Enhancement of Password Authentication system is to prevent Security hacker’s Attack
Keywords:
Two-Factor Authentication (2FA), PassphrasesAbstract
we're diving into the exciting world of password authentication systems and how we can make them even stronger to fend off those crafty hackers. Picture this: you've got important data, personal information, or maybe just your favourite cat videos stored online, and you want to make sure no unauthorized folks get their hands on them. That's where a solid password authentication system comes into play. Now, let's get a bit technical without making your head spin. Password authentication is like the gatekeeper of your digital world. It's the lock on your virtual front door, and you want it to be as tough as Fort Knox. But, as technology advances, so do those pesky hackers and their bag of tricks. Ever heard the saying, "Don't put all your eggs in one basket" Well, that's precisely the idea behind MFA. Instead of relying solely on a password, you add an extra layer of security. It could be a fingerprint scan, a one-time code sent to your phone, or even a smart card. It's like having a secret handshake that only you know. You know how some websites require you to have a mix of uppercase and lowercase letters, numbers, and special characters in your password? That's not just to make your life harder. It's to create a tougher nut for hackers to crack. So, when you're setting up a password, embrace the complexity.
References
Boyko, V.; P. MacKenzie; S. Patel (2000). "Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman". Advances in
Cryptology -- Eurocrypt 2000, LNCS. Lecture Notes in Computer Science (Springer-Verlag) 1807: 156. doi:10.1007/3-540-45539-6_12.
ISBN 978-3-540-67517-4.
Abdalla, M.; D. Pointcheval (2005). "Simple Password-Based Encrypted Key Exchange Protocols" (PDF). Topics in Cryptology – CT-RSA 2005. Lecture Notes in Computer Science (Springer Berlin Heidelberg) 3376: 191–208. doi:10.1007/978-3-540-30574-3_14.
ISBN 978-3-540-24399-1.
Bellare, M.; D. Pointcheval; P. Rogaway (2000). "Authenticated Key Exchange Secure against Dictionary Attacks". Advances in Cryptology -- Eurocrypt 2000 LNCS. Lecture Notes in Computer Science (Springer-Verlag) 1807: 139. doi:10.1007/3-540-45539-6_11.
ISBN 978-3-540-67517-4.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.