Volume 20 No 9 (2022)
Download PDF
SECURELY IMPLEMENTING ENCRYPTED NEGATIVE PASSWORDS FOR PASSWORD AUTHENTICATION
KAMARAPU NARESH, M.MURALI MOHAN REDDY
Abstract
One popular authentication technique that depends on safe password storage is password authentication. putting out a framework for password-safe secure password storage that is easily incorporated into current authentication systems. The naked password is first hashed by a cryptographic hash function (e.g., SHA-256) before being sent to the client. The hashed password is then changed to a negative password so that it cannot be used again. Lastly, the derived negative password is encrypted using a symmetric-key approach to create an Encrypted Negative Password (abbreviated as "ENP"), such as AES. To further improve security, multi-iteration encryption can be employed. Because of the symmetric encryption and cryptographic hash function, ENP passwords are difficult to decipher. Then, in order to increase its security even further, the decrypted negative password is re-encrypted using the RSA algorithm.
Keywords
hashed password, symmetric key method, and encrypted negative password
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.