Logo PTI
Polish Information Processing Society
Logo RICE

Annals of Computer Science and Information Systems, Volume 10

Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering

Password Security Mechanisms: Comparitive Study

,

DOI: http://dx.doi.org/10.15439/2017R67

Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 279282 ()

Full text

Abstract. Nowadays online communication is increasing rapidly, password is provided as a key for communication henceforth there is a strong need to authenticate the online communication. But currently security breach occurs by stealing the password files through various ways of cyber attacks. Different technologies are available to safeguard password. The purpose of this paper is to evaluate various techniques for protection of password like graphical password, text password enhanced by Honeyword, Jumbling and salting approach.

References

  1. Manisha Jagannath Bhole, “ Honeywords: A New Approach For Enhancing Security,” International Research Journal of Engineering and Technology (IRJET) , Volume: 02 Issue: 08 | Nov-2015J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
  2. Prathamesh P. Churi, Vaishali Ghate, Kranti Ghag “Jumbling- Salting: An Improvised Approach for Password Encryption”; International Conference on Science and Technology 2015, RMUTT.
  3. Seema Kharod, Nidhi Sharma, Alok Sharma ,”An Improved Hashing Based Password Security Scheme Using Salting and Differential Masking”, 978-1-4673-7231-2/15/$31.00 ©2015 IEEE.
  4. Vikas K. Kolekar, Milindkumar B. Vaidya,” Click and Session Based—Captcha as Graphic Password Authentication Schemes for Smart Phone and Web” 2015 International Conference on Information Processing (ICIP) Vishwakarma Institute of Technology. Dec 16-19, 2015
  5. A. Juels and R. L. Rivest, “Honeywords: Making Passwordcracking Detectable,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS ’13. New York, NY, USA: ACM, 2013, pp. 145–160.[Online].Available: http://doi.acm.org/10.1145/2508859.2516671.
  6. Imran Erguler, “Achieving Flatness: Selecting the Honeywords from Existing User Passwords”, IEEE Transactions on Dependable and Secure Computing, Vol. 13, No. 2, March/April 2016
  7. Nilesh Chakraborty, Samrat Mondal,“Towards Improving Storage Cost and Security Features of Honeyword Based Approaches”, 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6-8 September 2016, Cochin, India
  8. Prathamesh P. Churi, Medha Kalekar, Bhavin Save “JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing”; International Journal of Computer Applications(0975 – 8887) Volume 92 – No.2, April 2014