2021
DOI: 10.1007/978-3-030-73882-2_45
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Storage of Passwords Based on the MD5 HASH Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 21 publications
0
1
0
Order By: Relevance
“…This Braille representation is then utilized as input to generate the final hash. We have chosen to employ the MD5 hashing algorithm, widely used in existing systems, to demonstrate the applicability of our approach to different types of hashing [21][22][23][24][25][26][27][28][29][30][31][32][33]. The primary objective of this study is to provide an innovative and effective solution to strengthen password security, thereby protecting user data against malicious attacks.…”
Section: Introductionmentioning
confidence: 99%
“…This Braille representation is then utilized as input to generate the final hash. We have chosen to employ the MD5 hashing algorithm, widely used in existing systems, to demonstrate the applicability of our approach to different types of hashing [21][22][23][24][25][26][27][28][29][30][31][32][33]. The primary objective of this study is to provide an innovative and effective solution to strengthen password security, thereby protecting user data against malicious attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Classical cryptography methods, such as RSA [25,24,28,29,26,27], were initially developed to protect text-based information, and are not well-suited to the encryption of multimedia data [5][6][7], including images. This is due to several reasons.…”
Section: Introductionmentioning
confidence: 99%