Overview of Web Password Hashing Using S
Overview of Web Password Hashing Using S
1.1 What is password hashing? 1 Firstly designed as a cryptographic hashing algorithm, first
published in 1992, MD5 has been shown to have general
Hash algorithms are one way functions. They try some faults, which make it relatively easy to break.
amount of data into a fixed-length "fingerprint" that cannot Its 128-bit hash values, which are quite easy to produce, are
be reversed. They also have the property that if the input more commonly used for file verification to make sure that a
changes by even a little bit, the resulting hash is completely downloaded file has not been tampered with. It should not
different (see the example below). This is great for be used to secure passwords[3].
protecting passwords, because we want to store passwords
in a form that protects them even if the password file itself is SHA-1
compromised, but at the same time, we need to be able to
verify that a user's password is correct[2]. Secure Hash Algorithm 1 (SHA-1) is cryptographic hashing
algorithm firstly design by the US National Security Agency
hash(" 58756879c05c68dfac9866712fad6
in 1993 and published in 1995.It generates 160-bit hash
hbllo") a93f8146f337a69afe7dd238f3364946366 value that is typically rendered as a 40-digit hexadecimal
= number. As of 2005, SHA-1 was considered as no longer
hash(" c0e81794384491161f1777c232bc
waltz" 6bd9ec38f616560b120fda8e90f383853542 secure as the exponential increase in dividing power and
)= sophisticated methods meant that it was possible to perform
a so-called attack on the hash and produce the source
For example: password or text without spending millions on computing
resource and time[3].
The general example for account registration and
verification in a hash-based account system is as follows: SHA-2
1. The user creates an account. The successor to SHA-1, Secure Hash Algorithm 2 (SHA-2) is
a family of hash functions that produce longer hash values
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 152
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
with 224, 256, 384 or 512 bits, written as SHA-224, SHA-256, There are also some algorithms which is fail in market and
SHA-384 or SHA-512. we are not use this algorithms like MD5 (Merkl Damaged),
SHA1(Secure Hash Algorithm). If we used this algorithm
It was first published in 2001, designed by again by the NSA, there are some chance to taken our personal data which is
and an effective attack has yet to be demonstrated against it. available on web or browser.
That means SHA-2 is generally recommended for secure
hashing[3]. To avoid this problem we use here salt technique. Salt
technique is use for secure data. Some people are use so easy
SHA-3, while not a replacement for SHA-2, was developed passwords like date of birth, mobile number or may be
not by the NSA but by Guido Bertoni, Joan Daemen, Michaël personal information. It is easy to attacker broken this
Peeters and Gilles Van Assche from STMicroelectronics and password so avoid this problem we use salt technique[3].
Radboud University in Nijmegen, Netherlands. It was
standardised in 2015[3]. Example:
Scrypt like Bcrypt and PBKDF2 is an algorithm that extends Userna Saltvalue String to Hashed
keys and makes it harder to brute-force attack a hash. Unlike me be value=SHA256(passw
PBKDF2, however, scrypt is designed to use either a large hashed ord+salt value)
amount of computer memory or force many more User1 E1F1532E Password 72AE25495A7891C406
calculations as it runs. 5765 123+ salt 22D4F493
value
For valid users having to only hash one password to check if User2 84C03D03 Password B4B660AB670867E9C
it matches a stored value, the cost is small. But for someone 40DF 456+ salt 732F7DE8
attempting to try 100,000s of passwords it makes cost of value
doing so much higher or take prohibitively long.
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 153
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
The most common salt implementation errors are reusing [1] A cryptography application using salt hash technique, by
the same salt in multiple hashes, or using a salt that is too Pritesh .N. Patel, Jigishak Patel.
short.
[2] Salted Password Hashing-
1) Salt Reuse http://www.codeproject.com/Articales/704865/salted-
password-Hashing-Doing-it-Right.
A common mistake is to use the same salt in each hash.
Either the salt is hard-coded into the program, or is [3]Passwords and hacking: the jargon of hashing, salting and
generated randomly once. This is unsuccessful because if SHA-2 explained
two users have the same password, they'll still have the https://www.theguardian.com/technology/2016/dec/15/p
same hash. An attacker can still use a reverse lookup table asswords-hacking-hashing-salting-sha-2
attack to run a dictionary attack on every hash at the same
time. They just have to apply the salt to each password guess [4] Stronger Password Authentication using Browser
before they hash it. If the salt is hard-coded into a popular Extensions by Blake Ross, Collin Jackson, Nick miyake, Dan
product, lookup tables and rainbow tables can be built for Boneh, Jonh C Mitchell .
that salt, to make it easier to crack hashes generated by the
product. [5] Search Security,
http://searchsecurity.techtarget.com/definition/salt,
A new random salt must be generated each time a user Retrived 15th Oct, 2011
creates an account or changes their password[2].
BIOGRAPHIES
2) Short Salt
Diksha Sukhdeo Borde
If the salt is too short, an attacker can build a lookup table for MCA TY
every possible salt. For example, if the salt is only three ASCII MGM’ JNEC Aurangabad
characters, there are only 95x95x95 = 857,375 possible salts.
That may seem like a lot, but if each lookup table contains
only 1MB of the most common passwords, collectively they
will be only 837GB, which is not a lot considering 1000GB
hard drives can be bought for under $100 today.
For the same reason, the username shouldn't be used as a Poonam Ashok Hebare
salt. Usernames may be unique to a single service, but they MCA TY
are predictable and often reused for accounts on other MGM’ JNEC Aurangabad
services. An attacker can build lookup tables for common
usernames and use them to crack username-salted hashes.
To make it impossible for an attacker to create a lookup table
for every possible salt, the salt must be long. A good rule of
thumb is to use a salt that is the same size as the output of
the hash function. For example, the output of SHA256 is 256 Priyanka Dilip Dhanedhar
bits (32 bytes), so the salt should be at least 32 random MCA TY
bytes[2]. MGM’ JNEC Aurangabad
3. CONCLUSIONS
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 154