Tagged with: hacking


Hash-based authentication is an effective way of protecting passwords in software systems. Hashing obscures the original passwords, such that it cannot be recovered in case of a database breach. However, as demonstrated by our paper titled Hash-Based Authentication Revisited in the Age of High-Performance Computers, the practical security depends on which hashing algorithm is used as well as the …
Supervisors: Pınar Tözün, Niclas Hedam
Tags: benchmarking, hashing, security, GPU, hacking, HPC