Brute Force Attack pada Algoritma SHA-256

Author(s):  
Sandromedo Christa Nugroho

Brute force attack adalah salah satu serangan praktis (bersifat praktek) yang dapat digunakan untuk memecahkan teknik pengamanan kriptografi dengan cara mencoba seluruh kemungkinan jawaban/kunci yang ada. Secara umum seluruh jenis algoritma kriptografi dapat dipecahkan dengan menggunakan brute force attack, namun dalam pelaksanaannya brute force attack memerlukan perangkat, power, trials, waktu dan memory yang sangat besar, dimana semakin kompleks teknik/informasi yang harus dipecahkan, maka proses pencarian solusinya akan semakin lama, sehingga dalam hal ini terdapat pertimbangan terhadap kemunculan faktor keberuntungan (luck) untuk menemukan solusi serangan. Pada tulisan ini akan dibahas mengenai teknik dan paramter yang dibutuhkan dalam melakukan brute force attack terhadap password yang telah dihash dengan menggunakan algoritma SHA-256, yaitu algoritma fungsi hash standar Amerika Serikat berdasarkan pada dokumen NIST Federal Information Processing 180-3 – Secure Hash Standard (SHS).   Brute force attack is one of the practical attacks that could be used to solve cryptographic security techniques by trying all possible answers / keys. Generally, all types of cryptographic algorithms could be solved by using brute force attack, but practically brute force attack implementation requires huge devices, powers, trials, times and memories, where the more complex techniques / information to be solved, means the longer search process will be, beside also considers the emergence of luck factor to find an attack solution. This paper will discuss about the techniques and parameters required in performing brute force attack against passwords that have been hashed using SHA-256 algorithm, that is United States standard hash function algorithm based on NIST document Federal Information Processing 180-3 - Secure Hash Standard (SHS).

MIND Journal ◽  
2018 ◽  
Vol 1 (1) ◽  
pp. 9
Author(s):  
M Ichwan ◽  
Milda Gustian ◽  
Novan Rizky Nurjaman

Keyed-Hash Message Authentication Code (HMAC) adalah algoritma untuk menghitung nilai MAC (Message Authentication Code) yang menggunakan Fungsi Hash dikombinasikan dengan sebuah kunci rahasia, Fungsi Hash yang digunakan dalam penelitian ini adalah Secure Ha sh Algorithm 256 (SHA256). Nilai MAC digunakan sebagai otentikasi untuk menjamin integritas data dan keaslian pesan. Algoritma ini di implementasikan pada sistem keamanan rumah, dimana pertukaran pesan antara user dan sistem keamanan di otentikasi dengan menggunakan HMAC. Keamanan  algoritma  HMAC ini  dibuktikan  dengan  hasil  pengujian  Avalanche  effect  yang mencapai 87.5% pada fungsi Hash yang digunakan ,dan dibutuhkan waktu sampai 84 tahun untuk serangan Brute force berhasil pada kunci dengan panjang 8 karakter. Kata kunci: keyed-Hash Message Authentication Code, Hash function, Avalanche  effect, Brute force attack


Author(s):  
Mesran Mesran ◽  
Surya Darma Nasution

The development of applications that can crack passwords or data that has been secured by cryptographic algorithms has made researchers try various ways to further secure the data they have. Even though the method used is quite modern, the algorithm for breaking ciphertext in cryptography can still be created. For this reason, in this study the authors develop cryptographic security by combining it with data compression. In this study, the algorithm used is the classic cryptographic algorithm, namely Caesar Cipher, combined with the Stout Codes compression algorithm. The results of the Caesar Cipher ciphertext are then compressed by applying the Stout Codes algorithm. From the test results using the Brute Force Atack model, the results are quite good, that the security of the encrypted data is quite good and not easily broken.


Prospects ◽  
1988 ◽  
Vol 13 ◽  
pp. 181-223 ◽  
Author(s):  
Howard P. Segal

“Technology Spurs Decentralization Across the Country.” So reads a 1984 New York Times article on real-estate trends in the United States. The contemporary revolution in information processing and transmittal now allows large businesses and other institutions to disperse their offices and other facilities across the country, even across the world, without loss of the policy- and decision-making abilities formerly requiring regular physical proximity. Thanks to computers, word processors, and the like, decentralization has become a fact of life in America and other highly technological societies.


2021 ◽  
Vol 1 (2) ◽  
pp. 54-60
Author(s):  
Candra Irawan ◽  
Mudafiq Riyan Pratama

String matching is an algorithm for matching a text to another text or also known as a text search. There are several algorithms that can be used for string matching, including the Boyer-Moore algorithm and the Brute Force algorithm. The Boyer-Moore algorithm is a string matching algorithm published by Robert S. Boyer and J. Strother Moore in 1977. This algorithm is considered the most efficient algorithm in general applications. The Boyer-Moore algorithm starts matching characters from the pattern on the right. While the Brute Force algorithm is an algorithm that matches a pattern with all text between 0 and n-m to find the existence of a pattern in the text. These two algorithms have different patterns in the search process. In this article, a comparative analysis of the performance of the Boyer-Moore and Brute Force algorithms is carried out in a case study of the search for the Big Indonesian Dictionary (KBBI) based on Android. The search process is carried out by searching based on words and word descriptions. The results of this study indicate that the criteria for running time, the Brute Force algorithm is faster than the Boyer-Moore algorithm with the total running time of the Brute Force algorithm is 168.3 ms in words, 6994.16 ms in word descriptions, while the Boyer-Moore algorithm for running time reached 304.7 ms on the word, 8654.77 ms on the word description. In the testing criteria based on related keywords, the two algorithms can display the same list of related keywords.


2021 ◽  
Vol 297 ◽  
pp. 01046
Author(s):  
Zhour Oumazouz ◽  
Driss Karim

The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message. Our proposed encryption algorithm is based on the study of a particular graph constructed algebraically from the quadratic residues. We have exploited the Paley graph to introduce an abstract way of encryption of such message bit according to the other message bits by the intermidiate study of the neighborhood of a graph vertex. The strong regularity of the Paley graphs and the unknown behavior of the quadratic residues will play a very important role in the cryptanalysis part which allows to say that the brute force attack remains for the moment the only way to obtain the set of possible messages.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Deris Stiawan ◽  
Mohd. Yazid Idris ◽  
Reza Firsandaya Malik ◽  
Siti Nurmaini ◽  
Nizar Alsharif ◽  
...  

Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. Experimental results validate the investigation.


Sign in / Sign up

Export Citation Format

Share Document