Question

In: Computer Science

Read the article Salted Password Hashing - Doing it Right (CrackStation) and share understanding and findings...

Read the article Salted Password Hashing - Doing it Right (CrackStation) and share understanding and findings through a technical summary.

Solutions

Expert Solution

Summary:

  • The article tells us more about the techniques that are being implemented in making use of password hashing and what is the right way of doing it. As we all know how much the data breaches are threatening the databases nowadays.
  • Due to such data breaches organizations have started to manage and store password and other sensitive credentials in the hash form due to which thre is an extra security for the platform.
  • Next the author tried to explain us what technique actually exist in password hashing and how effective they are when it comes to implement them in certain platforms.
  • The author describes hashing as developing a fixed length of the fingerprint that cannot be reversed and can be used consistently throughout the database. Due to this there are two techniques frequently used foe breaking the password hashes that are being in use.
    • Dictionary attacks
    • Brute force attacks
  • These two atfacks are one of the most importanr security attacks that are being used to crack passwords and things similar to it. In dictionary attack we have are guessing the password by hitting random words to the server.
  • While in the brute force attacks we are hitting random words which will give us the password for the particular target. This attack could take a lot of time and would not be sure if it will be a success.
  • Next the author is teaching about addifg salt to the hashes so that the password remains extra secure from the attackers. Salt is a randomized string which is added at the end of the password so that the attackers would consider the whole hash as a passowrd and try to crack it.
  • Also we can add the salt to the hash after or before the actual passowrd hash making the hashes more strong and secure so that there are very less chances of breaking the hashes.

Hence, these are some of the higligh points that the author is trying to teach us from the article Salted Password Hashing.


Related Solutions

. Compare and contrast the Windows password hashing algorithm and the Linux password hashing algorithm demonstrated...
. Compare and contrast the Windows password hashing algorithm and the Linux password hashing algorithm demonstrated in the book
Please read the article below, and answer the questions that follow. In doing so, remember the...
Please read the article below, and answer the questions that follow. In doing so, remember the following, - Although the use of generic theories, covered in class/your module guide/text book will provide a framework, the expectation for the student is to be able to discuss it in context with research relevant to South Africa and your own reflective experiences. - You are required to extensively research current South African trends, amidst our changing political landscape and benchmarked against a global...
Article Findings What are the findings of each article and what implications do they have individually...
Article Findings What are the findings of each article and what implications do they have individually and collectively for solving the health problem in question? Support your answer with specific examples from your field. Explain how key biostatistical calculations and methods support the conclusions in each article. Cite relevant information from the articles that support your answer. Findings             It was found that the Evaluation of feasibility and safety of changing body position after transfemoral angiography: A randomized clinical trial...
Find an article about recent findings in physics from a reputable source. After you've read your...
Find an article about recent findings in physics from a reputable source. After you've read your article, Summarize it in 1-2 paragraphs. In an additional paragraph, discuss any evidence presented in the article. Use the following questions to help guide you: What, if anything, does this evidence support? Is it relevant to the author's main idea(s)? Is a claim made or a position taken on a scientific issue? If so, to what degree does the evidence and reasoning in the...
please read the article in online 'Understanding the Tragic Hyatt Regency Walkway Collapse' and explain what...
please read the article in online 'Understanding the Tragic Hyatt Regency Walkway Collapse' and explain what other design faults that had occurred resulting to higher risks and safety hazards to the guests and victims. Should be more than 300 words.
Please read and share your thoughts on this recent brief article from the Journal of Accountancy...
Please read and share your thoughts on this recent brief article from the Journal of Accountancy on accountant skills needed for success in a tech-enabled future. Do you agree? Can you think of other skills that future accountants will need? JOFA Article: (https://www.journalofaccountancy.com/issues/2018/jun/technology-skills-for-accountants.html) "Many experts expect accountants' work and duties to change fundamentally in the coming years. As technology is developed to handle tasks that accountants traditionally have performed, CPAs' attention is likely to shift toward advisory roles, investigating exceptions...
Read the article "Understanding inter-cultural communication in today's global environment" in Harvey & Allard's textbook (p.210-216)...
Read the article "Understanding inter-cultural communication in today's global environment" in Harvey & Allard's textbook (p.210-216) and answer the following questions. Briefly describe an example of a cross-cultural miscommunication that you have either participated in or observed in the workplace, at college, or in a public place. How did the communicators exhibit some of the dimensions described in this article? In retrospect, what could have been done differently to improve the communication in terms of the sender, choice of medium...
Is there any difference between doing what is morally right and doing what will make one...
Is there any difference between doing what is morally right and doing what will make one happy?
2. Write a Java program to read a string (a password)from the user and then   check...
2. Write a Java program to read a string (a password)from the user and then   check that the password conforms to the corporate password policy.   The policy is:   1) the password must be at least 8 characters   2) the password must contain at least two upper case letters   3) the password must contain at least one digit   4) the password cannot begin with a digit   Use a for loop to step through the string.   Output “Password OK” if the password...
Read the article “Ethics In Accounting.” This article is part of the readings for the week...
Read the article “Ethics In Accounting.” This article is part of the readings for the week and can be found through the DeVry online library. The first sentence of the article says “Ethics in Accounting is one of the most important, yet most misunderstood, concerns in the world of business today.” Do you agree or disagree with this statement?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT