z-logo
open-access-imgOpen Access
Cryptanalysis of bcrypt and SHA-512 using Distributed Processing over the Cloud
Author(s) -
Atishay Aggarwal,
Pranav Chaphekar,
Rohit Mandrekar
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2015906744
Subject(s) - computer science , cryptanalysis , cloud computing , computer security , cryptography , operating system
Passwords are one of the commonly used method to protect one’s personal information against the intruders. But storing passwords as plaintext is not safe, hence they are saved in form of hashes. And authentication occurs by comparing the hash in the database to the hash generated from input taken. It is crucial that the hashing algorithm is not only tough to reverse engineer but, should also be nearly impossible to find a collision [1]. The study considers a different approach using distributed processing to compute multiple hashes at a very high speed, making one of the most widely used hashing algorithm SHA512[2] seem not that secure after all. The approach involves cryptanalyzing bcrypt, another hashing algorithm, and concluding whether it’s a good alternative. General Terms Algorithm, Analysis.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom