首页> 外文会议>2013 International Conference on QiR >Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system
【24h】

Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system

机译:基于Simple-O身份验证的安全系统中MD5和SHA-1算法实现的分析和比较

获取原文
获取原文并翻译 | 示例

摘要

Simple-O, an automated essay grading application was developed at the Department of Electrical Engineering University of Indonesia. This application used MD5 + salt algorithm to perform protection for authentication password of users stored in its database. Unfortunately, due to a number of flaws contained in the MD5 algorithm, SHA-1 + salt algorithm was implemented in this application and then the comparison was carried out between those two algorithms. The experiments include time measurements and estimation of brute force attack for each algorithm. Processing time and CPU usage were also measured. In the brute force hash code scenario, it was tried to find plaintext from the chipertext. In this scenario, both MD5 and SHA-1 was implemented and tested using Hashcat tool. The better the algorithm, the more time needed to brute force the chipertext. In this scenario the password tested has 8 to 10 characters. The result from this testing shows that the implementation of SHA-1 algorithm is more robust against brute force attacks than MD5. The difference in processing time between SHA-1 + salt and MD5 + salt ranged from 0.001 seconds to 0.002 seconds for each length variation of the password from 8 to 10 character. While the difference in CPU usage is 0.545%, 0.985%, and 1.69% respectively for the password with 8, 9, and 10 characters length. These results indicate that while giving better security the implementation of the algorithm SHA-1 + salt does not impose on the performance of Simple-O application.
机译:印度尼西亚电气工程大学开发了Simple-O,它是一种自动作文评分应用程序。该应用程序使用MD5 + salt算法对存储在其数据库中的用户的身份验证密码进行保护。不幸的是,由于MD5算法中包含许多缺陷,因此在此应用程序中实现了SHA-1 + salt算法,然后在这两种算法之间进行了比较。实验包括时间测量和每种算法的蛮力攻击估计。还测量了处理时间和CPU使用率。在蛮力哈希码方案中,尝试从chipertext中查找纯文本。在这种情况下,使用Hashcat工具实现了MD5和SHA-1。算法越好,蛮力破解Chipertext所需的时间就越多。在这种情况下,测试的密码具有8到10个字符。该测试的结果表明,SHA-1算法的实现比MD5更加强大地抵抗了暴力攻击。对于密码从8到10个字符的每个长度变化,SHA-1 +盐和MD5 +盐之间的处理时间差异为0.001秒至0.002秒。而长度为8个,9个和10个字符的密码在CPU使用率上的差异分别为0.545%,0.985%和1.69%。这些结果表明,在提供更好的安全性的同时,SHA-1 + salt算法的实现并不影响Simple-O应用程序的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号