magistrska naloga
David Najžer (Author), Borut Lužar (Mentor), Matjaž Praprotnik (Co-mentor)

Abstract

Kriptografski zgoščevalni algoritmi služijo več namenom, na primer zgoščevanju gesel, preverjanju kontrolne vsote, overjanju digitalnih podpisov ipd. Pri zgoščevanju uporabniških gesel moramo biti še posebej pozorni, da izberemo primeren algoritem, saj se lahko v nasprotnem primeru izpostavimo nevarnosti, da nekdo iz zgoščene vrednosti ugotovi dejansko geslo. Vsekakor so poleg izbire primernega zgoščevalnega algoritma prisotni še številni drugi dejavniki, ki zvišujejo varnostno stopnjo sistema shranjevanja gesel. V magistrski nalogi pregledamo in primerjamo pogosto uporabljene kriptografske zgoščevalne algoritme, z namenom, da ugotovimo, kateri je najbolj primeren za namen zgoščevanja uporabniških gesel. Pregledamo tudi nekatere druge elemente, ki skupaj z algoritmi skrbijo za visoko stopnjo varnosti. V zaključku predstavimo še smernice za kontinuirano vzdrževanje varnosti gesel, njihovo shranjevanje in upravljanje.

Keywords

kriptografija;zgoščevalni algoritmi;varovanje gesel;MD5;SHA-2;

Data

Language: Slovenian
Year of publishing:
Typology: 2.09 - Master's Thesis
Organization: FIŠ - Faculty of Information Studies
Publisher: [D. Najžer]
UDC: 004.056.55(043.2)
COBISS: 188210947 Link will open in a new window
Views: 227
Downloads: 10
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary abstract: Cryptographic hash functions serve various purposes, such as: password hashing, checksum verification, digital signature authentication, etc. When hashing user passwords, particular attention must be given to selecting an appropriate algorithm, as otherwise, there is a risk that an attacker might retrieve the actual password from the hashed value. Aside from the choice of a suitable hash algorithm, several other factors contribute to enhancing the security level of password storage systems. In this master's thesis, we review and compare commonly used cryptographic hash functions. Additionally, we attempt to determine which one is most suitable for the purpose of hashing user passwords. We also examine various other elements that, together with the algorithms, contribute to maintaining a high level of security. In conclusion, guidelines for the continuous maintenance of password security, their storage, and management are presented.
Secondary keywords: cryptography;hash functions;password security;MD5;SHA-2;
Type (COBISS): Master's thesis/paper
Thesis comment: Fakulteta za informacijske študije v Novem mestu
Source comment: Na ov.: Magistrska naloga : študijskega programa druge stopnje;
Pages: XV, 95 str.
ID: 23110819