Authors :
Rakhee M, Sreelakshmi R, Varsha V Menon, Asha Elizabeth Varghese, Alka M Varghese.
Volume/Issue :
Volume 2 - 2017, Issue 3 - March
Google Scholar :
https://goo.gl/UlgyPO
Scribd :
https://goo.gl/C8UJKq
Thomson Reuters ResearcherID :
https://goo.gl/3bkzwv
Abstract :
There are many new developments in the field of information technology offered to the people, but there are security related issues too that are not tackled well. One of the most important security features to be looked after are the passwords. It is important for all users to have a secure and unpredictable password. Since a cyber-attacker concentrates more on decrypting the password files, the maximum security should be provided and it should be in the highly encrypted form. Hence at the time of an unauthorized login, the original data should be kept hidden. For each user account, the legitimate password is stored as binary data in the password file along with a timestamp inserting special characters at certain positions as per the timestamp. Timestamps like system time are considered for the encrypting of the legitimate password, each time the user logs in. At every login session the encrypted password is updated in the password file in order to create an ambiguity for the cyber attacker and provide more protection to the user’s account.
Keywords :
cyber-attacker, encryption, legitimate password, timestamp.
There are many new developments in the field of information technology offered to the people, but there are security related issues too that are not tackled well. One of the most important security features to be looked after are the passwords. It is important for all users to have a secure and unpredictable password. Since a cyber-attacker concentrates more on decrypting the password files, the maximum security should be provided and it should be in the highly encrypted form. Hence at the time of an unauthorized login, the original data should be kept hidden. For each user account, the legitimate password is stored as binary data in the password file along with a timestamp inserting special characters at certain positions as per the timestamp. Timestamps like system time are considered for the encrypting of the legitimate password, each time the user logs in. At every login session the encrypted password is updated in the password file in order to create an ambiguity for the cyber attacker and provide more protection to the user’s account.
Keywords :
cyber-attacker, encryption, legitimate password, timestamp.