SlideShare a Scribd company logo
2
Most read
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1597
Encrypted Negative Password using for Authentication
Priya K P1, Dr. Lakshmi J. V. N2
1MCA Student of Information Security Management Service, 2Associate Professor,
1,2Department of Computer Application, Jain Deemed-To-Be University, Bangalore, Karnataka, India
ABSTRACT
Password authentication is one of most likely used authenticationtechniques.
Secure password storage is the most difficult process. In this paper, we
propose a password confirmations structure that is intended for secure
password storage and could be effectively coordinated into existing
authentication systems. In this project, first we receive the plain text from the
user then hashed through a cryptographic function. The next step, hashed
password is converted into a negative password. Finally, the negative
password is encrypted into an EncryptedNegativePasswordusing encryption
algorithm. Challenge–responseauthenticationandmulti-factorauthentication
could be employed to further improve security.
KEYWORDS: Encrypted Negative Password, Algorithm, Blowfish, hashpassword,
encryption
How to cite this paper: Priya K P | Dr.
Lakshmi J. V. N "Encrypted Negative
Password using for Authentication"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-4 | Issue-6,
October 2020,
pp.1597-1599, URL:
www.ijtsrd.com/papers/ijtsrd35711.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
Now day’s cyber-offense is most common, in that password
cracking is one of the attacks. For instance, many user takes
week password according to their familiar vocabulary and
uses the same password for different system. The attacker
uses many ways to get the credentials such as guess the
password, or shoulder surfing, and other passwordcracking
tool is used to steel the sensitive data. To overcome this
problem we should use strongly hashed encrypted
password. The combination of hash function and encryption
work make it is hard to split passwords from ENPs. The
analysis and comparison of algorithm show that the ENP
cloud oppose lookup table assault and give stronger
protection of a password under dictionary assault. Here we
take two steps to make a strong password, first hashing the
password then encrypt the password.
2. Existing system
The aim of the paper is enhancing the security. However,
password is leaked from the week system. Some old system
are more vulnerable due to their lack of maintenance and
algorithm limitations. The hashing and encryption method
leads to lookup table attack and dictionary attack. The older
ENPs uses hashingandencryptionalgorithmwithoutneedof
any additional information except the plain password. And
also in the existing system uses the hashing algorithm such
as MD5 and SHA1 to 256. The encryption algorithm AES and
RSA.[1],[2] The algorithm analysisshowsthatthesealgorithms
as its own drawbacks to overcome this problem hashing
algorithm PBKDF2 and encryption algorithmBlowfish isuse
to improve the security. And also using salt function will
provide stronger protection to the password.
3. Proposed system
The combination ofhashfunctionandsymmetricencryption,
make it is difficult to split passwords from ENP system. The
algorithm analysis and comparison show that the ENP
provides the more security to the password system. In this
system using theadditional informationtothepasswordthat
is add salt value to the plain password it is more difficult to
crack the password system. And also implement the Multi-
iteration encryption provides more security to the system.
A. Methodology
The proposed framework includes two phases: the
registration section and authentication section. Once
adopting ourframework tosafeguardpasswordsinassociate
authenticationinformationtable,thesystemdesignershould
initial choose a cryptographic hash function and a
symmetric-key algorithm, where the conditionthathastobe
satisfied is the size of the hash value of the chosen
cryptographic hash function is capable the key size of the
chosen symmetric key algorithm.
Registration phase
1. User enters the plain text such as user name and
password.
2. The system checks the user name exist in the database
or not.
3. Then received password is hashed through hashing
algorithm such as PBKDF2 withHMAC-SHA1.
4. Hashed password converted into negative password
using NDB algorithm.
IJTSRD35711
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1598
5. Encrypt the negative password using symmetric
encryption algorithm such as Blowfish algorithm.
6. Finally, store the encrypted password in the
authentication table.
Authentication phase
1. If existing user,theUsernameandpasswordtransmitted
to server.
2. Verify the username and password ,if existing the user
name,
3. Search the ENP from the authentication table.
4. ENP is then decrypted it will get the hash value of the
plain text.
5. If the hash value matches user can login. Architecture
The below figure shows a general diagram the activities
System Architecture Diagram
Fig.1: Block Diagram of ENP
B. Algorithms
PBKDF2- This is one in the PBE algorithm. It applies a
pseudorandom function like hashbasedauthenticationcode
(HMAC) to the input text together with the salt value and
repeat the processes accurately and over to produce a
derived key which might be used as a cryptographic key
in the subsequent operation.
The strength of the PBKDF2 is makes it more durable for
somebody to determine your master password by making
repeated guesses in a brute forces attack. For giving better
opposition against brute force attacks, PBKDF2 presents
