Analisis Kombinatorik Dalam Menentukan Keamanan dan Kompleksitas Password dengan Penerapan Teori Kombinatorik
DOI:
https://doi.org/10.62383/katalis.v2i2.1463Keywords:
Brute force attack, Combinatorial theory, Digital authentication, Password complexity, Password securityAbstract
Password security is a crucial aspect of digital authentication systems; however, many users still rely on weak and easily guessable passwords, increasing their vulnerability to cyber threats such as brute force and dictionary attacks. This study aims to evaluate password strength based on length and character complexity using a combinatorial theory approach. Through simulations, this research calculates the number of possible character combinations for various password lengths and character types, including lowercase letters, uppercase letters, numbers, and symbols. Additionally, the study estimates the time required to crack different types of passwords using brute force techniques and compares the results with real-world password breach data. The simulation results reveal that passwords composed solely of lowercase letters and fewer than eight characters in length can be cracked within seconds. In contrast, passwords that include a combination of uppercase and lowercase letters, numbers, and symbols with a minimum length of 12 characters would require more than one million years to be deciphered through brute force methods. These findings emphasize that increasing both the length and complexity of passwords significantly enhances security strength. Therefore, users are strongly encouraged to create passwords that are at least 12 characters long and include a diverse mix of character types. Furthermore, implementing Multi-Factor Authentication (MFA) and using password managers are highly recommended strategies to improve account protection. By adopting these practices, the risk of data breaches due to compromised passwords can be substantially reduced, contributing to stronger and more resilient digital security environments.
References
Aditama, W. Y., Hikmah, I. R., & Priambodo, D. F. (2023). Analisis komparatif keamanan aplikasi pengelola kata sandi berbayar berdasarkan ISO/IEC 25010. Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), 10, 857–864.
Afifah, R. N., Hidayat, R., Setiyadi, E. B., & Ihsanuddin, I. (2023). Proses berpikir kombinatorik siswa dalam menyelesaikan soal matematika ditinjau dari self efficacy. Jurnal Prodi Pendidikan Matematika (JPPM), 5(2), 699–711.
Bonneau, J. (2012). Ilmu menebak: Analisis terhadap 70 juta password yang dianonimkan. IEEE Symposium on Security & Privacy, 538–552.
Institut Nasional Standar dan Teknologi (NIST). (2020). Panduan identitas digital: Manajemen autentikasi dan siklus hidup. Departemen Perdagangan Amerika Serikat.
Laitinen, A., & Eronen, J. (2020). Serangan brute force dan keamanan password: Analisis empiris. Jurnal Penelitian Keamanan Siber, 8(2), 112–125.
Mahayasa, I. M. P., Nugraha, I. N. B. S., & Ambaradewi, N. L. G. (2024). Implementasi System Loyalti Manajemen (Renata) menggunakan framework Laravel 9 studi kasus Agung Toyota Kuta. Jurnal Manajemen dan Teknologi Informasi, 14(2), 35–42.
Mardiani, E., Rahmansyah, N., Wijaya, Y. F., et al. (2023). Analisis kompleksitas password dengan metode KNN, Naïve Bayes, Decision Tree, Ensemble Methods dan Linear Regression. Digital Transformation Technology (Digitech), 3, 955–963.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Panduan kriptografi terapan. CRC Press.
Muhammad Akfal, T. (2024). Matematika olimpiade materi kombinatorika pada siswa tingkat SMP. Jurnal Pengabdian Kepada Masyarakat, 2(2), 186–190.
RockYou Data Breach. (2009). Analisis terhadap 32 juta password yang bocor. Laporan Penelitian Keamanan Siber.
Sari, Y. A. L., Kusyanti, A., & Rokhmawati, R. I. (2018). Analisis faktor-faktor yang memengaruhi perilaku pengguna sistem informasi akademik mahasiswa dalam penciptaan kata sandi kuat dengan menggunakan Protection Motivation Theory (Studi pada XYZ). Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, 2(4), 1348–1357.
Stallings, W. (2018). Kriptografi dan keamanan jaringan: Prinsip dan praktik (Edisi ke-7). Pearson.
Verizon. (2022). Laporan investigasi kebocoran data. Verizon Enterprise Solutions.
Wang, D., Wang, P., & Wang, C. (2016). Memahami keamanan password dalam skenario percobaan terbatas. Keamanan & Komputer, 63, 168–182.
Yamin, M., Malethi, T. T., Ishyavanka, M., Jodhika, S., & Natali, S. (2023). Evaluasi risiko pada penggunaan password yang lemah: Analisis kasus penggunaan password umum. Jurnal Ilmiah Multidisiplin Ilmu Komputer, 1, 41–48.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Katalis Pendidikan : Jurnal Ilmu Pendidikan dan Matematika

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



