CFP last date
20 December 2024
Reseach Article

Enhanced Text-Based Graphical Password using Cryptographic Salt and Hash Technique

Published on June 2018 by Preethika S., Velmayil G.
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT2017 - Number 1
June 2018
Authors: Preethika S., Velmayil G.
199d0c10-034d-4765-a86f-1f32faac56cb

Preethika S., Velmayil G. . Enhanced Text-Based Graphical Password using Cryptographic Salt and Hash Technique. International Conference on Communication, Computing and Information Technology. ICCCMIT2017, 1 (June 2018), 25-29.

@article{
author = { Preethika S., Velmayil G. },
title = { Enhanced Text-Based Graphical Password using Cryptographic Salt and Hash Technique },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { June 2018 },
volume = { ICCCMIT2017 },
number = { 1 },
month = { June },
year = { 2018 },
issn = 0975-8887,
pages = { 25-29 },
numpages = 5,
url = { /proceedings/icccmit2017/number1/29480-1726/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication, Computing and Information Technology
%A Preethika S.
%A Velmayil G.
%T Enhanced Text-Based Graphical Password using Cryptographic Salt and Hash Technique
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%V ICCCMIT2017
%N 1
%P 25-29
%D 2018
%I International Journal of Computer Applications
Abstract

Textual password is most typical methodology used for password authentication. The Username and Password authentication is an important part of today's internet application technology that normally controls access to restricted resources. Several authentications methods are bestowed. However users are acquainted with textual password method. Textual passwords are vulnerable to various attacks like eavesdropping, dictionary, SQL injection, brute force, denial of service attacks, shoulder surfing and key loggers. To overcome from these attacks several authentication systems like biometric authentications, token based authentications, graphical based authentications are used. These existing methods are nothighly secure, economical enough and have high failure rate. This paper consolidates the utilization of plain content accreditations that are cryptographically hashed at runtime with text based graphical login accreditations. The objective is to dependably ensure access to a client account not withstanding when such record is under attack while in the meantime guaranteeing helpful and secure login encounter by real clients. This framework approved by utilizing the tools like Microsoft Visual Studio, SQL Server and Mat lab.

References
  1. Diksha G. Kumar , Madhumita Chatterjee, "Detection block model for sql injection attacks", I. J. Computer Network and Information Security, 2014, 11, 56-63.
  2. Kanchan Choudhary, Anuj Kumar Singh, Rashmi Gupta, "A modified scheme for preventing web application against sql injection attack", International Journal of Computer Applications (0975 – 8887) Volume 141 – No. 10, May 2016.
  3. M. Kameswara Rao, Sushma Yalamanchili," Novel shoulder-surfing resistant authentication schemes using text-graphical passwords", International Journal of Information & Network Security (IJINS) Vol. 1, No. 3, August 2012, pp. 163-170 ISSN: 2089-3299.
  4. Manjunath G , Satheesh K , Saranyadevi C,Nithya M," Text-Based Shoulder Surfing Resistant Graphical Password Scheme", International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 2277-2280.
  5. Mary Cindy Ah Kioon, ZhaoShun Wang and Shubra Deb Das, "Security analysis of md5 algorithm in password storage", Atlantis Press, Paris, France, 2013.
  6. Ms. Vidya Vijayan, Ms. Josna P Joy, Mrs. Suchithra M S," A review on password cracking strategies", IJRCCT, 2014.
  7. P. Sriramya and R. A. Karthika, "Providing password security by salted password hashing using bcrypt algorithm", ARPN Journal of Engineering and Applied Sciences, VOL. 10, NO. 13, JULY 2015.
  8. Sangita Roy, Avinash Kumar Singh and Ashok Singh Sairam , "Detecting and defeating SQL injection attacks", International Journal of Information and Electronics Engineering, Vol. 1 , No. 1 , July 2011.
  9. Saurabh Saoji, Swapnali Bhadale, Harshada Wagh, "Textual graphical password scheme against shoulder surfing attack", International Journal of Engineering and Computer Science ISSN: 2319-7242, Volume 4 Issue 3 March 2015, Page No. 10988-10991.
  10. Shaukat Ali, Azhar Rauf, and Huma Javed, "SQLIPA: An authentication mechanism against sql injection", European Journal of Scientific Research, Volume 38, No. 4, 2009.
  11. Sruthy Manmadhan and Manesh, "A method of detecting sql injection attack to secure web applications", International Journal of Distributed and Parallel Systems (IJDPS) Vol. 3, No. 6, November 2012.
  12. Surya Pratap Singh, Upendra Nath Tripathi, Manish Mishra, "Detection and prevention of sql injection attack using hashing technique", IJMCTR, Volume 2, Issue 9, Sep 2014.
  13. T. S. Thangavel and K. S. Rangasamy, " Provable secured hash password authentication", International Journal of Computer Applications (0975 – 8887), 2010, Volume 1 – No. 19.
  14. Tivkaa, M. L. , Choji, D. N. , Agaji, I. , Atsa?am, D. , "An enhanced password-username authentication system using cryptographic hashing and recognition based graphical password", IOSR-JCE, Volume 8, Issue 4, Ver-1, Jul-Aug. 2016.
  15. Yi-Lun Chen, Wei-Chi Ku, Yu-Chang Yeh, and Dun-Min Liao," A Simple text-based shoulder surfing resistant graphical password scheme", IEEE 2nd International Symposium on Next-Generation Electronics (ISNE) - February 25-26, Kaohsiung , Taiwan.
Index Terms

Computer Science
Information Sciences

Keywords

Hashed Password Graphical Password Sql Injection Attacks Cryptographic Salt And Password Protection.