CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms

by Boreddy Nikhil Reddy, Nimit Acharya, Kishore Bhamidipati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 17
Year of Publication: 2012
Authors: Boreddy Nikhil Reddy, Nimit Acharya, Kishore Bhamidipati
10.5120/9643-4393

Boreddy Nikhil Reddy, Nimit Acharya, Kishore Bhamidipati . A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms. International Journal of Computer Applications. 59, 17 ( December 2012), 38-41. DOI=10.5120/9643-4393

@article{ 10.5120/9643-4393,
author = { Boreddy Nikhil Reddy, Nimit Acharya, Kishore Bhamidipati },
title = { A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 17 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number17/9643-4393/ },
doi = { 10.5120/9643-4393 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:04:29.400534+05:30
%A Boreddy Nikhil Reddy
%A Nimit Acharya
%A Kishore Bhamidipati
%T A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 17
%P 38-41
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many hashing techniques have been developed to secure data and store information like passwords, in the form of hash codes, which appear as a sequence of random characters. The hashing algorithms used have the pitfall that they can be reverse engineered using large tables that contain hash codes for frequently used passwords. In this paper a methodology is presented to protect against such attacks by using multiple hashing algorithms together.

References
  1. Wikipedia
  2. VH Shear, WO Sibert, DM Van Wie - US Patent 6,292,569, 2001 - Google Patents. Systems and methods using cryptography to protect secure computing environments
  3. M Bagnulo, J Arkko, Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs) - 2007
  4. Hoffman, P. and B. Schneier, "Attacks on Cryptographic Hashes in Internet Protocols", RFC 4270, November 2005.
  5. Bellovin, S. and E. Rescorla, "Deploying a New Hash Algorithm", NDSS '06, February 2006.
  6. Aura, T. , "Cryptographically Generated Addresses (CGA)", RFC 3972, March 2005.
  7. Bagnulo, M. and J. Arkko, "Cryptographically Generate Addresses (CGA) Extension Field Format", RFC 4581, October 2006.
  8. Arkko, J. , Kempf, J. , Zill, B. , and P. Nikander, "Secure Neighbor Discovery (SEND)", RFC 3971, March 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Security Hashing MD5 SHA1 Secure Passwords