Security Design Pattern for Login System through Authentication using Modified Sha-384 Algorithm

نویسندگان

چکیده

The research has been carried out to develop secure login system by authenticating the using modified SHA-384 algorithm. It derives 896-bit hash value for password entered user in registration form and saves credentials system’s database. Results obtained are evaluated resolving general attacks confirmed that algorithm was more secured compared original as it not broken generic such brute force, rainbow table other cracking tools available online Cain Abel. performance of measured with only 2 ms additional execution time from SHA-384.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modified USB Security Token for User Authentication

Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A w...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

The Distributed Authentication Login Scheme

In distributed system environment, security of system is an important issue whose basis is authentication protocol. Authentication protocol requires a authentication server which will decide login of users, and the server will be the main target of attacks. In this paper, we present a distributed authentication protocol model, whose goals are to avoid one point of attack and to increase availab...

متن کامل

Access to Network Login by Three-Factor Authentication for Effective Information Security.

Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret ke...

متن کامل

Secured Login for Gmail Using Pattern Classifier with Voice Recognition

----------------------------------------------------------------------------------------------------------------ABSTRACT Fractal detection and recognition is a unique process for identifying every human being. This concept is more effective interms of authentication into the service. This module permits us to response in building each and every image sets followed by the measure of similarity m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of innovative technology and exploring engineering

سال: 2021

ISSN: ['2278-3075']

DOI: https://doi.org/10.35940/ijitee.h9244.0610821