首页> 外文会议>International Conference on QiR;International conference on civic space >Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system
【24h】

Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system

机译:基于OING O-O认证的安全系统MD5和SHA-1算法实现的分析与比较

获取原文

摘要

Simple-O, an automated essay grading application was developed at the Department of Electrical Engineering University of Indonesia. This application used MD5 + salt algorithm to perform protection for authentication password of users stored in its database. Unfortunately, due to a number of flaws contained in the MD5 algorithm, SHA-1 + salt algorithm was implemented in this application and then the comparison was carried out between those two algorithms. The experiments include time measurements and estimation of brute force attack for each algorithm. Processing time and CPU usage were also measured. In the brute force hash code scenario, it was tried to find plaintext from the chipertext. In this scenario, both MD5 and SHA-1 was implemented and tested using Hashcat tool. The better the algorithm, the more time needed to brute force the chipertext. In this scenario the password tested has 8 to 10 characters. The result from this testing shows that the implementation of SHA-1 algorithm is more robust against brute force attacks than MD5. The difference in processing time between SHA-1 + salt and MD5 + salt ranged from 0.001 seconds to 0.002 seconds for each length variation of the password from 8 to 10 character. While the difference in CPU usage is 0.545%, 0.985%, and 1.69% respectively for the password with 8, 9, and 10 characters length. These results indicate that while giving better security the implementation of the algorithm SHA-1 + salt does not impose on the performance of Simple-O application.
机译:简单,在印度尼西亚电气工程系中开发了自动论文评级申请。此应用程序使用MD5+盐算法对存储在其数据库中的用户的身份验证密码进行保护。不幸的是,由于MD5算法中包含的许多缺陷,SHA-1+在本申请中实现了盐算法,然后在这两种算法之间进行比较。实验包括针对每种算法的时间测量和对蛮力攻击的估计。还测量了处理时间和CPU使用情况。在蛮力哈希代码方案中,它试图从Chipertext找到明文。在这种情况下,使用HashCAT工具实现和测试MD5和SHA-1。算法越好,蛮力越强的时间越多。在这种情况下,测试的密码有8到10个字符。该测试的结果表明,SHA-1算法的实现对于比MD5的强力攻击更加稳健。 SHA-1&#X002B之间的处理时间差异;盐和MD5+盐范围为0.001秒至0.002秒,每个长度的密码从8到10个字符的变化。虽然CPU使用率分别为8,9和10个字符的密码分别为0.545%,0.985%和1.69%。这些结果表明,虽然提供更好的安全性,但算法SHA-1&#x002b的实现;盐不施加简单o应用的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号