The Use of Hashed PasswordsA widely used password security technique i terjemahan - The Use of Hashed PasswordsA widely used password security technique i Bahasa Indonesia Bagaimana mengatakan

The Use of Hashed PasswordsA widely

The Use of Hashed Passwords
A widely used password security technique is the use of hashed passwords and a salt
value. This scheme is found on virtually all UNIX variants as well as on a number
of other operating systems. The following procedure is employed ( Figure 3.1a ). To
load a new password into the system, the user selects or is assigned a password. This
password is combined with a fixed-length salt value [MORR79]. In older implementations,
this value is related to the time at which the password is assigned to the user.
Newer implementations use a pseudorandom or random number. The password
and salt serve as inputs to a hashing algorithm to produce a fixed-length hash code.
The hash algorithm is designed to be slow to execute to thwart attacks. The hashed
password is then stored, together with a plaintext copy of the salt, in the password
file for the corresponding user ID. The hashed-password method has been shown to
be secure against a variety of cryptanalytic attacks [WAGN00].
When a user attempts to log on to a UNIX system, the user provides an ID
and a password (Figure 3.1b). The operating system uses the ID to index into the
password file and retrieve the plaintext salt and the encrypted password. The salt
and user-supplied password are used as input to the encryption routine. If the result
matches the stored value, the password is accepted.
The salt serves three purposes:
• It prevents duplicate passwords from being visible in the password file. Even if
two users choose the same password, those passwords will be assigned different
salt values. Hence, the hashed passwords of the two users will differ.
• It greatly increases the difficulty of offline dictionary attacks. For a salt of
length b bits, the number of possible passwords is increased by a factor of 2b,
increasing the difficulty of guessing a password in a dictionary attack.
• It becomes nearly impossible to find out whether a person with passwords on
two or more systems has used the same password on all of them.
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
Menggunakan sandi yang terpotongTeknik keamanan password yang digunakan adalah menggunakan password yang terpotong dan garamnilai. Skema ini ditemukan pada hampir semua varian UNIX serta sejumlahsistem operasi lain. Prosedur berikut yang digunakan (gambar 3.1a). Untukmemuat kata sandi baru ke dalam sistem, pengguna memilih atau diberikan sandi. Inisandi dikombinasikan dengan nilai garam tetap panjang [MORR79]. Dalam implementasi yang lebih tua,nilai ini berkaitan dengan waktu di mana password ditetapkan ke pengguna.Implementasi baru menggunakan angka pseudorandom atau acak. Passworddan garam berfungsi sebagai masukan untuk hashing algoritma untuk menghasilkan kode hash tetap panjang.Algoritma hash dirancang untuk menjadi lambat untuk mengeksekusi untuk menggagalkan serangan. Terpotongsandi kemudian disimpan, bersama dengan salinan plaintext garam, sandifile untuk ID pengguna yang sesuai. Metode hashed-password telah terbuktiakan aman terhadap berbagai serangan cryptanalytic [WAGN00].Ketika pengguna mencoba untuk log on ke sebuah sistem UNIX, pengguna memberikan IDdan password (gambar 3.1b). Sistem operasi menggunakan ID untuk indeks kepassword file dan mengambil garam plaintext dan sandi yang dienkripsi. Garamdan password yang diberikan pengguna-digunakan sebagai masukan untuk enkripsi rutin. Jika hasilpertandingan nilai tersimpan, password yang diterima.Garam menyajikan tiga tujuan:• Mencegah duplikat password tidak terlihat dalam file sandi. Bahkan jikadua pengguna memilih password yang sama, password tersebut akan dapat ditetapkan berbedanilai-nilai garam. Oleh karena itu, password terpotong dua pengguna akan berbeda.• Ini sangat meningkatkan kesulitan dalam serangan kamus offline. Untuk garampanjang b bit, jumlah sandi mungkin meningkat dengan faktor 2b,meningkatkan kesulitan untuk menebak password dalam serangan Kamus.• Menjadi hampir mustahil untuk mengetahui apakah seseorang dengan sandi padadua atau lebih sistem telah menggunakan password yang sama pada mereka semua.
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
The Use of Hashed Passwords
A widely used password security technique is the use of hashed passwords and a salt
value. This scheme is found on virtually all UNIX variants as well as on a number
of other operating systems. The following procedure is employed ( Figure 3.1a ). To
load a new password into the system, the user selects or is assigned a password. This
password is combined with a fixed-length salt value [MORR79]. In older implementations,
this value is related to the time at which the password is assigned to the user.
Newer implementations use a pseudorandom or random number. The password
and salt serve as inputs to a hashing algorithm to produce a fixed-length hash code.
The hash algorithm is designed to be slow to execute to thwart attacks. The hashed
password is then stored, together with a plaintext copy of the salt, in the password
file for the corresponding user ID. The hashed-password method has been shown to
be secure against a variety of cryptanalytic attacks [WAGN00].
When a user attempts to log on to a UNIX system, the user provides an ID
and a password (Figure 3.1b). The operating system uses the ID to index into the
password file and retrieve the plaintext salt and the encrypted password. The salt
and user-supplied password are used as input to the encryption routine. If the result
matches the stored value, the password is accepted.
The salt serves three purposes:
• It prevents duplicate passwords from being visible in the password file. Even if
two users choose the same password, those passwords will be assigned different
salt values. Hence, the hashed passwords of the two users will differ.
• It greatly increases the difficulty of offline dictionary attacks. For a salt of
length b bits, the number of possible passwords is increased by a factor of 2b,
increasing the difficulty of guessing a password in a dictionary attack.
• It becomes nearly impossible to find out whether a person with passwords on
two or more systems has used the same password on all of them.
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: