Visible to the public Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm

TitleComparative Analysis of Password Storage Security using Double Secure Hash Algorithm
Publication TypeConference Paper
Year of Publication2022
AuthorsChethana, Savarala, Charan, Sreevathsa Sree, Srihitha, Vemula, Radha, D., Kavitha, C. R.
Conference Name2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon)
KeywordsBrute Force Attack, collision attack, Companies, compositionality, Computer hacking, Databases, Force, hash algorithms, Hash functions, Message Digest (MD), password security, passwords, pubcrawl, resilience, Resiliency, Secure Hash Algorithm (SHA), Spraying
AbstractPasswords are generally used to keep unauthorized users out of the system. Password hacking has become more common as the number of internet users has extended, causing a slew of issues. These problems include stealing the confidential information of a company or a country by adversaries which harm the economy or the security of the organization. Hackers often use password hacking for criminal activities. It is indispensable to protect passwords from hackers. There are many hacking methods such as credential stuffing, social engineering, traffic interception, and password spraying for hacking the passwords. So, in order to control hacking, there are hashing algorithms that are mostly used to hash passwords making password cracking more difficult. In this proposed work, different hashing algorithms such as SHA-1, MD-5, Salted MD-5, SHA-256, and SHA-512 have been used. And the MySQL database is used to store the hash values of passwords that are generated using various hash functions. It is proven that SHA is better than MD-5 and Salted MD-5. Whereas in the SHA family, SHA-512 and SHA-256 have their own benefits. Four new hashing functions have been proposed using the combination of existing algorithms like SHA-256, and SHA-512 namely SHA-256\_with\_SHA-256, SHA-256\_ With\_SHA-512,SHA-512\_With\_SHA-512,and SHA-512\_ With\_SHA-256. They provide strong hash value for passwords by which the security of passwords increases, and hacking can be controlled to an extent.
DOI10.1109/NKCon56289.2022.10127057
Citation Keychethana_comparative_2022