Author : Dr. Logesh Babu 1
Date of Publication :19th May 2023
Abstract: Password security has become a major worry in the current digital era. The fact that passwords are frequently the first line of defense against unauthorized access to sensitive data makes them a prime target for hackers looking to exploit security system flaws. An overview of various password attack methods and secure hashing algorithms that can be applied to counteract these assaults is given in this paper. The various password assaults, such as rainbow table attacks, dictionary attacks, and brute-force attacks. The discussion of hashing algorithms, which can be used to secure passwords by password authentication. Some of the most used algorithms, including MD5, SHA-1, SHA-2, and SHA-3, as well as the characteristics of secure hash functions. It also briefly explains more complex algorithms like bcrypt, scrypt, and argon2.
Reference :