Pemetaan Lanskap Penelitian Fungsi Hash dan Secure Hash Algorithm: Studi Bibliometrik Menggunakan Biblioshiny


  • Imam Saputra * Mail Sekolah Tinggi Ilmu Manajemen Sukma, Medan, Indonesia
  • Annisa Fadillah Siregar Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Hash Functions; Secure Hash Algorithm; Bibliometric Analysis; Scopus; Biblioshiny; Research Landscape Mapping

Abstract

Hash functions and secure hash algorithms are vital components in modern cybersecurity, essential for ensuring data integrity and authenticity. With the development of new attacks and the emergence of novel applications, the research landscape in this field has become highly dynamic and complex. This study aims to map the research landscape related to hash functions and secure hash algorithms using a comprehensive bibliometric study approach. Publication data comprising 494 journal and conference proceeding articles were collected from the Scopus database using a specific query. Bibliometric analysis was performed using Biblioshiny software, covering basic characteristics analysis, keyword co-occurrence, citation analysis (most cited works, intellectual structure), collaboration, thematic mapping, and thematic evolution. The results show significant publication growth over time, identifying key contributors (countries, institutions, authors) as well as the most relevant publication sources. Keyword analysis and thematic mapping revealed dominant research themes and clusters (e.g., core cryptography, hardware implementation, image security applications, potential in the healthcare sector), while citation analysis highlighted the most influential articles and authors forming the knowledge foundation. Thematic evolution demonstrated a shift in research focus from fundamental algorithms towards broader application exploration and related techniques in more recent periods. This study provides a comprehensive data-driven overview of the structure, trends, and dynamics of research on hash functions and secure hash algorithms. These findings contribute to understanding the status of this field and identify potential areas for future research, assisting researchers and practitioners in navigating the extensive literature.

Downloads

Download data is not yet available.

References

Amaludin, L., & Rahmatulloh, A. (2024). Penerapan ECDSA dan BLAKE2B Untuk Membentuk Tanda Tangan Digital Sebagai Autentikasi Dokumen. Jurnal Informatika Dan Multimedia, 16(2), 20–26. https://doi.org/10.33795/jtim.v16i2.6599

Assidiq, M. L., Mahardika, F., & Santika, D. (2024). Implementation of Aes and Sha-3 Cryptography Algorithms in Securing User Sensitive Data on the Artesian Water Bill Payment Transaction Website. JOCSIT .:. Journal of Collaborative Science and Informatics Technology, 1(1), 41–54. https://doi.org/10.69933/jocsit.v1i1.11

Baas, J., Schotten, M., Plume, A., Côté, G., & Karimi, R. (2020). Scopus as a curated, high-quality bibliometric data source for academic research in quantitative science studies. Quantitative Science Studies, 1(1), 377–386. https://doi.org/10.1162/qss_a_00019

Dewamuni, Z., Shanmugam, B., Azam, S., & Thennadil, S. (2023). Bibliometric Analysis of IoT Lightweight Cryptography. Information (Switzerland), 14(12). https://doi.org/10.3390/info14120635

Dolmeta, A., Martina, M., & Masera, G. (2023). Comparative Study of Keccak SHA-3 Implementations. Cryptography, 7(4). https://doi.org/10.3390/cryptography7040060

Duan, C. (2024). Analyses of Scientific Collaboration Networks among Authors, Institutions, and Countries in FinTech Studies: A Bibliometric Review. FinTech, 3(2), 249–273. https://doi.org/10.3390/fintech3020015

Fajrin, A. M. (2023). Perbandingan Performa Kecepatan dari Algoritma Hash Function untuk Proses Enkripsi Password. KESATRIA: Jurnal Penerapan Sistem Informasi, 4(4), 1069–1075.

Forliano, C., De Bernardi, P., & Yahiaoui, D. (2021). Entrepreneurial universities: A bibliometric analysis within the business and management domains. Technological Forecasting and Social Change, 165, 120522. https://doi.org/10.1016/j.techfore.2020.120522

Gonzalez-Valiente, C. L., & Lopez-Mesa, E. K. (2022). Intellectual structure of Library and Information Science in Iberoamerica using journal co-citation analysis: A comparative study based on Scopus and Web of Science. Transinformacao, 34. https://doi.org/10.1590/2318-0889202234e210036

Haifaa Ahmed Hasan, Hassan F. Al-Layla, & Farah N. Ibraheem. (2022). A Review of Hash Function Types and their Applications. Wasit Journal of Computer and Mathematics Science, 1(3), 75–88. https://doi.org/10.31185/wjcm.52

Han, Y. L. F. H. J. (2023). Applied Mathematics and Nonlinear Sciences. Applied Mathematics and Nonlinear Sciences, 8(2), 3383–3392.

