2. ABSTRACT
● This abstract delves into the pervasive issue of password hacking in correlation with the expanding
user base on the internet. With the rise of unauthorized access incidents, leading to potential theft of
sensitive information and subsequent harm to economies or organizational security, the abstract
proposes a solution centered around hashing algorithms.
● To combat hacking activities, various hashing algorithms, including SHA-1, MD-5, Salted MD-5, SHA-
256, and SHA-512, are employed. The research employs the MySQL database to store hash values
generated through these algorithms. Notably, the study establishes the superiority of SHA over MD-5
and Salted MD-5. Additionally, within the SHA family, SHA-512 and SHA-256 are recognized for their
distinct advantages.
● Innovatively, the research introduces four new hashing functions, formed through combinations of
existing algorithms such as SHA-256 and SHA-512. These functions, namely SHA-256_with_SHA-
256, SHA_256_With_SHA-512, SHA-512_With_SHA-512, and SHA512_With_SHA-256, contribute to
bolstering password security. The findings underscore the efficacy of these new hashing functions in
fortifying passwords, presenting a potential control mechanism against hacking attempts.
3. INTRODUCTION
● Passwords serve as the primary defense against unauthorized access, acting as the
initial barrier to protect valuable assets like emails and files. The consequences of
unprotected passwords extend to potential loss of crucial data and the risk of
unauthorized access to sensitive information such as bank account details and
identity proofs. Therefore, safeguarding passwords becomes imperative.
● The emphasis on password protection goes beyond merely advocating for long and
robust passwords; it also involves ensuring the security of passwords, even when
they meet strength criteria. This heightened focus on password security is
particularly critical in the face of a rising number of hackers.
● Various methods can be employed for password protection, with hashing algorithms
emerging as one of the most effective approaches. Cryptographic hash functions,
synonymous with hashing algorithms, utilize mathematical procedures to transform
data into a fixed-size hash. Operating as one-way, non-reversible functions, hash
function algorithms play a pivotal role in password protection. By storing passwords
in the form of hash values instead of their original counterparts, the use of diverse
hashing algorithms significantly complicates the task for hackers attempting to
decipher these hash values.
4. EXISTING MODULE
● In a comparative examination of hashing encryption algorithms, this study focuses on three key
algorithms: Secure Hash Algorithm-1 (SHA-1), Message Digest-5 (MD5), and Secure Hash Algorithm-
512 (SHA-512). The hashing process is meticulously elucidated, leading to the assertion that SHA-1
surpasses MD-5 and SHA-512. The paper contends that SHA-1 excels due to its superior speed
compared to SHA-512 and heightened efficiency compared to MD-5.
● Furthermore, the paper explores the application of SHA-512 in web applications for password hashing,
employing a hill cipher for salt generation. The encryption key, derived from the length of the
concatenated password, username, and the characters of the username, presents five matrices for
selection. This innovative procedure enhances password security by generating diverse hash
messages from the same password.
● The narrative extends to underscore the significance of hashing algorithms across various subdomains
of networking, encompassing Internet Security, Network Security, and Computer Security. Additionally,
the study delves into potential attacks against hash functions and the compression algorithms integral
to their operation. This comprehensive exploration provides valuable insights into the multifaceted role
of hashing algorithms in the realm of networking security.
6. PROPOSED MODULE
● The user provides input for password generation, initiating a process that employs various hashing
algorithms. Among these algorithms are established ones like SHA1, MD-5, Salted MD-5, SHA-
256, and SHA-512, complemented by custom algorithms named SHA-256_With_SHA256, SHA-
256_With_SHA-512, SHA-512_With_SHA-256, and SHA-512_With_SHA-512. Hash values are
generated using these algorithms, and the results are stored in separate MySQL tables created for
each algorithm, facilitating a comparative analysis of hash value strength.
● The integration of the database with IntelliJ involves code development using the JDBC connector.
Nine distinct tables are created within MySQL to store hash values generated by each algorithm
individually.
● Within IntelliJ, nine Java files house code specific to each algorithm. These files return the
generated hash values of input passwords to their respective MySQL tables, enabling clear
observation and comparison of hash values generated by different algorithms. Upon code
execution, the simulation initiates, and a window appears to facilitate further analysis. This
comprehensive approach allows for a thorough examination of hash value strengths generated
through diverse hashing algorithms
7. ADVANTAGES
● The advantage of making all nine different tables
is to compare the results easily.
● Prevent brute force attack and collision hash
attack
● Password become more secure with advance
hash function
10. REFERENCES
● [1]. Long, Sihan. "A Comparative Analysis of the Application of Hashing Encryption
Algorithms for MD5, SHA-1, and SHA-512." Journal of Physics: Conference Series, vol.
1314, IOP Publishing, 2019.
● [2]. De Guzman, Froilan E., Bobby D. Gerardo, and Ruji P. Medina. "Implementation of
enhanced secure hash algorithm towards a secured web portal." 2019 IEEE 4th
International Conference on Computer and Communication Systems (ICCCS), pp. 189-192.
IEEE, 2019.
● [3]. Sharma, Arvind K., and S. K. Mittal. "Cryptography & Network Security Hash Function
Applications, Attacks and Advances: A Review." 2019 Third International Conference on
Inventive Systems and Control (ICISC), IEEE, 2019.
● This paper is from Comparative Analysis of Password Storage Security using Double
Secure Hash Algorithm by Savarala Chethana, Sreevathsa Sree Charan, Vemula Srihitha,
D. Radha, Kavitha C. R.