[vc_empty_space][vc_empty_space]
HASH MD5 function implementation at 8-bit microcontroller
Aziz M.V.G.a, Wijaya R.a, Prihatmanto A.S.a, Henriyan D.a
a Electrical Enginering, Institut Teknologi Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]Microcontroller is often implemented in world manufacturing industry either part of an electronic product, such as a remote terminal unit. Remote terminal unit is an electronic device that responsible for retrieving data using sensors to a server, through cable network or a wireless network. The sensor used to read the data of temperature, altitude, and so on as required. As for the network that used as a medium for data delivery, can be via fibre-optic cable, GPRS modem, VSAT satellite, RF channels, and so on. Problems can occur when the data is sent as a plaintext (not secure). Such data can be read by unauthorized persons in various ways. So it needs to deploy a system of information security that can be implemented into 8-bit microcontroller. This research was conducted on the addition of the function signature, with the purpose of data integrity. Algorithms MD5 implement on 8-bit microcontroller-board, based on Arduino Uno kit. Then the next development stage of this research is, the data sent from a remote terminal units can be encrypted by the microcontroller, using either the algorithms AES, DES, 3DES or TwoFish encryption algorithm, among others. The result of this initial research, MD5 hash algorithm can be implemented in an 8-bit microcontroller with 100% accuracy. But it has some limitations on the issue among them, the data can be processed to a maximum of 15 (fifteen) characters, data input using keypad matrix 4×3, MD5 hash output is displayed on the LCD graphics 128×64 and can only enter data input capital letters only. © 2013 IEEE.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]8-bit microcontrollers,arduino kit,Electronic product,Encryption algorithms,Function signatures,hash md5,Manufacturing industries,Remote terminal units[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]8-bit microcontroller,arduino kit,cryptography,hash md5,information security[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/rICT-ICeVT.2013.6741530[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]