Repository of colleges and higher education institutions

Show document
A+ | A- | Help | SLO | ENG

Title:Primerjava in analiza kriptografskih zgoščevalnih funkcij pri zgoščevanju gesel iz vidika zagotavljanja varnosti in hitrosti : magistrska naloga
Authors:ID Najžer, David (Author)
ID Lužar, Borut (Mentor) More about this mentor... New window
ID Praprotnik, Matjaž (Comentor)
Files:.pdf RAZ_Najzer_David_i2023.pdf (1,61 MB)
MD5: B42C33FFD8E3A31E4E8BC474B68ACE88
 
Language:Slovenian
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:FIŠ - Faculty of Information Studies in Novo mesto
Abstract:Kriptografski zgoščevalni algoritmi služijo več namenom, na primer zgoščevanju gesel, preverjanju kontrolne vsote, overjanju digitalnih podpisov ipd. Pri zgoščevanju uporabniških gesel moramo biti še posebej pozorni, da izberemo primeren algoritem, saj se lahko v nasprotnem primeru izpostavimo nevarnosti, da nekdo iz zgoščene vrednosti ugotovi dejansko geslo. Vsekakor so poleg izbire primernega zgoščevalnega algoritma prisotni še številni drugi dejavniki, ki zvišujejo varnostno stopnjo sistema shranjevanja gesel. V magistrski nalogi pregledamo in primerjamo pogosto uporabljene kriptografske zgoščevalne algoritme, z namenom, da ugotovimo, kateri je najbolj primeren za namen zgoščevanja uporabniških gesel. Pregledamo tudi nekatere druge elemente, ki skupaj z algoritmi skrbijo za visoko stopnjo varnosti. V zaključku predstavimo še smernice za kontinuirano vzdrževanje varnosti gesel, njihovo shranjevanje in upravljanje.
Keywords:kriptografija, zgoščevalni algoritmi, varovanje gesel, MD5, SHA-2
Place of publishing:Novo mesto
Place of performance:Novo mesto
Publisher:[D. Najžer]
Year of publishing:2023
Year of performance:2023
Number of pages:XV, 95 str.
PID:20.500.12556/ReVIS-10380 New window
COBISS.SI-ID:188210947 New window
UDC:004.056.55(043.2)
Note:Na ov.: Magistrska naloga : študijskega programa druge stopnje;
Publication date in ReVIS:08.03.2024
Views:909
Downloads:34
Metadata:XML DC-XML DC-RDF
:
Copy citation
  
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-NC-SA 4.0, Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
Link:http://creativecommons.org/licenses/by-nc-sa/4.0/
Description:A Creative Commons license that bans commercial use and requires the user to release any modified works under this license.
Licensing start date:08.03.2024

Secondary language

Language:English
Abstract:Cryptographic hash functions serve various purposes, such as: password hashing, checksum verification, digital signature authentication, etc. When hashing user passwords, particular attention must be given to selecting an appropriate algorithm, as otherwise, there is a risk that an attacker might retrieve the actual password from the hashed value. Aside from the choice of a suitable hash algorithm, several other factors contribute to enhancing the security level of password storage systems. In this master's thesis, we review and compare commonly used cryptographic hash functions. Additionally, we attempt to determine which one is most suitable for the purpose of hashing user passwords. We also examine various other elements that, together with the algorithms, contribute to maintaining a high level of security. In conclusion, guidelines for the continuous maintenance of password security, their storage, and management are presented.
Keywords:cryptography, hash functions, password security, MD5, SHA-2


Back