CFP last date
20 December 2024
Reseach Article

Modeling Implementation of TESA - Three Step Encryption Algorithm for enhancing Password Security

by Rimmy Chuchra, R.K. Seth
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 13
Year of Publication: 2015
Authors: Rimmy Chuchra, R.K. Seth
10.5120/ijca2015905879

Rimmy Chuchra, R.K. Seth . Modeling Implementation of TESA - Three Step Encryption Algorithm for enhancing Password Security. International Journal of Computer Applications. 126, 13 ( September 2015), 1-6. DOI=10.5120/ijca2015905879

@article{ 10.5120/ijca2015905879,
author = { Rimmy Chuchra, R.K. Seth },
title = { Modeling Implementation of TESA - Three Step Encryption Algorithm for enhancing Password Security },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 13 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number13/22609-2015905879/ },
doi = { 10.5120/ijca2015905879 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:17:20.014847+05:30
%A Rimmy Chuchra
%A R.K. Seth
%T Modeling Implementation of TESA - Three Step Encryption Algorithm for enhancing Password Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 13
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is an art of secret writing that provide protection from unauthorized access. This paper discusses about the several databases attacks and proposes a new methodology for enhancing password security during Sign-In of account. This designed methodology is termed as “three step encryption algorithm (TSEA)” whose function is to provide a high level of security on the time of accessing account. The complete working of this designed methodology is based on automatic hash address generation. The main focus of this paper is to improve the overall quality of service for right person at a right time in a procedural manner.

References
  1. Harivan Partap Singh, Shweta Verma, Shailendra Mishra, feb 2013. Secure Data Encryption Algorithm”, International journal of advanced research in electrical electronics and instrumentation Engg.
  2. Debajit Sensarma,Samar Sen Sarina, March 2014,GMDES-A Graph based modified data encryption Standard(DES) Algorithm with Enhanced Security ,International journal of research in engg and technology.
  3. National Institute of Standards, 1977, FIPS 47: DES, US.
  4. Amit Keswani & Vaishnava Khadilkar, The SHA-1 Algorithm, USA.
  5. Rinki Pakshwar,Vijay Kumar Trivedi,Vineet Richhariya, 2013. A Survey on Different Image encryption & Decryption Techniques, International Journal of Computer Science and Information Technology.
  6. Juin-In Guo,Jui-Cheng Yen,2000. A New Mirror Like Image Decryption Algorithm &bits VLSI Architecture pattern recognition and image analysis, International Journal of Computer Science and Information Technology.
  7. Aloha Sinha and, Kehar Singh, A Technique for image encryption using Digital Signature, Optics Communications.
  8. S.S Mani Ccam, N.O Bourbackis, 2001. Lossless Image Compression & Encryption Algorithm Using SCAN, Pattern Recognition.
  9. Rajinder KAUR,Er.Kawalprit,March-April 2014,Image Encryption Technique: A Selected Review ,IOSR Journal of Computer Engg(IOSR-JCE).
  10. Abinav Srivastva,2012. A Survey Report on Different Techniques of Image Encryption, International Journal of emerging Technology & Advanced Engg.
  11. Ephin M, Judy Ann Joy and N.A Vasanthi, 2013, Survey of chasos based image encryption & decryption technique, International Journal of Computer Applications, Proceedings on Amrita International Conference of women in computing.
  12. Sukalyan Som,Sayani Sen,2013.A Non-Adaptive partial encryption of Crrayscale Images base on Chaos ,First international conference on computational Intelligence: Modeling Techniques & Applications(CIMA),ELSEVIER.
  13. Sonam Pathak and RACHNA Kamble,july-2013.A Review: Chaotic System with DES Image Encryption Technique, International Journal of Advanced Research, IT Bhopal.
  14. P.Radhadevi, P.Kalpna,oct-2012. Secure Image Encryption Using AES, International Journal of research in Engg. And Technology.
  15. Nan Lin, Xiaofeng Guo, Ping Xu and Yuqin Wang, 2013. A New Multi-Chaos based Image Encryption Algorithm, Intelligence Computation & Evolutionary Computation Advances in Intelligent Systems & Computing.
  16. Mohammad Sajid , Proff. S.T Bodka and Qamurddin Khizari,june-july-2013. Image encryption using different techniques for high security Transmission over a Network, International Journal of engg research & General Science.
  17. Shruthi K.S, G.Padmaja Devi and P.C Srikanth, Aug-2014.Secured Text and Image Encryption based on session, International Journal of industrial Electronics and Electrical Engg.
  18. Abbas Cheddad,Joan Condell, Kevin Curran and Paul Mukevitt,March-2010. A Hah based image encryption algorithm, Optics Communications-ELSEVIER.
  19. Nitin .N,Ankumar M.Bangale,G.P hedge,oct-2012. Image encryption based on FEAL Algorithm , International Journal of advances in computer science & Technology.
  20. Chengqing li, Guanrong Chen, On the security of a class of image encryption schemes, SAR,China.
  21. Hacker's Choice: Top Six Database Attacks: http://www.darkreading.com/risk/hackers-choice-top-six-database-attacks/d/d-id/1129481?
  22. Special Issue on the data mining for information security2013. ELSEVIER-Information sciences.
  23. Images for insider threat: https://goo.gl/ojpp9P
  24. Images for insider threat: https://goo.gl/9aTlKy
  25. Images for denial of service: https://goo.gl/IwL9fU
  26. Images for Trojan horse: https://goo.gl/NIcSvk
  27. Images for Trojan horse: https://goo.gl/FCbuBp
  28. M.M Chaturvedi & Preeti Aggarwal, Oct-2013. Application of data mining techniques for information security in a cloud: A Survey, International journal of computer application.
Index Terms

Computer Science
Information Sciences

Keywords

Hash Code Text Encryption encryption algorithm Image Encryption Security Databases Attacks.