Pemetaan Lanskap Penelitian Fungsi Hash dan Secure Hash Algorithm: Studi Bibliometrik Menggunakan Biblioshiny
Abstract
Hash functions and secure hash algorithms are vital components in modern cybersecurity, essential for ensuring data integrity and authenticity. With the development of new attacks and the emergence of novel applications, the research landscape in this field has become highly dynamic and complex. This study aims to map the research landscape related to hash functions and secure hash algorithms using a comprehensive bibliometric study approach. Publication data comprising 494 journal and conference proceeding articles were collected from the Scopus database using a specific query. Bibliometric analysis was performed using Biblioshiny software, covering basic characteristics analysis, keyword co-occurrence, citation analysis (most cited works, intellectual structure), collaboration, thematic mapping, and thematic evolution. The results show significant publication growth over time, identifying key contributors (countries, institutions, authors) as well as the most relevant publication sources. Keyword analysis and thematic mapping revealed dominant research themes and clusters (e.g., core cryptography, hardware implementation, image security applications, potential in the healthcare sector), while citation analysis highlighted the most influential articles and authors forming the knowledge foundation. Thematic evolution demonstrated a shift in research focus from fundamental algorithms towards broader application exploration and related techniques in more recent periods. This study provides a comprehensive data-driven overview of the structure, trends, and dynamics of research on hash functions and secure hash algorithms. These findings contribute to understanding the status of this field and identify potential areas for future research, assisting researchers and practitioners in navigating the extensive literature.
Downloads
References
Amaludin, L., & Rahmatulloh, A. (2024). Penerapan ECDSA dan BLAKE2B Untuk Membentuk Tanda Tangan Digital Sebagai Autentikasi Dokumen. Jurnal Informatika Dan Multimedia, 16(2), 20–26. https://doi.org/10.33795/jtim.v16i2.6599
Assidiq, M. L., Mahardika, F., & Santika, D. (2024). Implementation of Aes and Sha-3 Cryptography Algorithms in Securing User Sensitive Data on the Artesian Water Bill Payment Transaction Website. JOCSIT .:. Journal of Collaborative Science and Informatics Technology, 1(1), 41–54. https://doi.org/10.69933/jocsit.v1i1.11
Baas, J., Schotten, M., Plume, A., Côté, G., & Karimi, R. (2020). Scopus as a curated, high-quality bibliometric data source for academic research in quantitative science studies. Quantitative Science Studies, 1(1), 377–386. https://doi.org/10.1162/qss_a_00019
Dewamuni, Z., Shanmugam, B., Azam, S., & Thennadil, S. (2023). Bibliometric Analysis of IoT Lightweight Cryptography. Information (Switzerland), 14(12). https://doi.org/10.3390/info14120635
Dolmeta, A., Martina, M., & Masera, G. (2023). Comparative Study of Keccak SHA-3 Implementations. Cryptography, 7(4). https://doi.org/10.3390/cryptography7040060
Duan, C. (2024). Analyses of Scientific Collaboration Networks among Authors, Institutions, and Countries in FinTech Studies: A Bibliometric Review. FinTech, 3(2), 249–273. https://doi.org/10.3390/fintech3020015
Fajrin, A. M. (2023). Perbandingan Performa Kecepatan dari Algoritma Hash Function untuk Proses Enkripsi Password. KESATRIA: Jurnal Penerapan Sistem Informasi, 4(4), 1069–1075.
Forliano, C., De Bernardi, P., & Yahiaoui, D. (2021). Entrepreneurial universities: A bibliometric analysis within the business and management domains. Technological Forecasting and Social Change, 165, 120522. https://doi.org/10.1016/j.techfore.2020.120522
Gonzalez-Valiente, C. L., & Lopez-Mesa, E. K. (2022). Intellectual structure of Library and Information Science in Iberoamerica using journal co-citation analysis: A comparative study based on Scopus and Web of Science. Transinformacao, 34. https://doi.org/10.1590/2318-0889202234e210036
Haifaa Ahmed Hasan, Hassan F. Al-Layla, & Farah N. Ibraheem. (2022). A Review of Hash Function Types and their Applications. Wasit Journal of Computer and Mathematics Science, 1(3), 75–88. https://doi.org/10.31185/wjcm.52
Han, Y. L. F. H. J. (2023). Applied Mathematics and Nonlinear Sciences. Applied Mathematics and Nonlinear Sciences, 8(2), 3383–3392.
