Open Access Open Access  Restricted Access Subscription Access

Enhanced Authentication Mechanism using Negative Password: An Approach for Intrusion Detection

Shiva Kumar G V, Dr Devananda S N, Suhas G K

Abstract


Password protection schemes (such as hash passwords, salt passwords, key expansion) cannot resist lookup table or dictionary attacks.. Secure secret key stockpiling might be a crucial perspective in frameworks upheld secret phrase confirmation, which stays the chief generally utilized verification strategy, regardless of some security flaws. The aim of this research paper is twofold: first, to improve security in authentication mechanism by passing the received password from source node to hash function and convert it into ENP. Second to perform repeated operation of encryption to further improve security using ENP passwords.

Full Text:

PDF

References


Ah Kioon, M. C., Wang, Z. S., & Deb Das, S. (2013). Security analysis of MD5 algorithm in password storage. In Applied Mechanics and Materials 347. 2706-2711p. Trans Tech Publications Ltd.

Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014, June). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In International conference on human aspects of information security, privacy, and trust. 115-126p. Springer, Cham.

Boonkrong, S., & Somboonpattanakit, C. (2016). Dynamic salt generation and placement for secure password storing. IAENG International Journal of Computer Science, 43(1), 27-36p.

Kelsey, J., Schneier, B., Hall, C., & Wagner, D. (1997, September). Secure applications of low-entropy keys. In International Workshop on Information Security .121-134p. Springer, Berlin, Heidelberg.

Van Oorschot, P. C., & Wiener, M. J. (1996, May). On Diffie-Hellman key agreement with short exponents. In International Conference on the Theory and Applications of Cryptographic Techniques.332-343p. Springer, Berlin, Heidelberg.

Shay, R., Komanduri, S., Durity, A. L., Huh, P., Mazurek, M. L., Segreti, S. M., ... & Cranor, L. F. (2016). Designing password policies for strength and usability. ACM Transactions on Information and System Security (TISSEC), 18(4), 1-34.

Multi Factor Authentication [Online]

https://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA

Global Information Assurance Certification Paper: Dec. 15, 2012. [Online]. https://www.giac.org/paper/gsec/594/authentication-mechanisms-best/101431

Wang, D., He, D., Cheng, H., & Wang, P. (2016, June). fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 595-606). IEEE.

Sun, H. M., Chen, Y. H., & Lin, Y. H. (2011). oPass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE Transactions on Information Forensics and Security, 7(2), 651-663.


Refbacks

  • There are currently no refbacks.