Browse > Article
http://dx.doi.org/10.12673/jant.2016.20.1.72

Analysis of the Hashing and Encryption Algorithms Applied to the Linux  

Bae, Yu-Mi (Enber Co., Ltd.)
Jung, Sung-Jae (Enber Co., Ltd.)
Soh, Wooyoung (Department of Computer Engineering, Hannam University)
Abstract
MD-5 has been the hash algorithm to encrypt the user's password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.
Keywords
Hash algorithm; Encryption algorithm; MD algorithm; SHA algorithm; Linux security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D. I. Yang, Introduction to Information Security, Seoul, Korea: Hanbit Academy, 2013.
2 S. J. Jung, and Y. M. Bae, To conquer Linux Master First Class, Seoul, Korea: Booksholic Publishing, 2015.
3 S. J Jung, and K. Sung, "Management and security of user in linux server," Journal of Advanced navigation Technology, Vol. 19, No. 6, pp. 587-594, Dec. 2015.   DOI
4 Y. M. Bae, and S. J. Jung, To conquer Linux Master Second Class, Seoul, Korea: Booksholic Publishing, 2014.
5 National Institute of Standards and Technology [Internet]. Available: http://www.nist.gov/.
6 National Security Agency [Internet]. Available: http://www.nsa.gov/.
7 HTTP Server Project [Internet]. Available: http://httpd. apache.org/.
8 The PHP Group [Internet]. Available: http://www.php.net/.
9 Oracle, MySQL Database[Internet]. Available: http://www.mysql.com/.
10 Openwall, John the Ripper password cracker [Internet]. Available: http://www.openwall.com/john/.
11 D. I. Yang, Introduction to Information Security and Training: System Hacking and Security, Seoul, Korea: Hanbit Academy, 2013.