Sanjay Kumar Pal, Nupur Chakraborty


The formalization of speedy technical environment due to the progression in hardware technologies is consistently stimulating the terror of brute force attacks and challenging even the strongest encryption algorithms. Within in this scope the password encryption is severely impacted. In this paper we propose a password encryption technique based on the “Dynamic Graph Labeling Priority Generation (D.G.L.P.G.) Technique” and “Dynamic False Node Insertion (D.F.N.I) Technique”. The emerged technique fits itself in the boundary of the present requisition and is flexible enough to expand its magnitude with the amplifying needs up to the boundary mark of the presented algorithm. The conception originated from the proffered algorithm can be applied to develop ultra advance encryption algorithm.


encryption; graph labeling; false node; dynamic insertion; priority generation technique

Full Text:



Ashwini A. Khatpe, Sheetal T. Patil, Amruta D. More, Dipak V. Waghmare and Ajit S. Shitole, “3D Login For More Secure Authentication”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Issue 2, pp. 2992-3000, February 2014.

Dhatri Raval and Abhilash Shukla, “Security using 3D Password”, International Journal of Computer Applications, Vol. 120, No. 7, pp. 36-38, June 2015.

Ganesh Jairam Rajguru et al, “Secure Authentication with 3D Password”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue 5, pp. 68-75, May 2014.

Mohammed Hussein Ali, “Voiced 3D Password Authentication”, International Institute for Science, Technology and Education, Vol.4, No.6, pp. 87-91, 2014.

Praseeda K Gopinadhan, Renjith P R and Biju Abraham Naremparambil, “Passaction: A New User Authentication Strategy Based on 3D Virtual Environment”, International Journal of Computer Science and Information Technology & Security, Vol. 2, No. 2, pp. 282-285, April 2012.

Shubham Bhardwaj, Varun Gandhi, Varsha Yadav and Lalit Poddar, “New Era of Authentication: 3-D Password”, International Journal of Science, Engineering and Technology Research, Vol. 1, Issue 5, pp. 23-27, Nov. 2012.

Paul Wood et al., “Internet Security Threat Report”, Symantec Co., California, US, Vol. 17, April 2012.

Ian Paul (2015, Feb. 19), Lenovo preinstalls man-in-the-middle adware that hijacks HTTPS traffic on new PCs, PCWORLD [Online] Available:

Chris Hoffman (2013, July 6), Brute- Force Attacks Explained: How All Encryption is Vulnerable [Online] Available:


Journal of Computer Science and Cybernetics ISSN: 1813-9663

Published by Vietnam Academy of Science and Technology