Analysis of Security Schemes
Keywords:
Login, authentication, hashing, password security
Abstract
In todays scenario, internet is used daily for communication as well as data sharing which increase the chance of licking of personal information. This security is normally provided by some authentication process. Password security is a major issue for any authenticating process and different researches in past have proposed different techniques which we will analyze in present paper.
References
Emin Islam Tatli, Cracking More Password Hashes With Patterns, Department of Electrical and Electronics Engineering, Istanbul Medipol University, (2014).
D.Mirante and C.Justin, Understanding Password Database Compromises, Department of Computer Science & Engineering Polytechnic Inst. of NYU, Tech. Rep., (2013).
A.Vance, If Your Password is 123456, Just Make IT Hackme, The New York Times, 20(2010).
N.F.Johnson and S.Jajodia, Exploring Steganography: Seeing the Unseen, http://www.jjtc.com/pub/r2026.pdf
N.F.Johnson and S.Jajodia, Steganalysis: The Investigation of Hidden Information, IEEE Information Technology Conference, (1998).
Stackoverflow,http://stackoverflow.com/questions/244903/why-is-a-password-salt-called-a-salt.
J.Kelley, Terror groups hide behind Web encryption”, USA TODAY, 06(19)(2001), 50-55.
T.Li Gong, Mark A.Lomas, Roger M.Needham and Jerome H.Saltzer, Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, 11(5)(1993), 648-656.
Blake Ross, Collin Jackson, Nicholas Miyake, Dan Boneh and John C.Mitchell, Stronger Password Authentication Using Browser Extension, Supported by NSF through the PORTIA project.
Search Security http://searchsecurity.techtarget.com/definition /salt.
Benjamin Strahs Chuan Yue Haining Wang, Secure Passwords Through Enhanced Hashing, The College of William and Mary Williamsburg, VA 23187, USA.
D.Mirante and C.Justin, Understanding Password Database Compromises, Department of Computer Science & Engineering Polytechnic Inst. of NYU, Tech. Rep., (2013).
A.Vance, If Your Password is 123456, Just Make IT Hackme, The New York Times, 20(2010).
N.F.Johnson and S.Jajodia, Exploring Steganography: Seeing the Unseen, http://www.jjtc.com/pub/r2026.pdf
N.F.Johnson and S.Jajodia, Steganalysis: The Investigation of Hidden Information, IEEE Information Technology Conference, (1998).
Stackoverflow,http://stackoverflow.com/questions/244903/why-is-a-password-salt-called-a-salt.
J.Kelley, Terror groups hide behind Web encryption”, USA TODAY, 06(19)(2001), 50-55.
T.Li Gong, Mark A.Lomas, Roger M.Needham and Jerome H.Saltzer, Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, 11(5)(1993), 648-656.
Blake Ross, Collin Jackson, Nicholas Miyake, Dan Boneh and John C.Mitchell, Stronger Password Authentication Using Browser Extension, Supported by NSF through the PORTIA project.
Search Security http://searchsecurity.techtarget.com/definition /salt.
Benjamin Strahs Chuan Yue Haining Wang, Secure Passwords Through Enhanced Hashing, The College of William and Mary Williamsburg, VA 23187, USA.
How to Cite
Alok Sharma, Nidhi Sharma, & Ankit Kumar. (2017). Analysis of Security Schemes. International Journal of Current Research in Science and Technology, 3(5), 1-4. Retrieved from https://crst.gfer.org/index.php/crst/article/view/89
Issue
Section
Articles