PERFORMANCE CALCULATION OF HASH SHA-1 IN EMBEDDED SYSTEM USING ARDUINO
Abstract
The development of digital electronic devices that can communicate with each other causing the need for data security or data protection. However, in the many digital electronic devices are not equipped with security or protection of the data. In this study has the main objective to design an embedded system that can be added to the digital electronic devices to provide security or protection of the data. As the initial phase of the study, in this paper have measured performance data security in embedded systems with Arduino using a cryptographic algorithm SHA-1 hash function. Performance of SHA-1 hash calculation using linear regression approach of measurement results show for 1 byte of data takes time 2,505 ms. Each additional 1 byte of data calculation time hash function SHA-1 increased 0.0715 ms.
Keywords: arduino, cryptography, data security, embedded system, hash function, SHA-1
References
DAFTAR PUSTAKA
________, (2008), “Secure Hash Standard”, National Institute of Standards and Technology, NIST FIPS PUB, 180-3, U.S. Department of Commerce
Baurahla, M., (2009), Modelling and Verification of Real-time Embedded System, Proceeding ISIICT’09 Proceedings of the Third international conference on Innovation and Information and Communication Technology, British Computer Society Swinton, UK.
Jarvinen, K., (2004), Design and Implementation of a SHA-1 Hash Module on FPGAs, Otakaari 5A, Espoo, FIN-02150, Finland.
Javale, D., Mohsin, M., Nandanwar, S., Shingate, M., (2013), Home Automation and Security System using Android ADK, International Journal of Electronics Communication and Computer Technology (IJECCT), Volume 3 Issue 2.
Jyostna, K., Padmaja, V., 2011, Secure Embedded System Netwroking: An Advance Security Perspective, International Journal of Engineering Science and Technology (IJEST), ISSN: 0975-5462, Vol 3 No.5
Koopman, P., 2004, Embedded System Security, IEEE Computer Society, Embedded Computing.
Ravi, S., Raghunathan, A., Kocher, P., Hatangady, S., 2004, Security in Embedded Systems: Design Challenges, ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, Pages 461–491, Broadway, New York.
Rivest, R., 1992, The MD4 Message-Digest Algorithm, RFC 1320 (Informational)
_________, 1992, The MD5 Message-Digest Algorithm, RFC 1321 (Informational)
Shipley, P., Garfinkel, S.L., 2001, An Analysis of Dial-Up Modems and Vulnerabilities, Copyright Spring.