hashing,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 33, no. 1, 2024, doi: 10.11591/ijeecs.v33.i1.pp398-404.

[18] Z. Li, D. Wang, and E. Morais, “Quantum-Safe Round-Optimal Password Authentication for Mobile Devices,” IEEE Trans Dependable Secure Comput, vol. 19, no. 3, 2022, doi: 10.1109/TDSC.2020.3040776.

[19] H. Liu, Y. Xu, and C. Ma, “Chaos-based image hybrid encryption algorithm using key stretching and hash feedback,” Optik (Stuttg), vol. 216, 2020, doi: 10.1016/j.ijleo.2020.164925.

[20] P. Gauravaram, “Security analysis of salt||password hashes,” in Proceedings - 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012, 2012. doi: 10.1109/ACSAT.2012.49.

[21] J. Wang, G. Liu, Y. Chen, and S. Wang, “Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box,” IEEE Access, vol. 9, 2021, doi: 10.1109/ACCESS.2021.3071501.

[22] O. A. Manankova, M. Z. Yakubova, and A. S. Baikenov, “Cryptanalysis the SHA-256 Hash Function Using Rainbow Tables,” Indonesian Journal of Electrical Engineering and Informatics, vol. 10, no. 4, 2022, doi: 10.52549/ijeei.v10i4.4247.

[23] K. Nakamura, K. Hori, and S. Hirose, “Algebraic fault analysis of sha-256 compression function and its application,” Information (Switzerland), vol. 12, no. 10, 2021, doi: 10.3390/info12100433.

[24] F. N. Khasanah, “Application of Hash Sha-256 Algorithm in Website-Based Sales Software Engineering,” Journal of Applied Data Sciences, vol. 3, no. 1, 2022, doi: 10.47738/jads.v3i1.50.

[25] S. Boonkrong and C. Somboonpattanakit, “Dynamic salt generation and placement for secure password storing,” IAENG Int J Comput Sci, vol. 43, no. 1, 2016.

[26] M. Risqi Firdaus -13520043, “Analisis Penggunaan Algoritma Bcrypt dengan Garam (Salt) untuk Pengamanan Password dari Peretasan.”

[27] A. Nugroho and T. Mantoro, “Salt Hash Password Using MD5 Combination for Dictionary Attack Protection,” in Proceedings - 2023 6th International Conference on Computer and Informatics Engineering: AI Trust, Risk and Security Management (AI Trism), IC2IE 2023, 2023. doi: 10.1109/IC2IE60547.2023.10331606.

Published

2025-12-27

How to Cite

Mardhatillah, S., Sri, & Dedy. (2025). Optimization of the SHA-256 Algorithm and Salt Method for Securing New Student Accounts at Almuslim Islamic Boarding School. Aceh Journal of Computer Science , 2(3). Retrieved from https://jurnal.fikompublisher.com/ilka/article/view/22