
Unification of Password Encryption
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.d1111.1284s319
Subject(s) - hash function , identification (biology) , computer science , password , md5 , secure hash algorithm , set (abstract data type) , encryption , computer security , unix , cryptographic hash function , sha 2 , operating system , programming language , software , botany , biology
A secure approach of UNIX system positive identification systems is to store the hash1 of the positive identification within the positive identification file instead of storing it as a noticeable text. The most purpose of this report is to investigate these positive identification systems that use hash functions like MD5, SHA256 and SHA512. The stress is set on the positive identification strength provided by applying these hash functions. We tend to conjointly analyze this approach by making an attempt to crack the passwords, with package tool ‘John the Ripper’. The strength of the passwords used can vary from easy to advance. This report analyzes that hash operate would be best to yield a sturdy and secure positive identification system.