Visible to the public Secure Hashing using BCrypt for Cryptographic Applications

TitleSecure Hashing using BCrypt for Cryptographic Applications
Publication TypeConference Paper
Year of Publication2022
AuthorsSkanda, C., Srivatsa, B., Premananda, B.S.
Conference Name2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon)
Date Publishednov
KeywordsBcrypt, Blowfish cipher, compositionality, cryptography, Data Breach, dictionary attack, Force, hash algorithms, Industries, MD5 hash, passwords, Production, pubcrawl, Rainbow Attack, reliability theory, resilience, Resiliency, SHA hashing
AbstractImpactful data breaches that exposed the online accounts and financial information of billions of individuals have increased recently because of the digitization of numerous industries. As a result, the need for comprehensive cybersecurity measures has risen, particularly with regard to the safekeeping of user passwords. Strong password storage security ensures that even if an attacker has access to compromised data, they are unable to utilize the passwords in attack vectors like credential-stuffing assaults. Additionally, it will reduce the risk of threats like fraudulent account charges or account takeovers for users. This study compares the performance of several hashing algorithms, including Bcrypt, SHA-256 and MD5 and how bcrypt algorithm outperforms the other algorithms. Reversal of each of the results will be attempted using Rainbow Tables for better understanding of hash reversals and the comparisons are tabulated. The paper provides a detail implementation of bcrypt algorithm and sheds light on the methodology of BCRYPT hashing algorithm results in robust password security. While SHA-256 hashing algorithms are, easily susceptible to simple attacks such as brute force as it a fast algorithm and making bcrypt more favorable.
DOI10.1109/NKCon56289.2022.10126956
Citation Keyskanda_secure_2022