password protection
Recently Published Documents


TOTAL DOCUMENTS

60
(FIVE YEARS 1)

H-INDEX

4
(FIVE YEARS 0)

2020 ◽  
pp. 2-5
Author(s):  
Sudarshan Pattabiraman ◽  
Nisha Soms ◽  
Poovanan A

In today‘s world, stealing of a password hash file and cracking the hash passwords has become very easy for an adversary. Due to this, every individual‘s account is under a rigorous threat of being hacked which is occurring in a swift rate. As cyber security threats are boomingly increasing, there is a need to create to adopt a new method for protecting our credentials. Hence if a password-file breach takes place, Juels and Rivest pioneered a notion of distraction passwords known as “Honeywords”. In this technique, a number of fake passwords are generated for every user account. In this way, the hashed password database will comprise of real and fake passwords. In case the password file is broken by an adversary it becomes difficult for him to identify the collection of real passwords. If the intruder attempts any of the honeywords other than the actual password, the Honeyword model intimates about the password file attack with an alarm as a warning. Hence, it becomes a huge risk for an adversary to get detected. This paper proposes a decoy mechanism for securing the data from malicious users and tracing the IP address of the detected user to act against the felony.


2020 ◽  
Vol 10 (5) ◽  
pp. 713-720
Author(s):  
Bathula Prasanna Kumar ◽  
Edara Srinivasa Reddy

Passwords tend to be one of the most popular approaches to protect operating systems and user’s data also. Most businesses rely on password protection schemes, and secure passwords are incredibly necessary to them. The proposed model typically aims to impose protection by forcing users to obey protocols to build passwords. For user protection, password has become a prevailing method in terms of exposure to scarce tools. The main problem with password is its consistency or power, i.e. how simple (or how difficult) a third person can be "assumed" to enter the tool that you use while claiming to be you. In operating systems, text-based passwords remain the primary form of authentication, following major improvements in attackers' skills in breaking passwords. The proposed Random Character Utilization with Hashing (RCUH) is used for generation of new passwords by considering user parameters. The proposed model introduces a new framework to design a password by considering nearly 10 parameters from the user and also analyze the time for cracking the generated password to provide the system strength. The proposed model aims to generate an efficient security model for password generation by considering several secret parameters from the user. To break a set of consistency passwords, analysis is also performed on time for password cracking. The tests show a close positive correlation between guessing complexity and password consistency. The proposed model is compared with the traditional password generation and cracking models. The proposed model takes much time in cracking the password that improves the systems security.


Author(s):  
Dr. D. Hema Latha ◽  
Azmath Mubeen ◽  
Dr. D. Rama Krishna Reddy

Secure secret password storage is an essential perspective in frameworks dependent on secret phrase Substantiation method, which is as yet the most broadly utilized Substantiation confirmation procedure, in spite of its some security imperfections. In this paper, a secret key Substantiation architecture structure is implemented that is intended for secure secret password storage and could be effectively incorporated into existing authentication frameworks. In this framework first the plain password which is received from the customer is given to cryptographic hash component for SHA-256 cryptographic process. After this, the hashed secret password is changed over into a negative secret password phrase. At last, the negative password is encoded/encrypted into an Encrypted Negative Password (ENP) utilizing a symmetric-key computation using for example, AES, and additionally to improve security, multi-repeated encryption could be utilized. The cryptographic hash function and symmetric encryption make it hard to break passwords from ENPs. Also, it provides lots of comparing ENPs for a given plain password, which makes pre-calculation intrusions (e.g., and rainbow table intrusion and query table attacks) infeasible. The complex calculations and comparisons of the algorithm provide good resistance towards intrusions and also provide stronger password protection. The proposed and implemented mechanism for Password Substantiation with Negative Password Encryption is a good secured password protection mechanism that merges cryptographic hash function, the negative password and the symmetric-key algorithm, without the requirement for extra data from the plain password.


2020 ◽  
Vol 2020 (3) ◽  
pp. 59-68
Author(s):  
A. Metelkov

There is an ongoing debate among users and specialists about the effectiveness of passwords used to authenticate subjects of access to information systems. The relevance of choosing the topic of the article is explained by the use of passwords in almost any information system, and in many systems password protection is used as the only means. At the same time, the password's resistance to opening often determines the security of the entire information system. Domestic and foreign modern approaches to password policy formation are analyzed and generalized. On this basis, proposals have been developed to improve the protection of information using passwords.


Author(s):  
Juhika Girhe ◽  
Shubhangi Thaware ◽  
Bhushan Patil ◽  
Anand Sahani ◽  
Palash Kumbhare ◽  
...  

Technology is a never-ending process. To be able to design a product using the current technology that will be beneficial to the lives of others is a huge contribution to the community. This project presents the design and implementation of a low cost but flexible and secure cell phone based home automation system. The design is based on a standalone Arduino BT board and the home appliances are connected to the input/ output ports of this board via relays. The communication between the cell phone and the Arduino BT board is wireless. This project is designed to be low cost and scalable allowing variety of devices to be controlled with minimum changes to its core. Password protection is being used to only allow authorized users from accessing the appliances at home remotely.


In recent surveys, the electrical accidents to the linemen are increasing year by year due to the improper communication between the electrical staff and the substation. These faults occur during maintenance and there is no proper coordination between the people to people. This paper deals about this issue and the solution brought out to reduce electrical accidents due to these communication failures. In our day to life, the applications of embedded systems are used in everywhere and it is cost effective and better accuracy and precise of results will get. Currently, the research is going on the basis of embedded systems which includes microcontroller plays a vital role. Recent technology like Arduino based system is used by implementing the password protection in circuit breaker. Password is entered by the specific person and there is a provision of password changing system. Arduino UNO is used to control the signal in the relay module and the matrix keyboard is introduced to enter the input and LCD display is used to display the output and the ON/OFF switches provided as the loads through the Relay switch. By using this system, accidents can be prevented and valuable human lives can be saved.


In general, every web or android based application required security for login. So for that we have to encrypt the password while signup itself,these encrypting the password there are many algorithm but by trail and error method or by using some attacks(man in middle attack etc..,) we can know the password, so in order to reduce attacks we came up with new algorithm to protect the password. Even after getting the password where many of the applications like banking , messaging application uses OTP process. These OTP could also be stolen easily (although it is difficult to do so) but still. So to over come this we came up with modified OTP process that decreases the time and it will be difficult to stole. So here we first we will encrypt the password using algorithm ACR and when user want lo login we go with the modified OTP process.


Sign in / Sign up

Export Citation Format

Share Document