Journal of Information Security

Volume 10, Issue 2 (April 2019)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.25  Citations  

Security of Password Hashing in Cloud

HTML  XML Download Download as PDF (Size: 2283KB)  PP. 45-68  
DOI: 10.4236/jis.2019.102003    2,641 Downloads   9,732 Views  Citations
Author(s)

ABSTRACT

Though the History of using password in computing can be traced back to as far as mid of last century little focus has been implied on how to securely store and retrieve password to authenticate and authorize services to the end users. In this paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept-GPU based, password hash dump cracking using the power of cloud computing. We will be providing comparison on different password hashing cracking time using the cloud GPU power in AWS. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords.

Share and Cite:

Kamal, P. (2019) Security of Password Hashing in Cloud. Journal of Information Security, 10, 45-68. doi: 10.4236/jis.2019.102003.

Cited by

[1] Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
IEEE Transactions on …, 2024
[2] Investigating Privacy Aspects of Identity Management: From Data Protection Impact Assessment for Biometric Applications to Privacy-Centric Password Testing
2023
[3] Analysis Performance BCRYPT Algorithm to Improve Password Security from Brute Force
2021
[4] Encryption of data over HTTP (hypertext transfer protocol)/HTTPS (hypertext transfer protocol secure) requests for secure data transfers over the internet
2021 International Conference on Recent …, 2021
[5] Modified SHA-512 Algorithm for Secured Password Hashing
2021 Innovations in Power …, 2021
[6] Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
2020
[7] Revisiting Cloud Security Threat: Dictionary Attack
2019
[8] Privacy-Preserving Cloud Storage Auditing Scheme For DataSharing

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.