Vulnerability of data security using MD5 function in php database design

  • Neyole Misiko Jacob Collage of Human Resource
Keywords: Md5 algorithms, Database design, DBMs

Abstract

Database integrity and security are vital measures in database development. Database designers in this respect have a number of approaches to secure data during database design and development. Some of the approaches include the use of the HASH functions such as the MD5 to encrypt database passwords. But with this comes technological challenges of attacks and vulnerability. Current new technologies such as the use of the haskillers and descriptor’s. This paper brings to light the challenges faced in using MD5 by database designers a give alternatives to secure data during database design

Author Biography

Neyole Misiko Jacob, Collage of Human Resource

Development Collage of Human Resource 

University of Agriculture and Technology

Published
2015-05-31
How to Cite
[1]
N. Jacob, “Vulnerability of data security using MD5 function in php database design”, EPH - International Journal of Science And Engineering (ISSN: 2454 - 2016), vol. 1, no. 1, pp. 11-15, May 2015.