Open Access Open Access  Restricted Access Subscription Access

PASSWORD ENCRYPTION BASED ON DYNAMIC GRAPH LABELING PRIORITY GENERATION (D.G.L.P.G.) TECHNIQUE

Sanjay Kumar Pal, Nupur Chakraborty

Abstract


The formalization of speedy technical environment due to the progression in hardware technologies is consistently stimulating the terror of brute force attacks and challenging even the strongest encryption algorithms. Within in this scope the password encryption is severely impacted. In this paper we propose a password encryption technique based on the “Dynamic Graph Labeling Priority Generation (D.G.L.P.G.) Technique” and “Dynamic False Node Insertion (D.F.N.I) Technique”. The emerged technique fits itself in the boundary of the present requisition and is flexible enough to expand its magnitude with the amplifying needs up to the boundary mark of the presented algorithm. The conception originated from the proffered algorithm can be applied to develop ultra advance encryption algorithm.

Keywords


encryption; graph labeling; false node; dynamic insertion; priority generation technique

References


Ashwini A. Khatpe, Sheetal T. Patil, Amruta D. More, Dipak V. Waghmare and Ajit S. Shitole, “3D Login For More Secure Authentication”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Issue 2, pp. 2992-3000, February 2014.

Dhatri Raval and Abhilash Shukla, “Security using 3D Password”, International Journal of Computer Applications, Vol. 120, No. 7, pp. 36-38, June 2015.

Ganesh Jairam Rajguru et al, “Secure Authentication with 3D Password”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue 5, pp. 68-75, May 2014.

Mohammed Hussein Ali, “Voiced 3D Password Authentication”, International Institute for Science, Technology and Education, Vol.4, No.6, pp. 87-91, 2014.

Praseeda K Gopinadhan, Renjith P R and Biju Abraham Naremparambil, “Passaction: A New User Authentication Strategy Based on 3D Virtual Environment”, International Journal of Computer Science and Information Technology & Security, Vol. 2, No. 2, pp. 282-285, April 2012.

Shubham Bhardwaj, Varun Gandhi, Varsha Yadav and Lalit Poddar, “New Era of Authentication: 3-D Password”, International Journal of Science, Engineering and Technology Research, Vol. 1, Issue 5, pp. 23-27, Nov. 2012.

Paul Wood et al., “Internet Security Threat Report”, Symantec Co., California, US, Vol. 17, April 2012.

Ian Paul (2015, Feb. 19), Lenovo preinstalls man-in-the-middle adware that hijacks HTTPS traffic on new PCs, PCWORLD [Online] Available:

http://www.pcworld.com/article/2886357/lenovo-preinstalls-man-in-the-middle-adware-that-hijacks-https-traffic-on-new-pcs.html

Chris Hoffman (2013, July 6), Brute- Force Attacks Explained: How All Encryption is Vulnerable [Online] Available: http://www.howtogeek.com/166832/

http://security.stackexchange.com/questions/3959/recommended-of-iterations-when-using-pkbdf2-sha256/3993#3993


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Journal of Computer Science and Cybernetics ISSN: 1813-9663

Published by Vietnam Academy of Science and Technology