SlideShare a Scribd company logo
2
Most read
Authentication by Encrypted Negative Password
ABSTRACT:
Secure password storage is a vital aspect in systems based on password
authentication, which is still the most widely used authentication technique, despite
its some security flaws. In this paper, we propose a password authentication
framework that is designed for secure password storage and could be easily
integrated into existing authentication systems. In our framework, first, the
received plain password from a client is hashed through a cryptographic hash
function (e.g., SHA-256). Then, the hashed password is converted into a negative
password. Finally, the negative password is encrypted into an Encrypted Negative
Password (abbreviated as ENP) using a symmetric-key algorithm (e.g., AES), and
multi-iteration encryption could be employed to further improve security. The
cryptographic hash function and symmetric encryption make it difficult to crack
passwords from ENPs. Moreover, there are lots of corresponding ENPs for a given
plain password, which makes precomputation attacks (e.g., lookup table attack and
rainbow table attack) infeasible. The algorithm complexity analyses and
comparisons show that the ENP could resist lookup table attack and provide
stronger password protection under dictionary attack. It is worth mentioning that
the ENP does not introduce extra elements (e.g., salt); besides this, the ENP could
still resist precomputation attacks. Most importantly, the ENP is the first password
protection scheme that combines the cryptographic hash function, the negative
password and the symmetric-key algorithm, without the need for additional
information except the plain password.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : ASP.NET,C#.NET
 Tool : Visual Studio 2008
 Database : SQL SERVER 2005
REFERENCE:
Wenjian Luo, Senior Member, IEEE, Yamin Hu, Hao Jiang, and Junteng Wang,
“Authentication by Encrypted Negative Password”, IEEE Transactions on
Information Forensics and Security, Volume: 14 , Issue: 1 , Jan. 2019.

More Related Content

PDF
seminar report on wireless Sensor network
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPTX
Zigbee ppt
PPT
PPTX
Google loon ppt
PPTX
Wireless network security
PDF
AI for drug discovery
PPTX
Tomato leaves diseases detection approach based on support vector machines
seminar report on wireless Sensor network
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Zigbee ppt
Google loon ppt
Wireless network security
AI for drug discovery
Tomato leaves diseases detection approach based on support vector machines

What's hot (20)

PPT
Presentazione Tesi Laurea Triennale in Informatica
PPTX
EyeRing PowerPoint Presentation
PPTX
Wban
PDF
IoT ecosystem
DOCX
Hotel network scenario implementation by using cisco packet tracer
PDF
2nd Semester M Tech: Computer Science and Engineering (Jun-2016) Question Pa...
PPTX
Seminar ppt fog comp
PPTX
Eye ring
PPTX
Zigbee technology ppt edited
PPTX
Features of a wireless network
DOCX
IoT(Internet of Things) Report
PPT
Intelligent RAM
PPTX
Alzheimer's disease classification using Deep learning Neural a Network and G...
PPTX
Concept of internet of vehicles
PPTX
Challenges and advantages of grid computing
PDF
Topic 2: Cloud Computing Paradigms
PPTX
Cluster computing
DOCX
Wireless sensor network report
PPTX
Comparison between-ipv6-and-6 lowpan
PDF
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
Presentazione Tesi Laurea Triennale in Informatica
EyeRing PowerPoint Presentation
Wban
IoT ecosystem
Hotel network scenario implementation by using cisco packet tracer
2nd Semester M Tech: Computer Science and Engineering (Jun-2016) Question Pa...
Seminar ppt fog comp
Eye ring
Zigbee technology ppt edited
Features of a wireless network
IoT(Internet of Things) Report
Intelligent RAM
Alzheimer's disease classification using Deep learning Neural a Network and G...
Concept of internet of vehicles
Challenges and advantages of grid computing
Topic 2: Cloud Computing Paradigms
Cluster computing
Wireless sensor network report
Comparison between-ipv6-and-6 lowpan
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
Ad

Similar to Authentication by encrypted negative password (20)

PDF
Encrypted Negative Password using for Authentication
PDF
IRJET- Encrypted Negative Password using RSA Algorithm
PDF
Comparative study of password storing using hash function with MD5, SHA1, SHA...
PDF
Securing Database Passwords Using a Combination of hashing and Salting Techni...
PDF
7. 9589 1-pb
PDF
Authentication and password storing improvement using SXR algorithm with a ha...
PDF
PDF
Enhancement in data security and integrity using minhash technique
PDF
Implementation of-hybrid-cryptography-algorithm
PPTX
Comparative hash algorithm power point presentation
PPT
Lect5 authentication 5_dec_2012-1
DOCX
IT549 Foundation In Information Assurance.docx
PPTX
Infor_Security_Authentication_User .pptx
PPT
Presentation2f_for_passwords_MS_Class.ppt
DOCX
Multi-Biometric Authentication through Hybrid Cryptographic System
PDF
User Authentication: Passwords and Beyond
PPTX
Efficient authentication for mobile and pervasive computing
DOC
Image Based Password using RSA Algorithm
DOC
Image Based Password using RSA Algorithm
PPTX
Efficient authentication for mobile and pervasive computing
Encrypted Negative Password using for Authentication
IRJET- Encrypted Negative Password using RSA Algorithm
Comparative study of password storing using hash function with MD5, SHA1, SHA...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
7. 9589 1-pb
Authentication and password storing improvement using SXR algorithm with a ha...
Enhancement in data security and integrity using minhash technique
Implementation of-hybrid-cryptography-algorithm
Comparative hash algorithm power point presentation
Lect5 authentication 5_dec_2012-1
IT549 Foundation In Information Assurance.docx
Infor_Security_Authentication_User .pptx
Presentation2f_for_passwords_MS_Class.ppt
Multi-Biometric Authentication through Hybrid Cryptographic System
User Authentication: Passwords and Beyond
Efficient authentication for mobile and pervasive computing
Image Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
Efficient authentication for mobile and pervasive computing
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
PDF
Dot Net Final Year IEEE Project Titles.pdf
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
PDF
Python IEEE Project Titles 2023 - 2024.pdf
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
DOCX
Spammer detection and fake user Identification on Social Networks
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
Java Web Application Project Titles 2023-2024.pdf
Dot Net Final Year IEEE Project Titles.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Spammer detection and fake user Identification on Social Networks
Sentiment Classification using N-gram IDF and Automated Machine Learning
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Crop Yield Prediction and Efficient use of Fertilizers
Collaborative Filtering-based Electricity Plan Recommender System
Achieving Data Truthfulness and Privacy Preservation in Data Markets
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
Towards Fast and Reliable Multi-hop Routing in VANETs
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Node-Level Trust Evaluation in Wireless Sensor Networks

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
master seminar digital applications in india
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
01-Introduction-to-Information-Management.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
RMMM.pdf make it easy to upload and study
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Classroom Observation Tools for Teachers
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
Complications of Minimal Access Surgery at WLH
FourierSeries-QuestionsWithAnswers(Part-A).pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
O7-L3 Supply Chain Operations - ICLT Program
master seminar digital applications in india
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
01-Introduction-to-Information-Management.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
RMMM.pdf make it easy to upload and study
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
VCE English Exam - Section C Student Revision Booklet
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Classroom Observation Tools for Teachers
102 student loan defaulters named and shamed – Is someone you know on the list?
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
A systematic review of self-coping strategies used by university students to ...

Authentication by encrypted negative password

  • 1. Authentication by Encrypted Negative Password ABSTRACT: Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite its some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-256). Then, the hashed password is converted into a negative password. Finally, the negative password is encrypted into an Encrypted Negative Password (abbreviated as ENP) using a symmetric-key algorithm (e.g., AES), and multi-iteration encryption could be employed to further improve security. The cryptographic hash function and symmetric encryption make it difficult to crack passwords from ENPs. Moreover, there are lots of corresponding ENPs for a given plain password, which makes precomputation attacks (e.g., lookup table attack and rainbow table attack) infeasible. The algorithm complexity analyses and comparisons show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is worth mentioning that the ENP does not introduce extra elements (e.g., salt); besides this, the ENP could still resist precomputation attacks. Most importantly, the ENP is the first password protection scheme that combines the cryptographic hash function, the negative password and the symmetric-key algorithm, without the need for additional information except the plain password.
  • 2. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB. SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : ASP.NET,C#.NET  Tool : Visual Studio 2008  Database : SQL SERVER 2005 REFERENCE: Wenjian Luo, Senior Member, IEEE, Yamin Hu, Hao Jiang, and Junteng Wang, “Authentication by Encrypted Negative Password”, IEEE Transactions on Information Forensics and Security, Volume: 14 , Issue: 1 , Jan. 2019.