Hosseini, E., Shahbazi, A., & Dehbozorgi, A. (2025). Topical Evolution and Thematic Progression of Research Frontiers: The Field of Knowledge Graphs. Knowledge Organization, 52(1). https://doi.org/10.31083/ko39497

Husna, J., Ratna, M. P., & Nasir, N. E. C. (2024). Analisis Bibliometrik Kiryoku: Jurnal Studi Kejepangan Tahun 2017-2021. Anuva: Jurnal Kajian …, 8(2), 209–226. https://ejournal2.undip.ac.id/index.php/anuva/article/view/22516%0Ahttps://ejournal2.undip.ac.id/index.php/anuva/article/download/22516/10752

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126

Lim, W. M., Kumar, S., & Donthu, N. (2024). How to combine and clean bibliometric data and use bibliometric tools synergistically: Guidelines using metaverse research. Journal of Business Research, 182(December 2023), 114760. https://doi.org/10.1016/j.jbusres.2024.114760

Melyan, N. R., & Yasin, R. M. (2024). Analisis co-occurrence pada riset pengembangan koleksi perpustakaan tahun 2015-2023: studi visualisasi dengan VOSviewer. Jurnal Kajian Perpustakaan, Informasi Dan Kearsipan, 6, 1–13.

Mufidah, N. F., & Nuha, H. H. (2024). Performance and Security Analysis of Lightweight Hash Functions in IoT. Jurnal Informatika: Jurnal Pengembangan IT, 9(3), 264–270. https://doi.org/10.30591/jpit.v9i3.7633

Muhammad Rehan Anwar, Desy Apriani, & Irsa Rizkita Adianita. (2021). Hash Algorithm In Verification Of Certificate Data Integrity And Security. APTISI Transactions on Technopreneurship, 3(2), 67–74.

Mukhlisa, N., & Hasan, K. (2024). Analisis Bibliometrik : Konsep , Metodologi , Dan Aplikasinya Dalam Penelitian Ilmiah. Seminar Nasional Hasil Penelitian 2024 LP2M-Universitas Negeri Makassar, 950–961.

Purnomo, M., Ginanjar*, J., Purbasari, R., Paramita, B., & Nurdin, M. (2022). Analisis Bibliometrik Entrepreneurship Korporat Pada Basis Data Scopus. JURISMA : Jurnal Riset Bisnis & Manajemen, 12(2), 311–335. https://doi.org/10.34010/jurisma.v12i2.7480

Rais Rabtsani, M., Triayudi, A., & Soepriyono, G. (2024). Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications. SAGA: Journal of Technology and Information System, 2(1), 175–189. https://doi.org/10.58905/saga.v2i1.250

Salazar-Concha, C., Ficapal-Cusí, P., Boada-Grau, J., & Camacho, L. J. (2021). Analyzing the evolution of technostress: A science mapping approach. Heliyon, 7(4). https://doi.org/10.1016/j.heliyon.2021.e06726

Sevin, A., & Çavuşoğlu, Ü. (2024). Design and Performance Analysis of a SPECK-Based Lightweight Hash Function. Electronics (Switzerland), 13(23). https://doi.org/10.3390/electronics13234767

Sinaga, J. S. G., Nehemia Sitorus, & Steven Lukas Samosir. (2024). Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2. Jurnal Quancom: Quantum Computer Jurnal, 2(2), 9–16. https://doi.org/10.62375/jqc.v2i2.432

Sobti, R., & Geetha, G. (2012). Cryptographic Hash Functions: A Review. International Journal of Computer Science Issues, 9(2), 461–479. www.IJCSI.org

Thabit, F., Alhomdy, A. P. S., Al-Ahdal, A. H. A., & Jagtap, P. D. S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings, 2(1), 91–99. https://doi.org/10.1016/j.gltp.2021.01.013

Tupan, T. (2023). Pemetaan Sistematik Penerapan Literasi Digital di Indonesia Menggunakan R Biblioshiny adan VOSviewer. Media Pustakawan, 30(1), 1–12. https://doi.org/10.37014/medpus.v30i1.3264

Wu, S. T., & Chang, J. R. (2023). Secure One-Way Hash Function Using Cellular Automata for IoT. Sustainability (Switzerland), 15(4). https://doi.org/10.3390/su15043552


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Pemetaan Lanskap Penelitian Fungsi Hash dan Secure Hash Algorithm: Studi Bibliometrik Menggunakan Biblioshiny

Dimensions Badge
Article History
Published: 2025-07-30
Abstract View: 273 times
PDF Download: 122 times
Issue
Section
Articles