IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Versatile Approach For Creating, Managing And Strengthening Lost Free Password Using Iterative Alignment Algorithm

[Full Text]

 

AUTHOR(S)

Chandra Sekhar Kolli, Suma Mallidi, Sai Kiran M, Chandra Kishore D

 

KEYWORDS

Cryptographic, hash-based algorithm, security, management, password, multiple, complexity, security

 

ABSTRACT

Even after with years of research and availability of many sophisticated authentication methods available, Authentication with passwords are still dominate latest approaches. The main aim of this article is to develop a new algorithm to strengthen password-based authentication approach. Existing methods has a very poor security practices as a result server can be very easily compromised. We have designed and developed a new versatile approach to create, manage and strengthening lost free password algorithm using Iterative Alignment Algorithm.

 

REFERENCES

[1] J. Alex Halderman, Edward W. Felten, Brent Waters. A Convenient Method for Securely Managing Passwords. Princeton University, pages 3-4, 2004.
[2] Y. Alan, J. Jeff, B. Ross, and A. Alasdair. The memorability and security of passwords – some empirical results, pages 13-14, 2000.
[3] Danuvasin Charoen, Password Security, NIDA Business School, National Institute of Development Administration, pages 2-3, 2014.
[4] Shirley Gaw, Edward W.Felten, Department of Computer Science Princeton University Princeton, ,Password Management Strategies for Online Accounts,pages 5-9,2006.
[5] Ian Jermyn, Fabian Monrose, Michael K. Reiter, Alain Mayer and Aviel D. Rubin. The design and analysis of graphical passwords, pages 4-6 ,1999.
[6] Alain Mayer, Ian Jermyn, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin. The design and analysis of graphical passwords. pages 5-10, 1999.
[7] Yehuda Lindell and Rosario Gennaro. A framework for password-based authenticated key exchange. In EUROCRYPT, pages 3-16, 2003.
[8] Scott Standridge, Advisor: Rob Vanden brink. Password Management Applications and Practices pages 2-3, 2016.
[9] David Silver1, Suman Jana1, Eric Chen2, Collin Jackson2, and Dan Boneh1.Password managers Attacks and defences by 1. Stanford University 2. Carnegie Mellon University, pages 3-17, 1998.
[10] Alain J. Yossi Matias and Eran Gabber, Phillip B. Gibbons, Mayer. How to make personalized web browsing simple, secure, and anonymous. In Financial Cryptography, pages 17–32, 1997.
[11] P. Youn and M. Blanchou. Password managers: Exposing passwords everywhere, pages 2-4, 2013.
[12] The government of the Hong Kong special administrative region. Password Management, pages 5-16, 2009.