Forgot Password: A Double layer Security for Password Protection


Authors : Rakhee M, Sreelakshmi R, Varsha V Menon, Asha Elizabeth Varghese, Alka M Varghese.

Volume/Issue : Volume 2 - 2017, Issue 3 - March

Google Scholar : https://goo.gl/UlgyPO

Scribd : https://goo.gl/C8UJKq

Thomson Reuters ResearcherID : https://goo.gl/3bkzwv

Abstract : There are many new developments in the field of information technology offered to the people, but there are security related issues too that are not tackled well. One of the most important security features to be looked after are the passwords. It is important for all users to have a secure and unpredictable password. Since a cyber-attacker concentrates more on decrypting the password files, the maximum security should be provided and it should be in the highly encrypted form. Hence at the time of an unauthorized login, the original data should be kept hidden. For each user account, the legitimate password is stored as binary data in the password file along with a timestamp inserting special characters at certain positions as per the timestamp. Timestamps like system time are considered for the encrypting of the legitimate password, each time the user logs in. At every login session the encrypted password is updated in the password file in order to create an ambiguity for the cyber attacker and provide more protection to the user’s account.

Keywords : cyber-attacker, encryption, legitimate password, timestamp.

There are many new developments in the field of information technology offered to the people, but there are security related issues too that are not tackled well. One of the most important security features to be looked after are the passwords. It is important for all users to have a secure and unpredictable password. Since a cyber-attacker concentrates more on decrypting the password files, the maximum security should be provided and it should be in the highly encrypted form. Hence at the time of an unauthorized login, the original data should be kept hidden. For each user account, the legitimate password is stored as binary data in the password file along with a timestamp inserting special characters at certain positions as per the timestamp. Timestamps like system time are considered for the encrypting of the legitimate password, each time the user logs in. At every login session the encrypted password is updated in the password file in order to create an ambiguity for the cyber attacker and provide more protection to the user’s account.

Keywords : cyber-attacker, encryption, legitimate password, timestamp.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe