Security Design Pattern for Login System through Authentication using Modified Sha-384 Algorithm
نویسندگان
چکیده
The research has been carried out to develop secure login system by authenticating the using modified SHA-384 algorithm. It derives 896-bit hash value for password entered user in registration form and saves credentials system’s database. Results obtained are evaluated resolving general attacks confirmed that algorithm was more secured compared original as it not broken generic such brute force, rainbow table other cracking tools available online Cain Abel. performance of measured with only 2 ms additional execution time from SHA-384.
منابع مشابه
Modified USB Security Token for User Authentication
Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A w...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملThe Distributed Authentication Login Scheme
In distributed system environment, security of system is an important issue whose basis is authentication protocol. Authentication protocol requires a authentication server which will decide login of users, and the server will be the main target of attacks. In this paper, we present a distributed authentication protocol model, whose goals are to avoid one point of attack and to increase availab...
متن کاملAccess to Network Login by Three-Factor Authentication for Effective Information Security.
Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret ke...
متن کاملSecured Login for Gmail Using Pattern Classifier with Voice Recognition
----------------------------------------------------------------------------------------------------------------ABSTRACT Fractal detection and recognition is a unique process for identifying every human being. This concept is more effective interms of authentication into the service. This module permits us to response in building each and every image sets followed by the measure of similarity m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of innovative technology and exploring engineering
سال: 2021
ISSN: ['2278-3075']
DOI: https://doi.org/10.35940/ijitee.h9244.0610821