Abstract
While cyber security has dramatically improved over time, the abilities of hackers and computer programming has also While cyber security has dramatically improved over time, the abilities of hackers and computer programming has also increased. This calls for an increase in password security. This isn’t just a problem for individuals, but it is also a significant, and costly, issue for small businesses to big corporations. The goal of this project was to provide people with an easy way to make their passwords more secure without the need for data or complicated websites.The original thought was to create an application that would increase the strength of the password, and this proved to be true. In this project the same passwords were tested raw, and re-tested using the created application. Once the procedures were set up, each trial was given an unique 1, 2, 3, and 4 character password. Once the data was collected from the two passwords that were too lengthy to be tested, they were extrapolated using the formula. Using the created application to elongate the original four character password it increased. This calls for an increase in password security. This isn’t just a problem for individuals, but it is also a significant, and costly, issue for small businesses to big corporations. The goal of this project was to provide people with an easy way to make their passwords more secure without the need for data or complicated websites.The original thought was to create an application that would increase the strength of the password, and this proved to be true. In this project the same passwords were tested raw, and re-tested using the created application. Once the procedures were set up, each trial was given an unique 1, 2, 3, and 4 character password. Once the data was collected from the two passwords that were too lengthy to be tested, they were extrapolated using the formula. Using the created application to elongate the original four character password it
took 9.81E+24 seconds, or 211034000000000000 years, after being stratified to crack open.
Home » FSJ 2024-Using Randomly Generated Cryptographic Hash Functions to Enforce Passwords- Joshua L. Shunk