Kecilin.id, Indonesia
BibTex Citation Data :
@article{JMASIF62545, author = {Haikal Rahmadi and Ary Nurwicaksono}, title = {Hash Value Security Improvement of PCS Password using Signed Binary Operation}, journal = {Jurnal Masyarakat Informatika}, volume = {15}, number = {1}, year = {2024}, keywords = {data security, password, code extension, message digest, hash value}, abstract = { Convenience and security have always been inversely related requirements in data protection systems. Users want a short and simple password that is easy to remember. On the other hand, the system that is widely used in securing user data, especially passwords, is using a one-way message digest. In addition, users are also required to use complex passwords through a combination of letters, numbers, and symbols. It aims to increase security but a complex password will make it difficult for users to remember their passwords. Even though a complex password does not necessarily make it secure because it's still on a PCS which is vulnerable to hacking. Moreover, in the current development of cybersecurity science where password hacking systems are very easy to obtain and can be used by anyone to find hash value of password on PCS quickly. A preliminary test that has been carried out proves that even complex passwords can be hacked easily. This study proposes the use of a code extension system for passwords before the hashing process is carried out through two simple schemes C1 and C2 through bitwise xor and addition operators respectively. The code from the password data is mapped out of PCS by using a unique value of data. Experimental results show that the C1 scheme is able to thwart hacking attempts by 80%, while C2 is able to increase the security of alphanumeric passwords by up to 90%. The proposed method is able to make a simple but strong password system. }, issn = {2777-0648}, pages = {31--38} doi = {10.14710/jmasif.15.1.62545}, url = {https://ejournal.undip.ac.id/index.php/jmasif/article/view/62545} }
Refworks Citation Data :
Convenience and security have always been inversely related requirements in data protection systems. Users want a short and simple password that is easy to remember. On the other hand, the system that is widely used in securing user data, especially passwords, is using a one-way message digest. In addition, users are also required to use complex passwords through a combination of letters, numbers, and symbols. It aims to increase security but a complex password will make it difficult for users to remember their passwords. Even though a complex password does not necessarily make it secure because it's still on a PCS which is vulnerable to hacking. Moreover, in the current development of cybersecurity science where password hacking systems are very easy to obtain and can be used by anyone to find hash value of password on PCS quickly. A preliminary test that has been carried out proves that even complex passwords can be hacked easily. This study proposes the use of a code extension system for passwords before the hashing process is carried out through two simple schemes C1 and C2 through bitwise xor and addition operators respectively. The code from the password data is mapped out of PCS by using a unique value of data. Experimental results show that the C1 scheme is able to thwart hacking attempts by 80%, while C2 is able to increase the security of alphanumeric passwords by up to 90%. The proposed method is able to make a simple but strong password system.
Article Metrics:
Last update:
Last update: 2024-11-23 01:33:39
The authors who submit the manuscript must understand that the article's copyright belongs to the author(s) if accepted for publication. However, the author(s) grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors should also understand that their article (and any additional files, including data sets, and analysis/computation data) will become publicly available once published under that license. See our copyright policy. By submitting the manuscript to Jmasif, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. Jmasif will not be held responsible for anything arising because of the writer's internal dispute. Jmasif will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. Jmasif allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and Jmasif to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.