magistrska naloga
Abstract
Kriptografski zgoščevalni algoritmi služijo več namenom, na primer zgoščevanju gesel, preverjanju kontrolne vsote, overjanju digitalnih podpisov ipd. Pri zgoščevanju uporabniških gesel moramo biti še posebej pozorni, da izberemo primeren algoritem, saj se lahko v nasprotnem primeru izpostavimo nevarnosti, da nekdo iz zgoščene vrednosti ugotovi dejansko geslo. Vsekakor so poleg izbire primernega zgoščevalnega algoritma prisotni še številni drugi dejavniki, ki zvišujejo varnostno stopnjo sistema shranjevanja gesel. V magistrski nalogi pregledamo in primerjamo pogosto uporabljene kriptografske zgoščevalne algoritme, z namenom, da ugotovimo, kateri je najbolj primeren za namen zgoščevanja uporabniških gesel. Pregledamo tudi nekatere druge elemente, ki skupaj z algoritmi skrbijo za visoko stopnjo varnosti. V zaključku predstavimo še smernice za kontinuirano vzdrževanje varnosti gesel, njihovo shranjevanje in upravljanje.
Keywords
kriptografija;zgoščevalni algoritmi;varovanje gesel;MD5;SHA-2;
Data
Language: |
Slovenian |
Year of publishing: |
2023 |
Typology: |
2.09 - Master's Thesis |
Organization: |
FIŠ - Faculty of Information Studies |
Publisher: |
[D. Najžer] |
UDC: |
004.056.55(043.2) |
COBISS: |
188210947
|
Views: |
227 |
Downloads: |
10 |
Average score: |
0 (0 votes) |
Metadata: |
|
Other data
Secondary language: |
English |
Secondary abstract: |
Cryptographic hash functions serve various purposes, such as: password hashing, checksum verification, digital signature authentication, etc. When hashing user passwords, particular attention must be given to selecting an appropriate algorithm, as otherwise, there is a risk that an attacker might retrieve the actual password from the hashed value. Aside from the choice of a suitable hash algorithm, several other factors contribute to enhancing the security level of password storage systems. In this master's thesis, we review and compare commonly used cryptographic hash functions. Additionally, we attempt to determine which one is most suitable for the purpose of hashing user passwords. We also examine various other elements that, together with the algorithms, contribute to maintaining a high level of security. In conclusion, guidelines for the continuous maintenance of password security, their storage, and management are presented. |
Secondary keywords: |
cryptography;hash functions;password security;MD5;SHA-2; |
Type (COBISS): |
Master's thesis/paper |
Thesis comment: |
Fakulteta za informacijske študije v Novem mestu |
Source comment: |
Na ov.: Magistrska naloga : študijskega programa druge stopnje;
|
Pages: |
XV, 95 str. |
ID: |
23110819 |