CPU-intensive operations. These tasks rely upon an iterated
pseudorandom work (PRF) which aides input values to a
derived key. The most significant properties to guarantee is
that the iterated pseudorandom function is cycle free. The
PBKDF2 includes a 5input parameters. Pseudorandom
function, original password, sequence of bits, number of
iteration, specify the derived key length. [13]
Fig.2: PBKDF2 Algorism
DK= PBKDF2 (PRF, Password, Salt, C, DKlen).[13]
Derived key DK U1 = F (password, salt, c, dkIen)
F (password, salt, c, I) = U1 ^ U2 ^………^ UC-1
Where
U1 = PRF( p,s,c,1 )
U2 = PRF( p,s,c,2 )
..
Uc = PRF(p,s,c,n-1)
Each single square Ti - i.e., Ti = Function (p, s, c, i) - is
computed as Ti = U1 ⊕ U2 ⊕ ... ⊕ Uc
BLOWFISH-Drop-in replacement for DES and IDEA
algorithm. Blowfish is a symmetric encryption algorithm, it
uses one key for encryption and the same key is used for
decryption. The algorithm analysis shows that blow
fish algorithm is Faster Encryptionanddecryptiontime. And
it uses less memory (5KB). Blowfish records the
highest average entropy per byte of encryption, this is the
achievement of new security aspect. Easily modified for
different security levels. [4][14]Thisalgorithmcontainsfeaster
structure, and size of the Plain text 64 bits. Blowfish has a
variable key length up to maximize of 448 long, making it
both flexible and secure. This algorithm contains 16 rounds
to produce the cipher text.
Working
The working of blowfish is divide the plain text into left and
right respectively, and perform the XOR operations on the
left part in original password with using sub key divided
from original plain text. The XOR output apply to the
function, then function output XOR to the right side plain
text. Swap the output each other, the same procedure is
repeated for 16 rounds after 16th round directlyaddthesub
keys to produce the chipper text.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1599
Fig.3: Blowfish Algorithm
Function value
Function f divided into 4 S-boxes. The function isolates a 32-
bit input into four bytes and utilizations thoseasindicesinto
an S-array. The lookup results are then gathered and XORed
single unit to create the output.
Fig.4: Graphic portrayal of F
Algorithm
Divide 64-bits into two 32 bits(L,R)
For i=1 to 16
• XL = XL XOR Pi
• XR = F(XL) XOR XR
• Swap XL and XR
Swap XL and XR(16 Rounds)
XR = XR XOR 17
XL = XL XOR P18
Concatenate XL and XR
C. Advantages
Stronger security algorithm that provides resistance to vary
reasonably attacks as well as dictionary attacks and look-up
table attack. No further burden on programmers for
configuring additional parameters. And also Easy and
convenient to use. This is light weight efficient password
protection scheme and easier to integrate this with existing
systems. It provides a robust security against
various sorts of attack. To provide an
efficient interface access to the clients to access the
portal. And deploy the project over the cloud in order
that it are often accessed from various geographical
location from any device.
4. Conclusion
Thus this encrypted negative word may be usedforsecuring
the password and conjointly the webpages.ThisENPsystem
prevents the rainbow table assault and also the look up
assault and secures the passwords. The password used is
safe and nobody will ever attempt to break the password.
Rather than simply hashing weareconvertingthehashvalue
into negative values and encrypting. So throughout during
verification also thus we check whether it’s the solution or
not but do not know the actual password. In the future,
various NDB generation algorithms will be considered and
acquainted with the ENP to improve e password security.
Furthermore, different techniques, like multi–factor
authentication and challenge–response authentication, are
going to be introduced into our secret authentication
framework.
References
[1] Authentication byEncrypted NegativePaawordforan
Intuitive Stock Management System. K.Subramanian,
V.Sreyas, M.Nikitha and S.Arathi. 2019, SSRG
Intranatinal Journal of computer Science and
Engineering(SSRG-IJCSE).
[2] Encrypted Negative Password Using RSA Algorithm.
Salwa P.B, Nice Mathew.2019,International Research
Journal of Engineering and Technology(IRJET).
[3] ieeexplore.ieee.org.
[4] A Comparison of Cryptographic Algorithms: DES,
3DES, AES, RSA and Blowfish for Guessing Attacks
Prevention. Mohammed Nazeh Abdul Wahid,
Abdulrahman Ali, Babak Esparham and Mohamed
Marwan. 2018, Journal of Computer Science
Applications and information technology,.
[5] Priyadarshini Patil, Prashant Narayan, Narayan D.G.,
Meena S.M. A Comprehensive Evaluation of
Cryptographic Algorithms: DES, 3DES, AES, RSA and
Blowfish. 2016.
[6] dspace.calstate.edu › bitstream › handle ›
ChidriLaxmi_Project2019.
[7] Authentication by Encrypted NegativePassword.Luo,
Wenjian. 2018, IEEE.
[8] Comparison of Encryption Algorithms: AES, Blowfish
and Twofish for Security of Wireless Networks.
Ghosh, Archisman. 2020, International Research
Journal of Engineering and Technology (IRJET) , p. 4.
[9] Wikipedia. en.wikipedia.org › wiki › Password.
[10] RSA Algorithm using modified subset sum
cryptosytem. Sonal S, Prasanth S, Rvi Shankar D. s.l. :
2nd international confrence on computer and
communication technology, 2011.
[11] Alarge scale stydy of web password habits.
D.Florencio andC .Herly. s.l. : 16th international
confrence on world wide web, 2017. ACM.
[12] Semanticscholar. www.semanticscholar.org › paper ›
Authentication-by-Encrypted-Negative-....
[13] wikipedia. en.wikipedia.org › wiki › PBKDF2.
[14] www.embedded.com › ... › Encrypting data with the
Blowfish algorithm.