Hosseini, E., Shahbazi, A., & Dehbozorgi, A. (2025). Topical Evolution and Thematic Progression of Research Frontiers: The Field of Knowledge Graphs. Knowledge Organization, 52(1). https://doi.org/10.31083/ko39497
Husna, J., Ratna, M. P., & Nasir, N. E. C. (2024). Analisis Bibliometrik Kiryoku: Jurnal Studi Kejepangan Tahun 2017-2021. Anuva: Jurnal Kajian …, 8(2), 209–226. https://ejournal2.undip.ac.id/index.php/anuva/article/view/22516%0Ahttps://ejournal2.undip.ac.id/index.php/anuva/article/download/22516/10752
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126
Lim, W. M., Kumar, S., & Donthu, N. (2024). How to combine and clean bibliometric data and use bibliometric tools synergistically: Guidelines using metaverse research. Journal of Business Research, 182(December 2023), 114760. https://doi.org/10.1016/j.jbusres.2024.114760
Melyan, N. R., & Yasin, R. M. (2024). Analisis co-occurrence pada riset pengembangan koleksi perpustakaan tahun 2015-2023: studi visualisasi dengan VOSviewer. Jurnal Kajian Perpustakaan, Informasi Dan Kearsipan, 6, 1–13.
Mufidah, N. F., & Nuha, H. H. (2024). Performance and Security Analysis of Lightweight Hash Functions in IoT. Jurnal Informatika: Jurnal Pengembangan IT, 9(3), 264–270. https://doi.org/10.30591/jpit.v9i3.7633
Muhammad Rehan Anwar, Desy Apriani, & Irsa Rizkita Adianita. (2021). Hash Algorithm In Verification Of Certificate Data Integrity And Security. APTISI Transactions on Technopreneurship, 3(2), 67–74.
Mukhlisa, N., & Hasan, K. (2024). Analisis Bibliometrik : Konsep , Metodologi , Dan Aplikasinya Dalam Penelitian Ilmiah. Seminar Nasional Hasil Penelitian 2024 LP2M-Universitas Negeri Makassar, 950–961.
Purnomo, M., Ginanjar*, J., Purbasari, R., Paramita, B., & Nurdin, M. (2022). Analisis Bibliometrik Entrepreneurship Korporat Pada Basis Data Scopus. JURISMA : Jurnal Riset Bisnis & Manajemen, 12(2), 311–335. https://doi.org/10.34010/jurisma.v12i2.7480
Rais Rabtsani, M., Triayudi, A., & Soepriyono, G. (2024). Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications. SAGA: Journal of Technology and Information System, 2(1), 175–189. https://doi.org/10.58905/saga.v2i1.250
Salazar-Concha, C., Ficapal-Cusí, P., Boada-Grau, J., & Camacho, L. J. (2021). Analyzing the evolution of technostress: A science mapping approach. Heliyon, 7(4). https://doi.org/10.1016/j.heliyon.2021.e06726
Sevin, A., & Çavuşoğlu, Ü. (2024). Design and Performance Analysis of a SPECK-Based Lightweight Hash Function. Electronics (Switzerland), 13(23). https://doi.org/10.3390/electronics13234767
Sinaga, J. S. G., Nehemia Sitorus, & Steven Lukas Samosir. (2024). Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2. Jurnal Quancom: Quantum Computer Jurnal, 2(2), 9–16. https://doi.org/10.62375/jqc.v2i2.432
Sobti, R., & Geetha, G. (2012). Cryptographic Hash Functions: A Review. International Journal of Computer Science Issues, 9(2), 461–479. www.IJCSI.org
Thabit, F., Alhomdy, A. P. S., Al-Ahdal, A. H. A., & Jagtap, P. D. S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings, 2(1), 91–99. https://doi.org/10.1016/j.gltp.2021.01.013
Tupan, T. (2023). Pemetaan Sistematik Penerapan Literasi Digital di Indonesia Menggunakan R Biblioshiny adan VOSviewer. Media Pustakawan, 30(1), 1–12. https://doi.org/10.37014/medpus.v30i1.3264
Wu, S. T., & Chang, J. R. (2023). Secure One-Way Hash Function Using Cellular Automata for IoT. Sustainability (Switzerland), 15(4). https://doi.org/10.3390/su15043552
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Pemetaan Lanskap Penelitian Fungsi Hash dan Secure Hash Algorithm: Studi Bibliometrik Menggunakan Biblioshiny
Pages: 152-163
Copyright (c) 2025 Imam Saputra, Annisa Fadillah Siregar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).













