- Volume 20 Issue 1
MD-5 has been the hash algorithm to encrypt the user's password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.
Hash algorithm;Encryption algorithm;MD algorithm;SHA algorithm;Linux security
- D. I. Yang, Introduction to Information Security and Training: System Hacking and Security, Seoul, Korea: Hanbit Academy, 2013.
- D. I. Yang, Introduction to Information Security, Seoul, Korea: Hanbit Academy, 2013.
- S. J. Jung, and Y. M. Bae, To conquer Linux Master First Class, Seoul, Korea: Booksholic Publishing, 2015.
- S. J Jung, and K. Sung, "Management and security of user in linux server," Journal of Advanced navigation Technology, Vol. 19, No. 6, pp. 587-594, Dec. 2015. https://doi.org/10.12673/jant.2015.19.6.587
- Y. M. Bae, and S. J. Jung, To conquer Linux Master Second Class, Seoul, Korea: Booksholic Publishing, 2014.
- National Institute of Standards and Technology [Internet]. Available: http://www.nist.gov/.
- National Security Agency [Internet]. Available: http://www.nsa.gov/.
- HTTP Server Project [Internet]. Available: http://httpd. apache.org/.
- The PHP Group [Internet]. Available: http://www.php.net/.
- Oracle, MySQL Database[Internet]. Available: http://www.mysql.com/.
- Openwall, John the Ripper password cracker [Internet]. Available: http://www.openwall.com/john/.
Supported by : 한남대학교