Analysis of password and salt combination scheme to improve hash algorithm security

6Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

Abstract

In system security, hashes play important role in ensuring data. It remains the secure and the management of access rights by those entitled to. The increasing power of hash algorithms, various methods, are carried out one of them using salting techniques. Salt is usually attached as a prefix or postfix to the plaintext before hashing. But applying salt as a prefix or postfix is not enough. There are so many ways to find the plaintext from the resulting cipher text. This research discusses the combination scheme other than the prefix and postfix between password and salt increasing the security of hash algorithms. There is no truly secure system and no algorithm that has no loopholes. But this technique is to strengthen the security of the algorithm. So that, it gives more time if an attacker wants to break into the system. To measure the strength generated from each combination scheme, a tool called Hashcat is used. That is the way known as the best composition in applying salt to passwords.

Cite

CITATION STYLE

APA

Sutriman, & Sugiantoro, B. (2019). Analysis of password and salt combination scheme to improve hash algorithm security. International Journal of Advanced Computer Science and Applications, 10(11), 420–425. https://doi.org/10.14569/IJACSA.2019.0101158

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free