1 |
The Ministry of Public Administration and Security (Personal Information Protection Policy), "Basic Measures for Securing Safety of Personal Information," 2019.
|
2 |
Korea Internet & Security Agency (KISA), "Personal Data Encryption Action Guide," 2019.
|
3 |
X. Wang, D. Feng, X. Lai, and H. Yu, "Collisions for Hash Functions MD4, MD5, HAVAL128 and RIPEMD," Cryptology ePrint Archive, Report 2004/199, pp. 1-4, 2004.
|
4 |
M. Stevens, E. Bursztein, P. Karpman, A. Albertini, and Y. Markov, "The First Collision for Full SHA-1," CRYPTO 2017, pp. 1-23, 2017.
|
5 |
P.N. Patel, J.K. Patel and P.V. Virparia, "A Cryptography Application using Salt Hash Technique," International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, Issue 6, 2013.
|
6 |
PHP.net. https://www.php.net/manual/en/function.md5.php (accessed August 17, 2020).
|
7 |
LAUGHFOOL's LAB. https://laughfool.tistory.com/16 (accessed August 17, 2020).
|
8 |
The security ledger. https://securityledger.com/2012/12/new-25-gpu-monster-devours-passwords-in-seconds/ (accessed August 17, 2020).
|
9 |
Samsung Electronics Co. Ltd., User Device Performing Password Based Authentication and Password Registration and Authentication Method Thereof, 10-2014-0024427, Korea, 2007.
|
10 |
Safe Saving Password. https://d2.naver.com/helloworld/318732 (accessed August 17, 2020).
|
11 |
S. Boonkrong and C. Somboonpattanakit, "Dynamic Salt Generation and Placement for Secure Password Storing," IAENG International Journal of Computer Science, Vol. 43, pp. 27-36, 2016.
|
12 |
A. Karrar, T. Almutiri, S. Algrafi, N. Alalwi, and A. Alharbi, "Enhancing Salted Password Hashing Technique Using Swapping Elements in an Array Algorithm," International Journal of Computer Science and Technology, Vol. 9, Issue. 1, pp. 21-25, 2018.
|
13 |
Privacy Statement/Security Notice/Accessibility Statement. https://www.nist.gov/privacypolicy (accessed August 17, 2020).
|
14 |
N. Nagaraj, V. Vaidya, and P.G. Vaidya, "Revisiting the One-Time Pad," International Journal of Network Security, Vol. 6, No. 1, pp. 94-102, 2008.
|
15 |
How Secure Is My Password?. https://howsecureismypassword.net (accessed August 17, 2020).
|
16 |
Statista. https://www.statista.com/statistics/744216/worldwide-distribution-of-password-length/ (accessed August 17, 2020).
|