Back close

Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm

Publication Type : Conference Proceedings

Publisher : IEEE

Url : https://doi.org/10.1109/NKCon56289.2022.10127057

Keywords : Hash functions;Computer hacking;Databases;Force;Spraying;Passwords;Companies;Message Digest (MD);Secure Hash Algorithm (SHA);Password Security;Collision Attack;Brute force Attack

Campus : Bengaluru

School : School of Computing

Department : Computer Science and Engineering

Year : 2022

Abstract : Passwords are generally used to keep unauthorized users out of the system. Password hacking has become more common as the number of internet users has extended, causing a slew of issues. These problems include stealing the confidential information of a company or a country by adversaries which harm the economy or the security of the organization. Hackers often use password hacking for criminal activities. It is indispensable to protect passwords from hackers. There are many hacking methods such as credential stuffing, social engineering, traffic interception, and password spraying for hacking the passwords. So, in order to control hacking, there are hashing algorithms that are mostly used to hash passwords making password cracking more difficult. In this proposed work, different hashing algorithms such as SHA-1, MD-5, Salted MD-5, SHA-256, and SHA-512 have been used. And the MySQL database is used to store the hash values of passwords that are generated using various hash functions. It is proven that SHA is better than MD-5 and Salted MD-5. Whereas in the SHA family, SHA-512 and SHA-256 have their own benefits. Four new hashing functions have been proposed using the combination of existing algorithms like SHA-256, and SHA-512 namely SHA-256_with_SHA-256, SHA-256_ With_SHA-512,SHA-512_With_SHA-512,and SHA-512_ With_SHA-256. They provide strong hash value for passwords by which the security of passwords increases, and hacking can be controlled to an extent.

Cite this Research Publication : Savarala Chethana, Sreevathsa Sree Charan, Vemula Srihitha, D. Radha, C. R. Kavitha, Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm, [source], IEEE, 2022, https://doi.org/10.1109/NKCon56289.2022.10127057

Admissions Apply Now