Version 1
: Received: 1 July 2024 / Approved: 1 July 2024 / Online: 1 July 2024 (13:13:51 CEST)
How to cite:
Uriawan, W.; Ramadita, R.; Putra, R. D.; Siregar, R. I.; Addiva, R. Authenticate and Verification Source Files using SHA256 and HMAC Algorithms. Preprints2024, 2024070075. https://doi.org/10.20944/preprints202407.0075.v1
Uriawan, W.; Ramadita, R.; Putra, R. D.; Siregar, R. I.; Addiva, R. Authenticate and Verification Source Files using SHA256 and HMAC Algorithms. Preprints 2024, 2024070075. https://doi.org/10.20944/preprints202407.0075.v1
Uriawan, W.; Ramadita, R.; Putra, R. D.; Siregar, R. I.; Addiva, R. Authenticate and Verification Source Files using SHA256 and HMAC Algorithms. Preprints2024, 2024070075. https://doi.org/10.20944/preprints202407.0075.v1
APA Style
Uriawan, W., Ramadita, R., Putra, R. D., Siregar, R. I., & Addiva, R. (2024). Authenticate and Verification Source Files using SHA256 and HMAC Algorithms. Preprints. https://doi.org/10.20944/preprints202407.0075.v1
Chicago/Turabian Style
Uriawan, W., Rizqi Ilham Siregar and Risyad Addiva. 2024 "Authenticate and Verification Source Files using SHA256 and HMAC Algorithms" Preprints. https://doi.org/10.20944/preprints202407.0075.v1
Abstract
Because data authenticity and validity are becoming more and more of a concern in the digital age file security and integrity must be guaranteed. This paper investigates the application of HMAC-SHA256 which combines the Secure Hash Algorithm 256 (SHA256) with a private key for transmission-side source file authentication and verification. The study creates a prototype application to evaluate the efficacy of HMAC-SHA256 in securing file transfers by examining previous investigations on SHA and HMAC. The findings demonstrate that SHA256 produces unique file signatures which successfully guards against unwanted changes. Through the use of cryptographic hashes and secret keys to create distinct digital signatures that guarantee file authenticity HMAC improves security. The study shows that HMAC-SHA256 protects data integrity and detects tampering effectively. It does however stress how crucial it is to comprehend cryptographic concepts and apply these strategies with caution in order to prevent vulnerabilities. Overall the study finds that when properly implemented and updated HMAC-SHA256 greatly enhances file security in the digital age.
Keywords
AES, Cryptography, HMAC, SHA256
Subject
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.