Bilgilendirme: Sürüm Güncellemesi ve versiyon yükseltmesi nedeniyle, geçici süreyle zaman zaman kesintiler yaşanabilir ve veri içeriğinde değişkenlikler gözlemlenebilir. Göstereceğiniz anlayış için teşekkür ederiz.
 

On Time-Memory Trade-Offs for Password Hashing Schemes

dc.contributor.author Saran, Ayse Nurdan
dc.contributor.authorID 20868 tr_TR
dc.contributor.other 06.01. Bilgisayar Mühendisliği
dc.contributor.other 06. Mühendislik Fakültesi
dc.contributor.other 01. Çankaya Üniversitesi
dc.date.accessioned 2024-07-04T10:05:30Z
dc.date.accessioned 2025-09-18T14:09:45Z
dc.date.available 2024-07-04T10:05:30Z
dc.date.available 2025-09-18T14:09:45Z
dc.date.issued 2024
dc.description.abstract A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms. The primary purpose of password hashing is to enhance the security of user credentials by preventing the exposure of plaintext passwords in the event of a data breach. As a key derivation function, password hashing aims to derive secret keys from a master key, password, or passphrase using a pseudorandom function. This review focuses on the design and analysis of time-memory trade-off (TMTO) attacks on recent password hashing algorithms. This review presents a comprehensive survey of TMTO attacks and recent studies on password hashing for authentication by examining the literature. The study provides valuable insights and strategies for safely navigating transitions, emphasizing the importance of a systematic approach and thorough testing to mitigate risk. The purpose of this paper is to provide guidance to developers and administrators on how to update cryptographic practices in response to evolving security standards and threats. en_US
dc.identifier.citation Saran, Ayse Nurdan (2024). "On time-memory trade-offs for password hashing schemes", Frontiers in Computer Science, Vol. 6. en_US
dc.identifier.doi 10.3389/fcomp.2024.1368362
dc.identifier.issn 2624-9898
dc.identifier.scopus 2-s2.0-85187864601
dc.identifier.uri https://doi.org/10.3389/fcomp.2024.1368362
dc.identifier.uri https://hdl.handle.net/20.500.12416/13458
dc.language.iso en en_US
dc.publisher Frontiers Media Sa en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Time-Memory Trade-Offs (Tmtos) en_US
dc.subject Password Hashing Schemes (Phs) en_US
dc.subject Pbkdf2 en_US
dc.subject Dictionary Attacks en_US
dc.subject Rainbow Tables en_US
dc.title On Time-Memory Trade-Offs for Password Hashing Schemes en_US
dc.title On time-memory trade-offs for password hashing schemes tr_TR
dc.type Article en_US
dspace.entity.type Publication
gdc.author.institutional Saran, Ayşe Nurdan
gdc.author.scopusid 58941042800
gdc.author.wosid Saran, Nurdan/Izq-0124-2023
gdc.description.department Çankaya University en_US
gdc.description.departmenttemp [Saran, Ayse Nurdan] Cankaya Univ, Dept Comp Engn, Ankara, Turkiye en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q3
gdc.description.volume 6 en_US
gdc.description.woscitationindex Emerging Sources Citation Index
gdc.identifier.openalex W4392292139
gdc.identifier.wos WOS:001184814600001
gdc.openalex.fwci 6.11060105
gdc.openalex.normalizedpercentile 0.94
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 0
gdc.plumx.mendeley 27
gdc.plumx.scopuscites 3
gdc.scopus.citedcount 3
gdc.wos.citedcount 2
relation.isAuthorOfPublication 5de9997f-6ac0-489d-9c97-5e674bd1b9c7
relation.isAuthorOfPublication.latestForDiscovery 5de9997f-6ac0-489d-9c97-5e674bd1b9c7
relation.isOrgUnitOfPublication 12489df3-847d-4936-8339-f3d38607992f
relation.isOrgUnitOfPublication 43797d4e-4177-4b74-bd9b-38623b8aeefa
relation.isOrgUnitOfPublication 0b9123e4-4136-493b-9ffd-be856af2cdb1
relation.isOrgUnitOfPublication.latestForDiscovery 12489df3-847d-4936-8339-f3d38607992f

Files