PASSWORD ENCRYPTION BASED ON DYNAMIC GRAPH LABELING PRIORITY GENERATION (D.G.L.P.G.) TECHNIQUE
Author affiliations
DOI:
https://doi.org/10.15625/1813-9663/32/4/8744Keywords:
encryption, graph labeling, false node, dynamic insertion, priority generation techniqueAbstract
The formalization of speedy technical environment due to the progression in hardware technologies is consistently stimulating the terror of brute force attacks and challenging even the strongest encryption algorithms. Within in this scope the password encryption is severely impacted. In this paper we propose a password encryption technique based on the “Dynamic Graph Labeling Priority Generation (D.G.L.P.G.) Technique” and “Dynamic False Node Insertion (D.F.N.I) Technique”. The emerged technique fits itself in the boundary of the present requisition and is flexible enough to expand its magnitude with the amplifying needs up to the boundary mark of the presented algorithm. The conception originated from the proffered algorithm can be applied to develop ultra advance encryption algorithm.Metrics
References
Ashwini A. Khatpe, Sheetal T. Patil, Amruta D. More, Dipak V. Waghmare and Ajit S. Shitole, “3D Login For More Secure Authentication”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Issue 2, pp. 2992-3000, February 2014.
Dhatri Raval and Abhilash Shukla, “Security using 3D Password”, International Journal of Computer Applications, Vol. 120, No. 7, pp. 36-38, June 2015.
Ganesh Jairam Rajguru et al, “Secure Authentication with 3D Password”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue 5, pp. 68-75, May 2014.
Mohammed Hussein Ali, “Voiced 3D Password Authentication”, International Institute for Science, Technology and Education, Vol.4, No.6, pp. 87-91, 2014.
Praseeda K Gopinadhan, Renjith P R and Biju Abraham Naremparambil, “Passaction: A New User Authentication Strategy Based on 3D Virtual Environment”, International Journal of Computer Science and Information Technology & Security, Vol. 2, No. 2, pp. 282-285, April 2012.
Shubham Bhardwaj, Varun Gandhi, Varsha Yadav and Lalit Poddar, “New Era of Authentication: 3-D Password”, International Journal of Science, Engineering and Technology Research, Vol. 1, Issue 5, pp. 23-27, Nov. 2012.
Paul Wood et al., “Internet Security Threat Report”, Symantec Co., California, US, Vol. 17, April 2012.
Ian Paul (2015, Feb. 19), Lenovo preinstalls man-in-the-middle adware that hijacks HTTPS traffic on new PCs, PCWORLD [Online] Available:
Chris Hoffman (2013, July 6), Brute- Force Attacks Explained: How All Encryption is Vulnerable [Online] Available: http://www.howtogeek.com/166832/
Downloads
Published
How to Cite
Issue
Section
License
1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.