International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 128 - Number 16 |
Year of Publication: 2015 |
Authors: Atishay Aggarwal, Pranav Chaphekar, Rohit Mandrekar |
10.5120/ijca2015906744 |
Atishay Aggarwal, Pranav Chaphekar, Rohit Mandrekar . Cryptanalysis of bcrypt and SHA-512 using Distributed Processing over the Cloud. International Journal of Computer Applications. 128, 16 ( October 2015), 13-16. DOI=10.5120/ijca2015906744
Passwords are one of the commonly used method to protect one’s personal information against the intruders. But storing passwords as plaintext is not safe, hence they are saved in form of hashes. And authentication occurs by comparing the hash in the database to the hash generated from input taken. It is crucial that the hashing algorithm is not only tough to reverse engineer but, should also be nearly impossible to find a collision [1]. The study considers a different approach using distributed processing to compute multiple hashes at a very high speed, making one of the most widely used hashing algorithm SHA- 512[2] seem not that secure after all. The approach involves cryptanalyzing bcrypt, another hashing algorithm, and concluding whether it’s a good alternative.