An Enhancement of Secure Hash Algorithm-1 applied in Linkedin to secure users passwords 6

By: Alonzo, Lalaine G., Moner, Falmera L. 4 0 16, [, ] | [, ] |
Contributor(s): 5 6 [] |
Language: Unknown language code Summary language: Unknown language code Original language: Unknown language code Series: ; March 2017.46Edition: Description: 28cm. viii, 58pContent type: text Media type: unmediated Carrier type: volumeISBN: ISSN: 2Other title: 6 []Uniform titles: | | Related works: 1 40 6 []Subject(s): -- 2 -- 0 -- -- | -- 2 -- 0 -- 6 -- | 2 0 -- | -- -- 20 -- | | -- -- -- -- 20 -- | -- -- -- 20 -- --Genre/Form: -- 2 -- Additional physical formats: DDC classification: | LOC classification: | | 2Other classification:
Contents:
Action note: In: Summary: ABSTRACT A well-known professional social networking site LinkedIn was breached in 2012 with a revealed 6.5 million user accounts compromised. It was reported that LinkedIn utilized a technique called SHA-1 in storing users' passwords. SHA-1 is a famous cryptographic hash function hash given by the National Institute of Standard and Technology (NIST). For this reason, the researchers studied and searched for the best solutions that will improve SHA-1's security. This paper then presents an Enhanced Secure Hash Algorithm-1. Computer Scientists have found collision attacks on SHA-1 hash function. To overcome this threat, the weak points of its protocols were evaluated. To increase its security, the researchers increased the chaining variable by one more variable. Due to this change, message digest generated is of 192 bits. Hashing, when used in security need to be slow. This is the reason why the computation speed of modified SHA-1 was also enhanced in this study. This algorithm has been designed to satisfy the different level of enhanced security and to resist the advanced SHA attacks. These attacks include brute force attack, rainbow tables, and lookup tables. The researchers added a salt that is cryptographically random to prevent these attacks. This way no two identical passwords will have the same hash. In addition, this paper also discussed the construction of the algorithm in detail and compared its strengths and weaknesses to the old one given by NIST. Other editions:
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Collection Call number Status Date due Barcode Item holds
Book PLM
PLM
Archives
Filipiniana-Thesis QA76.9.Al6.2017 (Browse shelf) Available FT6053
Total holds: 0

Undergraduate Thesis (BS in Computer Science) Pamantasan ng Lungsod ng Maynila 2017. 56

5

ABSTRACT A well-known professional social networking site LinkedIn was breached in 2012 with a revealed 6.5 million user accounts compromised. It was reported that LinkedIn utilized a technique called SHA-1 in storing users' passwords. SHA-1 is a famous cryptographic hash function hash given by the National Institute of Standard and Technology (NIST). For this reason, the researchers studied and searched for the best solutions that will improve SHA-1's security. This paper then presents an Enhanced Secure Hash Algorithm-1. Computer Scientists have found collision attacks on SHA-1 hash function. To overcome this threat, the weak points of its protocols were evaluated. To increase its security, the researchers increased the chaining variable by one more variable. Due to this change, message digest generated is of 192 bits. Hashing, when used in security need to be slow. This is the reason why the computation speed of modified SHA-1 was also enhanced in this study. This algorithm has been designed to satisfy the different level of enhanced security and to resist the advanced SHA attacks. These attacks include brute force attack, rainbow tables, and lookup tables. The researchers added a salt that is cryptographically random to prevent these attacks. This way no two identical passwords will have the same hash. In addition, this paper also discussed the construction of the algorithm in detail and compared its strengths and weaknesses to the old one given by NIST.

5

There are no comments for this item.

to post a comment.

© Copyright 2024 Phoenix Library Management System - Pinnacle Technologies, Inc. All Rights Reserved.