TY - JOUR AU - Anwar, Muhammad Rehan AU - Apriani, Desy AU - Adianita, Irsa Rizkita PY - 2021/09/20 Y2 - 2024/03/29 TI - Hash Algorithm In Verification Of Certificate Data Integrity And Security JF - Aptisi Transactions on Technopreneurship (ATT) JA - ATT VL - 3 IS - 2 SE - Articles DO - 10.34306/att.v3i2.212 UR - https://att.aptisi.or.id/index.php/att/article/view/212 SP - 181-188 AB - <p><em><span style="font-weight: 400;">The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message authentication codes (MACs). In the current development of certificate data security, there are 2 (two) types of hashes that are widely applied, namely, MD and SHA. However, when it comes to efficiency, in this study the hash type SHA-256 is used because it can be calculated faster with a better level of security. In the hypothesis, the Merkle-Damgård construction method is also proposed to support data integrity verification. Moreover, a cryptographic hash function is a one-way function that converts input data of arbitrary length and produces output of a fixed length so that it can be used to securely authenticate users without storing passwords locally. Since basically, cryptographic hash functions have many different uses in various situations, this research resulted in the use of hash algorithms in verifying the integrity and authenticity of certificate information.</span></em></p> ER -