Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Analisa Penerapan Algoritma Keccak untuk Keamanan Permintaan API

View through CrossRef
Implementing REST in modern applications, security will be a key foundation for its development because the REST architecture requires communication between servers. In this study, we will enhance REST request security by using SHA-1 tokens and the Keccak algorithm. Tokens are the access keys for making requests. The token generation process is carried out on the server; the client will generate a token, and the server will return a valid token. This valid token can be used to request data from the server. Adding a token will impact the security and speed of REST. The token will be verified by the server and declared valid. If valid, the server will return the data; otherwise, the server will send an error message. Compared to using a token, data security is more assured. Furthermore, adding a token parameter will increase the token verification process, thus increasing the number of processes, which will impact speed. The results of this test show that server data security is better maintained and more secure compared to using a token, because anonymous users cannot access the data. The API access speed without a token is 48.8 milliseconds, while using a SHA-1 token is 62.3 milliseconds, and the Keccak algorithm is 58.9 milliseconds. The time efficiency reduction for implementing the SHA-1 token algorithm is 27.67% or 13.5 milliseconds, and the Keccak algorithm is 26.6% or 10 milliseconds.
Title: Analisa Penerapan Algoritma Keccak untuk Keamanan Permintaan API
Description:
Implementing REST in modern applications, security will be a key foundation for its development because the REST architecture requires communication between servers.
In this study, we will enhance REST request security by using SHA-1 tokens and the Keccak algorithm.
Tokens are the access keys for making requests.
The token generation process is carried out on the server; the client will generate a token, and the server will return a valid token.
This valid token can be used to request data from the server.
Adding a token will impact the security and speed of REST.
The token will be verified by the server and declared valid.
If valid, the server will return the data; otherwise, the server will send an error message.
Compared to using a token, data security is more assured.
Furthermore, adding a token parameter will increase the token verification process, thus increasing the number of processes, which will impact speed.
The results of this test show that server data security is better maintained and more secure compared to using a token, because anonymous users cannot access the data.
The API access speed without a token is 48.
8 milliseconds, while using a SHA-1 token is 62.
3 milliseconds, and the Keccak algorithm is 58.
9 milliseconds.
The time efficiency reduction for implementing the SHA-1 token algorithm is 27.
67% or 13.
5 milliseconds, and the Keccak algorithm is 26.
6% or 10 milliseconds.

Related Results

ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
Algoritma merupakan akar dari sebuah sistem yang terbentuk dalam dunia pemrograman.Melalui serangkaian cara yang masuk akal dan teratur, sebuah algoritma dapat menyelesaikan suatu ...
Perbandingan Kinerja Algoritma Naïve Bayes Dan C.45 Dalam Klasifikasi Spam Email
Perbandingan Kinerja Algoritma Naïve Bayes Dan C.45 Dalam Klasifikasi Spam Email
Antispam dengan algoritma tertentu yang dapat memisahkan antara spam-mail dengan non spam mail. Perbandingan kinerja antara algoritma naïve bayes, dan decision tree yang memakai al...
API Offshore Structure Standards: 2006 And Beyond
API Offshore Structure Standards: 2006 And Beyond
Abstract The future of the API offshore structure standards appears to be at a crossroad. The short term plans are clearly laid out, with the projected publicatio...
API Offshore Standards Activities: Equipment Quality
API Offshore Standards Activities: Equipment Quality
ABSTRACT The American Petroleum Institute has introduced new quality requirements into its drilling and producing equipment standardization program. These new req...
ANALISIS MODEL L-DIVERSITY DENGAN ALGORITMA SYSTEMATIC CLUSTERING DAN DATAFLY
ANALISIS MODEL L-DIVERSITY DENGAN ALGORITMA SYSTEMATIC CLUSTERING DAN DATAFLY
Penelitian ini dilatar belakangi oleh teknik anonimitas data yang terdapat pada Privacy Preserving Data Publishing. Sehingga data yang ingin dipublikasikan bersifat anonim, tanpa m...
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Keamanan data transmisi merupakan aspek penting dalam sistem informasi modern seiring meningkatnya pertukaran data melalui jaringan terbuka. Berbagai ancaman seperti penyadapan, ma...
Silymarin PlantCrystals for Improved Dermal Drug Delivery
Silymarin PlantCrystals for Improved Dermal Drug Delivery
Background/Objectives: PlantCrystals (PCs) are submicron particles derived from plants or parts of plants that can be produced by bead milling and/or high-pressure homogenization. ...

Back to Top