Abstract

In system security, hashes play important role in ensuring data. It remains the secure and the management of access rights by those entitled to. The increasing power of hash algorithms, various methods, are carried out one of them using salting techniques. Salt is usually attached as a prefix or postfix to the plaintext before hashing. But applying salt as a prefix or postfix is not enough. There are so many ways to find the plaintext from the resulting cipher text. This research discusses the combination scheme other than the prefix and postfix between password and salt increasing the security of hash algorithms. There is no truly secure system and no algorithm that has no loopholes. But this technique is to strengthen the security of the algorithm. So that, it gives more time if an attacker wants to break into the system. To measure the strength generated from each combination scheme, a tool called Hashcat is used. That is the way known as the best composition in applying salt to passwords.

Highlights

  • Hash is an algorithm that changes the string becomes a series of random characters

  • Salting technique is a hedge against pre-computed dictionary attacks, the bedrock of which involves concatenating a random string of letters and numbers, a salt, to the beginning or end of a password before hashing it [17]

  • Some draft password and salt combination schemes are needed to be able to compare the strengths of each design

Read more

Summary

INTRODUCTION

Hash is an algorithm that changes the string becomes a series of random characters. An authentication is a process of ensuring a property is genuine, verifiable and trustworthy; deep conviction the validity of the transmission, message, or sender of the message It verifies that the user should input entered from the system coming from a trusted source [1]. The use of algorithms and hashing techniques is needed to help the authentication process so that they can minimize the occurrence of broken data by the attacker. MD5 and SHA1 have many vulnerabilities which allow attackers to get the system user password by knowing the hash value. The use of salt for passwords can increase password security in an application, but does not close possibilities that the attacker can crack against the generated values. It can be added from the other parameters as a comparison

RELATED WORK
RESEARCH METHOD
Generating Salt Process
Rearrangement Process
Testing
Designing a Password and Salt Combination Scheme
Implementation
Data Analysis
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call