Analysis Performance BCRYPT Algorithm to Improve Password Security from Brute Force
Toras Pangidoan Batubara,Syahril Efendi,Erna Budhiarti Nababan +2 more
- Vol. 1811, Iss: 1, pp 012129
TLDR
The results of this study indicate that the security performance of the Bcrypt Algorithm is very good in warding off Brute Force attacks for mixed characters while the numeric and alphabetic characters are not good enough.Abstract:
The Bcrypt algorithm is a hashing function created from the Blowfish Algorithm by two computer security researchers, Niels Provos and David Mazieres. This hashing function has several advantages, using the original random salt (the salt is the order in which it is added to the password to make it harder to bruteforce). Random salts also prevent lookup table creation. On this basis, the authors try to do a Brute Force experiment on plaintext that has been encrypted by the Bcrypt Algorithm based on 3 characters, namely alphabetic characters, numeric characters and mixed characters to see the security results of the Bcrypt Algorithm. From the results of tests conducted, the alphabetic character with a total of 4 characters can be returned to the original plaintext within 4 days while if the number of 5 characters cannot be found the original plaintext. Then the numeric characters with a total of 7 characters can be found in the original plaintext within 10 hours. Meanwhile, for mixed characters with a total of 7 characters, the original plaintext cannot be found within 5 days. The results of this study indicate that the security performance of the Bcrypt Algorithm is very good in warding off Brute Force attacks for mixed characters while the numeric and alphabetic characters are not good enough.read more
Citations
More filters
Journal ArticleDOI
Decentralized Inverse Transparency With Blockchain
TL;DR: In this article , a decentralized data exchange and usage logging system for inverse transparency built on blockchain is presented, which aims to track all usages of personal data, allowing individuals to monitor them to ensure accountability for potential misusage.
Proceedings ArticleDOI
Secure Hashing using BCrypt for Cryptographic Applications
C. Skanda,B. S. Premananda +1 more
TL;DR: In this paper , the authors compared the performance of several hashing algorithms, including Bcrypt, SHA-256 and MD5, and provided a detail implementation of bcrypt algorithm and sheds light on the methodology of BCRYPT hashing algorithm results in robust password security.
Journal ArticleDOI
Web-based payroll management system: design, implementation, and evaluation
TL;DR: In this paper , a web-based payroll management system (WPMS) is proposed to calculate the salary of every employee per month and annum efficiently and effectively, and keep the records of employees' data including their pay, allowances, and deductions on monthly bases in the data mart.
Proceedings ArticleDOI
A Novel Approach For Secured Decentralised Data Protection Vault
TL;DR: In this article , the authors propose a decentralized data wallet and manager that allows users to store all their data in an impenetrable way in a decentralized way, without any additional information from the user.
Proceedings ArticleDOI
Secure Hashing using BCrypt for Cryptographic Applications
TL;DR: In this paper , the authors compared the performance of several hashing algorithms, including Bcrypt, SHA-256 and MD5, and provided a detail implementation of bcrypt algorithm and sheds light on the methodology of BCRYPT hashing algorithm results in robust password security.
References
More filters
Secure Hash Standard
TL;DR: The SHA-1 is used by both the transmitter and intended receiver of a message in computing and verifying a digital signature and whenever a secure hash algorithm is required for federal applications.
Proceedings ArticleDOI
Brute-force and dictionary attack on hashed real-world passwords
TL;DR: This study performed a broad targeted attack combining several well-established cracking techniques, such as brute-force, dictionary, and hybrid attacks, on the passwords used by the students of a Slovenian university to access the online grading system to demonstrate how easy it is to crack most of the user-created passwords using simple and predictable patterns.
Providing password security by salted password hashing using bcrypt algorithm
TL;DR: This project focuses on providing security to user’s data by using Salted Password Hashing Technique, which can encrypt the data up to 512bits which provides a longer encryption key and give hashed value of the user data.
Journal ArticleDOI
Security of Password Hashing in Cloud
TL;DR: The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords.
Book ChapterDOI
Password Security Using Bcrypt with AES Encryption Algorithm
TL;DR: A technique utilizing Bcrypt hashing technique with AES encryption for securing an online account and reducing cyber criminal activity is scheduled.