The Cryptographic Implications of the LinkedIn Data Breach

نویسنده

  • Aditya Gune
چکیده

Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores more secure methods of storing passwords.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

بررسی رابطه بین نقض قرارداد روان‌شناختی با رفتار شهروندی سازمانی و نیت جابجایی با نقش تعدیلی فاصله قدرت

Employees are sensitive to promises offered at the beginning of their employment and if these promises are breached, they react in  different ways. These reactions differ in different cultures. The purpose of this research is to shed some light on the relationship between psychological contract breach and organizational citizenship behavior and turnover intention emphasizing the moderat...

متن کامل

The Relationship between D Type Personality and Self-Compassion with Health Behaviors in Women with Breast Cancer: Moderating Role of Perceived Stress

Cancer remains one of the most important illnesses of the present century and is the second leading cause of death after cardiovascular disease despite significant advances in medical science. The study aimed to investigate the relationship between D type personality and self-compassion with health behaviors in women with breast cancer taking into account the moderating role of perceived stress...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1703.06586  شماره 

صفحات  -

تاریخ انتشار 2017