Research Article

A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms

by  Boreddy Nikhil Reddy, Nimit Acharya, Kishore Bhamidipati
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Issue 17
Published: December 2012
Authors: Boreddy Nikhil Reddy, Nimit Acharya, Kishore Bhamidipati
10.5120/9643-4393
PDF

Boreddy Nikhil Reddy, Nimit Acharya, Kishore Bhamidipati . A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms. International Journal of Computer Applications. 59, 17 (December 2012), 38-41. DOI=10.5120/9643-4393

                        @article{ 10.5120/9643-4393,
                        author  = { Boreddy Nikhil Reddy,Nimit Acharya,Kishore Bhamidipati },
                        title   = { A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 59 },
                        number  = { 17 },
                        pages   = { 38-41 },
                        doi     = { 10.5120/9643-4393 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Boreddy Nikhil Reddy
                        %A Nimit Acharya
                        %A Kishore Bhamidipati
                        %T A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms%T 
                        %J International Journal of Computer Applications
                        %V 59
                        %N 17
                        %P 38-41
                        %R 10.5120/9643-4393
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Many hashing techniques have been developed to secure data and store information like passwords, in the form of hash codes, which appear as a sequence of random characters. The hashing algorithms used have the pitfall that they can be reverse engineered using large tables that contain hash codes for frequently used passwords. In this paper a methodology is presented to protect against such attacks by using multiple hashing algorithms together.

References
  • Wikipedia
  • VH Shear, WO Sibert, DM Van Wie - US Patent 6,292,569, 2001 - Google Patents. Systems and methods using cryptography to protect secure computing environments
  • M Bagnulo, J Arkko, Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs) - 2007
  • Hoffman, P. and B. Schneier, "Attacks on Cryptographic Hashes in Internet Protocols", RFC 4270, November 2005.
  • Bellovin, S. and E. Rescorla, "Deploying a New Hash Algorithm", NDSS '06, February 2006.
  • Aura, T. , "Cryptographically Generated Addresses (CGA)", RFC 3972, March 2005.
  • Bagnulo, M. and J. Arkko, "Cryptographically Generate Addresses (CGA) Extension Field Format", RFC 4581, October 2006.
  • Arkko, J. , Kempf, J. , Zill, B. , and P. Nikander, "Secure Neighbor Discovery (SEND)", RFC 3971, March 2005.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Security Hashing MD5 SHA1 Secure Passwords

Powered by PhDFocusTM