Parameter interdependencies of file placement models in a Unix system

Author(s):  
Alfredo de J. Perez-Davila ◽  
Lawrence W. Dowdy
Keyword(s):  
1984 ◽  
Vol 8 (3) ◽  
pp. 154
Author(s):  
Cornelia Boldyreff
Keyword(s):  

A secure approach of UNIX system positive identification systems is to store the hash1 of the positive identification within the positive identification file instead of storing it as a noticeable text. The most purpose of this report is to investigate these positive identification systems that use hash functions like MD5, SHA256 and SHA512. The stress is set on the positive identification strength provided by applying these hash functions. We tend to conjointly analyze this approach by making an attempt to crack the passwords, with package tool ‘John the Ripper’. The strength of the passwords used can vary from easy to advance. This report analyzes that hash operate would be best to yield a sturdy and secure positive identification system.


Author(s):  
Jürgen Gulbins ◽  
Karl Obermayr
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document