Download now Free registration required
Many hashing techniques have been developed to secure data and store information like passwords, in the form of hash codes, which appear as a sequence of random characters. The hashing algorithms used have the pitfall that they can be reverse engineered using large tables that contain hash codes for frequently used passwords. In this paper a methodology is presented to protect against such attacks by using multiple hashing algorithms together. In this age of Information Technology protecting the identity of an individual is of immense importance. The corporations spend a lot of resources to enhance the level of security for a client in order to protect his credentials.
- Format: PDF
- Size: 409.04 KB