Open Access Open Access  Restricted Access Subscription or Fee Access

Graphical Password Authentication using Data Encryption Technique – A Review Approach

Bryan A. Liang, Khin Su Myat Moe

Abstract


One of the most important security features used today are passwords. It is important for both you and all your users to have secure, unguessable passwords. To strengthen the password storage, the system uses data encryption technique along with honey encryption. To defeat the DDoS attack, a shopping website is created, in such that the security of passwords provides. A server stores a set of honeywords and passwords from the user during the registration process. Password cracking programs work on a simple idea: they try every word in the dictionary, and then variations on those words, encrypting each one and checking it against your encrypted password. If they get a match they know what your password is.  Artifactory provides a unique solution to this problem by generating encrypted passwords for users based on secret keys stored in Artifactory. You can ensure users' shared passwords are never stored or transmitted as clear text.


Keywords


Data Encryption, IP Address Hacking, DDoS Attack, IP Blocker.

Full Text:

PDF

References


Brindtha J, Hithaeishini K R, and Komala R, "Identification and Detecting of Attacker in a Purchase Portal using Honeywords," Third International Conference on Science Technology Engineering & Management (ICONSTEM), 2017

Prof. Santanu Debnath, Dr. Abir et al., "Brief Review on Journey of Secured Hash Algorithms," International Research Journal of Engineering and Technology (JET), Volume: 02 Issue: 08 | Nov-2017

C.G Thomas and Robin Thomas Jose, "A Comparative Study on Different Hashing Algorithms," International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Special Issue 7, October 2015

Khin Su Myat Moe and Thanda win, "Improved Hashing and Honey-Based Stronger Password Prevention against Brute Force Attack," International Symposium on Electronics and Smart Devices,2017

Himanshu Kumar, Sudhanshu Kumar et al. "Rainbow Table to Crack Password Using MD5 Hashing algorithm", IEEE Conference on Information and Communication Technologies(ICT),2013

Praveen Gauravaram, “Security analysis of salt∥password hashes," International Conference on Advanced Computer Science Applications and Technologies,2012

Vignesh Kannathason, Karan Shivarkar et al., "Providing Security Using Honeywords," Journal of Computer, Internet and Network Security, Volume 2 Issue 1,2017

Kaveri B. Gursal, and Prof. I. R. Shaikh, "Improving Security Using Honey-Word Generation Algorithm," International Journal of Computer & Mathematical Sciences IJCMS, ISSN 2347 – 8527, Volume 6, Issue 7, July 2017

Akshata Chor, Ashwini Gawali et al., "Improving Security Using Honeyword for Online Banking Authentication System," International Journal of advance Engineering and Research Development, Volume 3, Issue 10, October 2016

K. Baby Shalini, R. Rakshitha et al., "HoneyWord Generation to Identify Attacker in Purchase Portal," IJESC, Volume 7, Issue 4, 2017

Vinu V Das, "Honeypot Scheme for Distributed Denial-of-Service Attack," International Conference on Advanced Computer Control, 2009

Hoyul Choi, Hyunjae Nam and Junbeom Hur, "Password Typos Resilience in Honey Encryption," ICOIN, 2017

Baby Shamini P and Jayasree S, "Detection And Avoidance of Attacker Using Honey Words In Purchase Portal," Third International Conference on Science Technology Engineering & Management (ICONSTEM), 2017

Dr.Prashant Kumbharkar, Snehal Aher et al., "A Review on Honey Words "Detecting Password Cracking with Hacker Tracking," International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 10, October 2016

M.ArunPrakash, T.R.Gokul," Network Security-Overcome Password Hacking Through Graphical Password Authentication," Proceedings of the National Conference on Innovations in Emerging Technology, 2011

Amol Bhand, Vaibhav desale, Swati Shirke et al., "Enhancement of Password Authentication System Using Graphical Images," International Conference on Information Processing (ICIP), 2015

Abu Talha Danish, and Labhya Sharma, "Alignment-Based Graphical Password Authentication System," 2016

Hung-Min Sun, Shiuan-Tung Chen et al., "A Shoulder Surfing Resistant Graphical Authentication System," 2016

R. Sudha, and M. Shanmuganathan, “An Improved Graphical Authentication System to Resist the Shoulder Surfing Attack," International Conference on Technical Advancements in Computers and Communications, 2017

Mrs.Vasundhara R.Pagar and Mrs.Rohini G.Pise, “Strengthening Password Security through Honeyword and HoneyEncryption Technique," International Conference on Trends in Electronics and Informatics ICEI, 2017


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.