Vulnerability of data security using MD5 function in php database design
Database integrity and security are vital measures in database development. Database designers in this respect have a number of approaches to secure data during database design and development. Some of the approaches include the use of the HASH functions such as the MD5 to encrypt database passwords. But with this comes technological challenges of attacks and vulnerability. Current new technologies such as the use of the haskillers and descriptor’s. This paper brings to light the challenges faced in using MD5 by database designers a give alternatives to secure data during database design
- All contributor(s) agree to transfer the copyright of this article to EPH Journal.
- EPH Journal will have all the rights to distribute, share, sell, modify this research article with proper reference of the contributors.
- EPH Journal will have the right to edit or completely remove the published article on any misconduct happening.