p-Index From 2021 - 2026
4.607
P-Index
This Author published in this journals
All Journal MATICS : Jurnal Ilmu Komputer dan Teknologi Informasi (Journal of Computer Science and Information Technology) Jurnal Buana Informatika Jurnal Transformatika Proceeding of the Electrical Engineering Computer Science and Informatics JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi Jurnal CoreIT IT JOURNAL RESEARCH AND DEVELOPMENT Indonesian Journal of Artificial Intelligence and Data Mining JRST (Jurnal Riset Sains dan Teknologi) Techne : Jurnal Ilmiah Elektroteknika JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI Compiler MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer Jurnal Sistem Cerdas Applied Technology and Computing Science Journal JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Teknologi Informasi dan Terapan (J-TIT) International Journal of Informatics and Computation Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Informatika dan Rekayasa Perangkat Lunak Respati Letters in Information Technology Education (LITE) Jurnal Teknik Informatika (JUTIF) Teknika Jurnal Computer Science and Information Technology (CoSciTech) Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia (Senastindo) Jurnal Ilmu Komputer dan Teknologi (IKOMTI) Proceeding of International Conference on Information Science and Technology Innovation (ICoSTEC) International Journal of Informatics Engineering and Computing
Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Compiler

Optimising Bcrypt Parameters: Finding the Optimal Number of Rounds for Enhanced Security and Performance Listiawan, Indra; Zaidir, Zaidir; Winardi, Sugeng; Diqi, Mohammad
Compiler Vol 13, No 1 (2024): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i1.2111

Abstract

Recent advancements in the field of information security have underscored the imperative to fine-tune Bcrypt parameters, particularly focusing on the optimal number of rounds as the objective of research. The method of research is a Brute Force Search method to find the optimal value of bcrypt rounds. The primary focal point of optimization lies in the number of Bcrypt rounds due to its direct impact on security levels. Elevating the number of rounds serves to fortify the security of the Bcrypt algorithm, rendering it more resilient against brute-force attacks. The execution of the Bcrypt rounds in the experimental method mirrors real-world scenarios, specifically in the evaluation of Bcrypt parameters with a focus on entropy assessment of the hash. The selection of the number of rounds should consider the specific needs of the system, where security takes precedence or faster performance is a crucial factor.