scispace - formally typeset
Open AccessJournal ArticleDOI

Analysis Performance BCRYPT Algorithm to Improve Password Security from Brute Force

Toras Pangidoan Batubara, +2 more
- Vol. 1811, Iss: 1, pp 012129
TLDR
The results of this study indicate that the security performance of the Bcrypt Algorithm is very good in warding off Brute Force attacks for mixed characters while the numeric and alphabetic characters are not good enough.
Abstract
The Bcrypt algorithm is a hashing function created from the Blowfish Algorithm by two computer security researchers, Niels Provos and David Mazieres. This hashing function has several advantages, using the original random salt (the salt is the order in which it is added to the password to make it harder to bruteforce). Random salts also prevent lookup table creation. On this basis, the authors try to do a Brute Force experiment on plaintext that has been encrypted by the Bcrypt Algorithm based on 3 characters, namely alphabetic characters, numeric characters and mixed characters to see the security results of the Bcrypt Algorithm. From the results of tests conducted, the alphabetic character with a total of 4 characters can be returned to the original plaintext within 4 days while if the number of 5 characters cannot be found the original plaintext. Then the numeric characters with a total of 7 characters can be found in the original plaintext within 10 hours. Meanwhile, for mixed characters with a total of 7 characters, the original plaintext cannot be found within 5 days. The results of this study indicate that the security performance of the Bcrypt Algorithm is very good in warding off Brute Force attacks for mixed characters while the numeric and alphabetic characters are not good enough.

read more

Citations
More filters
Journal ArticleDOI

Decentralized Inverse Transparency With Blockchain

TL;DR: In this article , a decentralized data exchange and usage logging system for inverse transparency built on blockchain is presented, which aims to track all usages of personal data, allowing individuals to monitor them to ensure accountability for potential misusage.
Proceedings ArticleDOI

Secure Hashing using BCrypt for Cryptographic Applications

TL;DR: In this paper , the authors compared the performance of several hashing algorithms, including Bcrypt, SHA-256 and MD5, and provided a detail implementation of bcrypt algorithm and sheds light on the methodology of BCRYPT hashing algorithm results in robust password security.
Journal ArticleDOI

Web-based payroll management system: design, implementation, and evaluation

TL;DR: In this paper , a web-based payroll management system (WPMS) is proposed to calculate the salary of every employee per month and annum efficiently and effectively, and keep the records of employees' data including their pay, allowances, and deductions on monthly bases in the data mart.
Proceedings ArticleDOI

A Novel Approach For Secured Decentralised Data Protection Vault

TL;DR: In this article , the authors propose a decentralized data wallet and manager that allows users to store all their data in an impenetrable way in a decentralized way, without any additional information from the user.
Proceedings ArticleDOI

Secure Hashing using BCrypt for Cryptographic Applications

TL;DR: In this paper , the authors compared the performance of several hashing algorithms, including Bcrypt, SHA-256 and MD5, and provided a detail implementation of bcrypt algorithm and sheds light on the methodology of BCRYPT hashing algorithm results in robust password security.
References
More filters

Secure Hash Standard

TL;DR: The SHA-1 is used by both the transmitter and intended receiver of a message in computing and verifying a digital signature and whenever a secure hash algorithm is required for federal applications.
Proceedings ArticleDOI

Brute-force and dictionary attack on hashed real-world passwords

TL;DR: This study performed a broad targeted attack combining several well-established cracking techniques, such as brute-force, dictionary, and hybrid attacks, on the passwords used by the students of a Slovenian university to access the online grading system to demonstrate how easy it is to crack most of the user-created passwords using simple and predictable patterns.

Providing password security by salted password hashing using bcrypt algorithm

TL;DR: This project focuses on providing security to user’s data by using Salted Password Hashing Technique, which can encrypt the data up to 512bits which provides a longer encryption key and give hashed value of the user data.
Journal ArticleDOI

Security of Password Hashing in Cloud

TL;DR: The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords.
Book ChapterDOI

Password Security Using Bcrypt with AES Encryption Algorithm

TL;DR: A technique utilizing Bcrypt hashing technique with AES encryption for securing an online account and reducing cyber criminal activity is scheduled.
Related Papers (5)
Trending Questions (2)
What are the benefits of using bcrypt over other password hashing algorithms?

The paper does not mention any specific benefits of using bcrypt over other password hashing algorithms.

How does the bcrypt algorithm work?

The paper does not provide information on how the bcrypt algorithm works.