PASSWORD ENCRYPTION BASED ON DYNAMIC GRAPH LABELING PRIORITY GENERATION (D.G.L.P.G.) TECHNIQUE

Sanjay Kumar Pal, Nupur Chakraborty
Author affiliations

Authors

  • Sanjay Kumar Pal NSHM College of Management and Technology 124 B. L. Saha Road Kolkata - 700053 WB, INDIA
  • Nupur Chakraborty NSHM College of Management and Technology, Kolkata

DOI:

https://doi.org/10.15625/1813-9663/32/4/8744

Keywords:

encryption, graph labeling, false node, dynamic insertion, priority generation technique

Abstract

The formalization of speedy technical environment due to the progression in hardware technologies is consistently stimulating the terror of brute force attacks and challenging even the strongest encryption algorithms. Within in this scope the password encryption is severely impacted. In this paper we propose a password encryption technique based on the “Dynamic Graph Labeling Priority Generation (D.G.L.P.G.) Technique” and “Dynamic False Node Insertion (D.F.N.I) Technique”. The emerged technique fits itself in the boundary of the present requisition and is flexible enough to expand its magnitude with the amplifying needs up to the boundary mark of the presented algorithm. The conception originated from the proffered algorithm can be applied to develop ultra advance encryption algorithm.

Metrics

Metrics Loading ...

References

Ashwini A. Khatpe, Sheetal T. Patil, Amruta D. More, Dipak V. Waghmare and Ajit S. Shitole, “3D Login For More Secure Authentication”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Issue 2, pp. 2992-3000, February 2014.

Dhatri Raval and Abhilash Shukla, “Security using 3D Password”, International Journal of Computer Applications, Vol. 120, No. 7, pp. 36-38, June 2015.

Ganesh Jairam Rajguru et al, “Secure Authentication with 3D Password”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue 5, pp. 68-75, May 2014.

Mohammed Hussein Ali, “Voiced 3D Password Authentication”, International Institute for Science, Technology and Education, Vol.4, No.6, pp. 87-91, 2014.

Praseeda K Gopinadhan, Renjith P R and Biju Abraham Naremparambil, “Passaction: A New User Authentication Strategy Based on 3D Virtual Environment”, International Journal of Computer Science and Information Technology & Security, Vol. 2, No. 2, pp. 282-285, April 2012.

Shubham Bhardwaj, Varun Gandhi, Varsha Yadav and Lalit Poddar, “New Era of Authentication: 3-D Password”, International Journal of Science, Engineering and Technology Research, Vol. 1, Issue 5, pp. 23-27, Nov. 2012.

Paul Wood et al., “Internet Security Threat Report”, Symantec Co., California, US, Vol. 17, April 2012.

Ian Paul (2015, Feb. 19), Lenovo preinstalls man-in-the-middle adware that hijacks HTTPS traffic on new PCs, PCWORLD [Online] Available:

http://www.pcworld.com/article/2886357/lenovo-preinstalls-man-in-the-middle-adware-that-hijacks-https-traffic-on-new-pcs.html http://www.pcworld.com/article/2886357/lenovo-preinstalls-man-in-the-middle-adware-that-hijacks-https-traffic-on-new-pcs.html">

Chris Hoffman (2013, July 6), Brute- Force Attacks Explained: How All Encryption is Vulnerable [Online] Available: http://www.howtogeek.com/166832/ http://www.howtogeek.com/166832/">

http://security.stackexchange.com/questions/3959/recommended-of-iterations-when-using-pkbdf2-sha256/3993#3993 http://security.stackexchange.com/questions/3959/recommended-of-iterations-when-using-pkbdf2-sha256/3993#3993">

Downloads

Published

21-08-2017

How to Cite

[1]
S. K. Pal and N. Chakraborty, “PASSWORD ENCRYPTION BASED ON DYNAMIC GRAPH LABELING PRIORITY GENERATION (D.G.L.P.G.) TECHNIQUE”, JCC, vol. 32, no. 4, p. 303–318, Aug. 2017.

Issue

Section

Computer Science