Çankaya GCRIS Standart veritabanının içerik oluşturulması ve kurulumu Research Ecosystems (https://www.researchecosystems.com) tarafından devam etmektedir. Bu süreçte gördüğünüz verilerde eksikler olabilir.
 

On time-memory trade-offs for password hashing schemes

dc.authorscopusid 58941042800
dc.authorwosid Saran, Nurdan/Izq-0124-2023
dc.contributor.author Saran, Ayse Nurdan
dc.contributor.authorID 20868 tr_TR
dc.contributor.other Bilgisayar Mühendisliği
dc.date.accessioned 2024-07-04T10:05:30Z
dc.date.available 2024-07-04T10:05:30Z
dc.date.issued 2024
dc.department Çankaya University en_US
dc.department-temp [Saran, Ayse Nurdan] Cankaya Univ, Dept Comp Engn, Ankara, Turkiye en_US
dc.description.abstract A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms. The primary purpose of password hashing is to enhance the security of user credentials by preventing the exposure of plaintext passwords in the event of a data breach. As a key derivation function, password hashing aims to derive secret keys from a master key, password, or passphrase using a pseudorandom function. This review focuses on the design and analysis of time-memory trade-off (TMTO) attacks on recent password hashing algorithms. This review presents a comprehensive survey of TMTO attacks and recent studies on password hashing for authentication by examining the literature. The study provides valuable insights and strategies for safely navigating transitions, emphasizing the importance of a systematic approach and thorough testing to mitigate risk. The purpose of this paper is to provide guidance to developers and administrators on how to update cryptographic practices in response to evolving security standards and threats. en_US
dc.description.woscitationindex Emerging Sources Citation Index
dc.identifier.citation Saran, Ayse Nurdan (2024). "On time-memory trade-offs for password hashing schemes", Frontiers in Computer Science, Vol. 6. en_US
dc.identifier.doi 10.3389/fcomp.2024.1368362
dc.identifier.issn 2624-9898
dc.identifier.scopus 2-s2.0-85187864601
dc.identifier.scopusquality Q3
dc.identifier.uri https://doi.org/10.3389/fcomp.2024.1368362
dc.identifier.volume 6 en_US
dc.identifier.wos WOS:001184814600001
dc.identifier.wosquality N/A
dc.institutionauthor Saran, Ayşe Nurdan
dc.language.iso en en_US
dc.publisher Frontiers Media Sa en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.scopus.citedbyCount 3
dc.subject Time-Memory Trade-Offs (Tmtos) en_US
dc.subject Password Hashing Schemes (Phs) en_US
dc.subject Pbkdf2 en_US
dc.subject Dictionary Attacks en_US
dc.subject Rainbow Tables en_US
dc.title On time-memory trade-offs for password hashing schemes tr_TR
dc.title On Time-Memory Trade-Offs for Password Hashing Schemes en_US
dc.type Article en_US
dc.wos.citedbyCount 2
dspace.entity.type Publication
relation.isAuthorOfPublication 5de9997f-6ac0-489d-9c97-5e674bd1b9c7
relation.isAuthorOfPublication.latestForDiscovery 5de9997f-6ac0-489d-9c97-5e674bd1b9c7
relation.isOrgUnitOfPublication 12489df3-847d-4936-8339-f3d38607992f
relation.isOrgUnitOfPublication.latestForDiscovery 12489df3-847d-4936-8339-f3d38607992f

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Article.pdf
Size:
539.08 KB
Format:
Adobe Portable Document Format
Description:
Yayıncı sürümü

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: