2017
DOI: 10.3390/cryptography1020010
|View full text |Cite
|
Sign up to set email alerts
|

Password-Hashing Status

Abstract: Computers are used in our everyday activities, with high volumes of users accessing provided services. One-factor authentication consisting of a username and a password is the common choice to authenticate users in the web. However, the poor password management practices are exploited by attackers that disclose the users' credentials, harming both users and vendors. In most of these occasions the user data were stored in clear or were just processed by a cryptographic hash function. Password-hashing techniques… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
2

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 69 publications
0
8
0
2
Order By: Relevance
“…It is also possible to easily share and use precomputed rainbow tables, which is done for conventional rainbow tables as well [67], despite their significantly larger size. For other hash functions than SHA-1, we expect reversal and generation times to vary by a constant factor, depending on the computation time of the hash function [31] (except for hash databases where look-up times remain constant).…”
Section: Comparison Of Hash Reversal Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is also possible to easily share and use precomputed rainbow tables, which is done for conventional rainbow tables as well [67], despite their significantly larger size. For other hash functions than SHA-1, we expect reversal and generation times to vary by a constant factor, depending on the computation time of the hash function [31] (except for hash databases where look-up times remain constant).…”
Section: Comparison Of Hash Reversal Methodsmentioning
confidence: 99%
“…Another alternative is to increase the calculation time of each hash, either by performing multiple rounds of the hash function or by using hash functions like bcrypt [66] or Argon2 [6], which are specifically designed to resist brute-force attacks. Existing benchmarks show that with bcrypt only 2.9 kHashes/s and with Argon2 only 2.6 Hashes/s can be computed on a GPU compared to 794.6 MHashes/s with SHA-1 [31].…”
Section: A Hash Reversal Mitigationsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, smart meters use digits as a password, and that can be cracked easily. And user information stealth or unwanted data packages can be sent to the network operator as a result of system failures, and blackouts can be seen (Hatzivasilis 2017). • Authentication-Identifying Attack: Although some power systems have truly complex communications protocols (Modbus/TCP or 3.0/TCP), the receive/transmit type packages might be cleartext.…”
Section: Hacking Algorithm and Bad Data Injectionmentioning
confidence: 99%
“…Further participants can include consumer rights organizations, privacy watchdogs and other Non Governmental Organisations (NGOs). With regards to achieving privacy, opting for a permissioned platform facilitates the mandatory use of a trusted execution environment hardware for the computing nodes such as Intel SGX [25] and the use of lightweight cryptography and password hashing to provide confidentiality of user credentials in clients [26], [27]. Finally, an additional benefit of using a permissioned blockchain would be that the authority retains a degree of control over source code and blockchain governance.…”
Section: B Participation Considerationsmentioning
confidence: 99%