CFP last date
20 December 2024
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 20 December 2024

Submit your paper
Know more
Reseach Article

JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing

by Prathamesh Churi, Medha Kalelkar, Bhavin Save
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 2
Year of Publication: 2014
Authors: Prathamesh Churi, Medha Kalelkar, Bhavin Save
10.5120/15982-4900

Prathamesh Churi, Medha Kalelkar, Bhavin Save . JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing. International Journal of Computer Applications. 92, 2 ( April 2014), 26-29. DOI=10.5120/15982-4900

@article{ 10.5120/15982-4900,
author = { Prathamesh Churi, Medha Kalelkar, Bhavin Save },
title = { JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 2 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number2/15982-4900/ },
doi = { 10.5120/15982-4900 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:13:15.182800+05:30
%A Prathamesh Churi
%A Medha Kalelkar
%A Bhavin Save
%T JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 2
%P 26-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a new algorithm for improvising password encryption using Jumbling-Salting-Hashing technique. One of the most important password protection issue is to secure encrypted passwords on server's database. In cryptanalysis, a dictionary attack or brute force attack are the most common ways of guessing passwords. In order to augment the security aspect regarding passwords, we are devising JSH algorithm which will be responsible for preventing dictionary or brute force attacks on the passwords. In this algorithm, the jumbling process consists of randomly selecting characters from pre-defined character set and adding them into the plain password; salting comprises of prepending a random string and hashing process is implemented using cryptographic hash function to obtain a fixed length "fingerprint" which is stored in the server's database. As JSH algorithm deals with randomization, the password encryption technique forms a highly secured form of encrypted password which makes it difficult to decrypt reducing the probability of guessing password.

References
  1. Secure password methods(salting and hashing methods) , https://crackstation. net/hashing-security. htm#salt
  2. SHA-1 algorithm implementation details http://tools. ietf. org/html/rfc3174
  3. MD5 algorithm concept and implemenation, http://www. ietf. org/rfc/rfc1321. txt
  4. MD5 Algorithm,http://en. wikipedia. org/wiki/MD5
  5. http://en. wikipedia. org/wiki/SHA-1
  6. http://programmers. stackexchange. com/questions/90211/how-would-i-go-about-changing-encryption-methods-on-existing-passwords
  7. Applied Cryptography-Protocols, Algorithms and Source Code in C , John Wiley Publications.
Index Terms

Computer Science
Information Sciences

Keywords

JSH jumbling salting hashing process array.