Security Analysis of MD5 Algorithm in Password Storage

Article Preview

Abstract:

Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing. We propose a new approach to using MD5 in password storage by using external information, a calculated salt and a random key to encrypt the password before the MD5 calculation. We suggest using key stretching to make the hash calculation slower and using XOR cipher to make the final hash value impossible to find in any standard rainbow table.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2706-2711

Citation:

Online since:

August 2013

Export:

Price:

[1] Rivest, R. The MD5 message-digest algorithm. RFC 1321, 37 (April 1992).

Google Scholar

[2] Zhang Shaolan, Xing Guobo, Yang Yixian, Improvement and Security Analysis on MD5 [J]. Computer Application, 2009, vol. 29(4): 947-949.

DOI: 10.3724/sp.j.1087.2009.00947

Google Scholar

[3] Xiaoling Zheng, JiDong Jin, Research for the Application and Safety of MD5 Algorithm in Password Authentication, 9th International Conference on Fuzzy Systems and Knowledge Discovery, (2012).

DOI: 10.1109/fskd.2012.6234010

Google Scholar

[4] H. Mirvaziri, Kasmiran Jumari, Mahamod Ismail, Z. Mohd Hanapi, A new Hash Function Based on Combination of Existing Digest Algorithms , The 5th Student Conference on Research and Development – SCOReD 2007, 11-12 December 2007, Malaysia.

DOI: 10.1109/scored.2007.4451409

Google Scholar

[5] Md. Didarul Alam Chawdhury, and A.H.M. Ashfak Habib, Security Enhancement of MD5 Hashed Passwords by using the Unused Bits of TCP Header, Proceedings of 11th International Conference on Computer and Information Technology (ICCIT 2008) 25-27 December, 2008, Khulna, Bangladesh.

DOI: 10.1109/iccitechn.2008.4803081

Google Scholar