ПРОГРАМНИЙ МОДУЛЬ АВТЕНТИФІКАЦІЇ З ВИКОРИСТАННЯМ УДОСКОНАЛЕНОЇ СХЕМИ МЕРКЛЕ ДЕМҐАРДА
DOI:
https://doi.org/10.18372/2225-5036.30.20361Keywords:
authentication, structure, modification, security, hashing, hash function, dynamic salt, secret pepperAbstract
The current task of ensuring the security of personal data of users of many systems around the world is the selection of reliable methods of information protection, their novelty, ease of implementation and updating, as well as their constant improvement. This article studies the structures of existing hash functions as a component of the authentication process, which in turn is the main component of information protection systems. The main focus is on the development of structures over time, the threats they have faced, and ways to ensure resilience against various types of attacks. A new perspective on the development of hash function construction structures in authentication systems is proposed and a solution is created that can compete with existing standards while being relatively easy to implement. The result of the work can be implemented into existing authentication systems by organizations and government agencies to increase the level of information protection.