JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Analysis of the Hashing and Encryption Algorithms Applied to the Linux
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Analysis of the Hashing and Encryption Algorithms Applied to the Linux
Bae, Yu-Mi; Jung, Sung-Jae; Soh, Wooyoung;
  PDF(new window)
 Abstract
MD-5 has been the hash algorithm to encrypt the user`s password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.
 Keywords
Hash algorithm;Encryption algorithm;MD algorithm;SHA algorithm;Linux security;
 Language
Korean
 Cited by
 References
1.
D. I. Yang, Introduction to Information Security and Training: System Hacking and Security, Seoul, Korea: Hanbit Academy, 2013.

2.
D. I. Yang, Introduction to Information Security, Seoul, Korea: Hanbit Academy, 2013.

3.
S. J. Jung, and Y. M. Bae, To conquer Linux Master First Class, Seoul, Korea: Booksholic Publishing, 2015.

4.
S. J Jung, and K. Sung, "Management and security of user in linux server," Journal of Advanced navigation Technology, Vol. 19, No. 6, pp. 587-594, Dec. 2015. crossref(new window)

5.
Y. M. Bae, and S. J. Jung, To conquer Linux Master Second Class, Seoul, Korea: Booksholic Publishing, 2014.

6.
National Institute of Standards and Technology [Internet]. Available: http://www.nist.gov/.

7.
National Security Agency [Internet]. Available: http://www.nsa.gov/.

8.
HTTP Server Project [Internet]. Available: http://httpd. apache.org/.

9.
The PHP Group [Internet]. Available: http://www.php.net/.

10.
Oracle, MySQL Database[Internet]. Available: http://www.mysql.com/.

11.
Openwall, John the Ripper password cracker [Internet]. Available: http://www.openwall.com/john/.