Attributes | Values |
---|
rdf:type
| |
Description
| - Database breaches and reverse engineering of hashed passwords accentuated lackluster approach of administrators maintaining sensitive data. We therefore evaluate the most-commonly utilized hashing algorithm, SHA-1 and MD5, as to withstand various threat scenarios. A comprehensive literature research will be presented which supports the hypothesis that security considerations when implementing cryptographic hash functions are sidelined in favor of backward-compatible procedures with provably lower level of deliberate attempts at obtaining sensitive data by unauthorized third parties. Also described will be a wy to iprove the current predicament to better protect confidential data using cryptographic salts.
- Database breaches and reverse engineering of hashed passwords accentuated lackluster approach of administrators maintaining sensitive data. We therefore evaluate the most-commonly utilized hashing algorithm, SHA-1 and MD5, as to withstand various threat scenarios. A comprehensive literature research will be presented which supports the hypothesis that security considerations when implementing cryptographic hash functions are sidelined in favor of backward-compatible procedures with provably lower level of deliberate attempts at obtaining sensitive data by unauthorized third parties. Also described will be a wy to iprove the current predicament to better protect confidential data using cryptographic salts. (en)
|
Title
| - Security Review of the SHA-1 and MD5 Cryptographic Hash Algorithms
- Security Review of the SHA-1 and MD5 Cryptographic Hash Algorithms (en)
|
skos:prefLabel
| - Security Review of the SHA-1 and MD5 Cryptographic Hash Algorithms
- Security Review of the SHA-1 and MD5 Cryptographic Hash Algorithms (en)
|
skos:notation
| - RIV/70883521:28120/13:43871036!RIV14-MSM-28120___
|
http://linked.open...avai/predkladatel
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/70883521:28120/13:43871036
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - security, hashing, algorithm, sha-1, md5, salt (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the 14th WSEAS International Conference on Automation & Information (ICAI ’13)
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Jašek, Roman
- Sarga, Libor
- Benda, Radek
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
issn
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |