SECURED PASSWORD USING HONEYWORD ENCRYPTION

被引:0
|
作者
Shinde, Prashant D. [1 ]
Patil, Suhas H. [1 ]
机构
[1] Bharati Vidyapeeth, Dept Comp Engn, Coll Engn, Pune, Maharashtra, India
关键词
Authentication; honeypots; honeywords; login passwords; password cracking; Seed;
D O I
暂无
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
Background: The attacks on the database of security systems are often due to the advancement in the technology. Many users have a habit to keep the same password for multiple sites. So the leaked dataset will be vulnerable to such attacks. Methods: The new secret word is the blend of existing client passwords called nectar words. The counterfeit secret key is only the honeywords fundamentally. For every set of username and password, a set of relevant sweet word is developed in such a way that it's only valid component is the right catchphrase, however, rest of component of the dataset are honeywords. Eventually, when an intruder or hacker tries to gain access to the framework with a honeyword, a trigger is activated to inform the manager about spillage of secret key and dataset. Results: Honeywords to identify assaults against a hash secret key database. For every client account, the real watchword put away in the type of honeywords. On the off chance that aggressor Attack on secret word i.e. honeys words it can't make sure it is genuine secret key or honeyword. Conclusion: In this examination, we analyzed in detail with watchful consideration the honeyword system and present some remark to center around utilized frail focuses.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [21] Password-based encryption analyzed
    Abadi, M
    Warinschi, B
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 664 - 676
  • [22] Password secured sites - Stepping forward with keystroke dynamics
    de Magalhaes, ST
    Revett, K
    Santos, HMD
    [J]. International Conference on Next Generation Web Services Practices, 2005, : 293 - 298
  • [23] Password Authentication with Secured Login Interface at Application Layer
    Agrawal, Vivek Kumar
    Bharti, R. K.
    Parihar, Bhawana
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 82 - 85
  • [24] Password Typos Resilience in Honey Encryption
    Choi, Hoyul
    Nam, Hyunjae
    Hur, Junbeom
    [J]. 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 593 - 598
  • [25] A study on secured encryption of medical images using significant visual cryptography
    Vijayalaxmi, H. M.
    Rao, Arjun Sunil
    Khan, A. M.
    Kotyan, Deeksha
    Disha, D.
    Pratheeksha, R.
    Rao, Chinmayee
    [J]. ENGINEERING RESEARCH EXPRESS, 2024, 6 (02):
  • [26] Speech encryption using chaotic shift keying for secured speech communication
    P. Sathiyamurthi
    S. Ramakrishnan
    [J]. EURASIP Journal on Audio, Speech, and Music Processing, 2017
  • [27] A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos
    Kamran, Muhammad Islam
    Khan, Muazzam A.
    Alsuhibany, Suliman A.
    Ghadi, Yazeed Yasin
    Arshad
    Arif, Jameel
    Ahmad, Jawad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 657 - 672
  • [28] Reducing packet loss in CBC secured VoIP using interleaved encryption
    Dansereau, R. M.
    Jin, S.
    Goubran, R. A.
    [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1406 - +
  • [29] Speech encryption using chaotic shift keying for secured speech communication
    Sathiyamurthi, P.
    Ramakrishnan, S.
    [J]. EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2017,
  • [30] Secured Privacy Data using Multi Key Encryption in Cloud Storage
    Reddy, Muthi P.
    Manjula, S. H.
    Venugopal, K. R.
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,