Open Access Open Access  Restricted Access Subscription Access

Enhanced Authentication Mechanism with Negative Password: An Approach for Intrusion Detection

Shivam Kumar

Abstract


Secret key insurance plans (like hash passwords, salt passwords, key development) can't avoid query table or word reference assaults. Secure mystery key storing may be an essential point of view in systems maintained secret expression affirmation, which remains the boss commonly, used confirmation procedure, no matter what some security flaws. The point of this exploration paper is twofold: first, by passing the received password from the source node to the hash function and converting it into ENP, the authentication mechanism's security will be improved. Second to perform rehashed activity of encryption to additionally further develop security utilizing ENP passwords.

 


Full Text:

PDF

References


Ah Kioon, M. C., Wang, Z. S., & Deb Das, S. (2013). Security analysis of MD5 algorithm in password storage. In Applied Mechanics and Materials 347. 2706-2711p. Trans Tech Publications Ltd.

Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014, June). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In International conference on human aspects of information security, privacy, and trust. 115-126p. Springer, Cham.

Boonkrong, S., & Somboonpattanakit, C. (2016). Dynamic salt generation and placement for secure password storing. IAENG International Journal of Computer Science, 43(1), 27-36p.

Kelsey, J., Schneier, B., Hall, C., & Wagner, D. (1997, September). Secure applications of low-entropy keys. In International Workshop on Information Security .121-134p. Springer, Berlin, Heidelberg.

Van Oorschot, P. C., & Wiener, M. J. (1996, May). On Diffie-Hellman key agreement with short exponents. In International Conference on the Theory and Applications of Cryptographic Techniques.332-343p. Springer, Berlin, Heidelberg.

Shay, R., Komanduri, S., Durity, A. L., Huh, P., Mazurek, M. L., Segreti, S. M., ... & Cranor, L. F. (2016). Designing password policies for strength and usability. ACM Transactions on Information and System Security (TISSEC), 18(4), 1- 34.

Wang, D., He, D., Cheng, H., & Wang, P. (2016, June). fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 595-606). IEEE.

Sun, H. M., Chen, Y. H., & Lin, Y. H. (2011). oPass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE Transactions on Information Forensics and Security, 7(2), 651-663.

Zviran, M., & Haga, W. J. (1999). Password security: an empirical study. Journal of Management Information Systems, 15(4), 161-185.

Gokhale, M. A. S., & Waghmare, V.S. (2016). The shoulder surfing resistant graphical password authentication technique. Procedia Computer Science, 79, 490-498.


Refbacks

  • There are currently no refbacks.