More Related Content

PDF
Ch34508510
PDF
An Enhanced Encryption Technique using BCD and Bit Complementation
PDF
Simulated Analysis and Enhancement of Blowfish Algorithm
DOCX
Master thesis 14023164
DOC
PDF
IRJET- Comparative Analysis of Encryption Techniques
Ch34508510
An Enhanced Encryption Technique using BCD and Bit Complementation
Simulated Analysis and Enhancement of Blowfish Algorithm
Master thesis 14023164
IRJET- Comparative Analysis of Encryption Techniques

What's hot (20)

DOCX
PDF
IRJET- Encrypted Negative Password using RSA Algorithm
PDF
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
PDF
Implementation of-hybrid-cryptography-algorithm
PDF
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
PDF
Hybrid Encryption for Database Security
PDF
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
PDF
State of the art parallel approaches for
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PDF
White Paper on Cryptography
PDF
Analysis of Searchable Encryption
PDF
Ijetcas14 355
PDF
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
PDF
PPTX
Encryption techniques
PDF
A Review on Various Most Common Symmetric Encryptions Algorithms
PDF
Searchable Encryption Systems
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PDF
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
PDF
N45028390
IRJET- Encrypted Negative Password using RSA Algorithm
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Implementation of-hybrid-cryptography-algorithm
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
Hybrid Encryption for Database Security
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
State of the art parallel approaches for
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
White Paper on Cryptography
Analysis of Searchable Encryption
Ijetcas14 355
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
Encryption techniques
A Review on Various Most Common Symmetric Encryptions Algorithms
Searchable Encryption Systems
A Survey on Generation and Evolution of Various Cryptographic Techniques
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
N45028390
Ad

Similar to Encrypted Negative Password using for Authentication (20)

PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
PDF
Implementation of aes and blowfish algorithm
PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
PPT
File transfer with multiple security mechanism
PPTX
Thesis presentation 14023164
PDF
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
PDF
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
PDF
A performance evaluation of common
PDF
researchpaperfinal1
PDF
L017136269
PDF
Comparison of Various Encryption Algorithms and Techniques for improving secu...
PPTX
Comparative Analysis of Encryption Algorithm
PDF
Introducing an Encryption Algorithm based on IDEA
PDF
Comparative Study of Cryptography Algorithms and Its’ Applications
PPTX
Slide cipher based encryption
PDF
PDF
Implementation of De-Duplication Algorithm
PDF
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
PDF
A Modified Technique For Performing Data Encryption & Data Decryption
PDF
Ijcatr04051002
Design and Implementation of New Encryption algorithm to Enhance Performance...
Implementation of aes and blowfish algorithm
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
File transfer with multiple security mechanism
Thesis presentation 14023164
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
A performance evaluation of common
researchpaperfinal1
L017136269
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparative Analysis of Encryption Algorithm
Introducing an Encryption Algorithm based on IDEA
Comparative Study of Cryptography Algorithms and Its’ Applications
Slide cipher based encryption
Implementation of De-Duplication Algorithm
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Modified Technique For Performing Data Encryption & Data Decryption
Ijcatr04051002
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PPTX
master seminar digital applications in india
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Structure & Organelles in detailed.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Lesson notes of climatology university.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
master seminar digital applications in india
102 student loan defaulters named and shamed – Is someone you know on the list?
GDM (1) (1).pptx small presentation for students
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Structure & Organelles in detailed.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Anesthesia in Laparoscopic Surgery in India
Lesson notes of climatology university.
Final Presentation General Medicine 03-08-2024.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

Encrypted Negative Password using for Authentication

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1597 Encrypted Negative Password using for Authentication Priya K P1, Dr. Lakshmi J. V. N2 1MCA Student of Information Security Management Service, 2Associate Professor, 1,2Department of Computer Application, Jain Deemed-To-Be University, Bangalore, Karnataka, India ABSTRACT Password authentication is one of most likely used authenticationtechniques. Secure password storage is the most difficult process. In this paper, we propose a password confirmations structure that is intended for secure password storage and could be effectively coordinated into existing authentication systems. In this project, first we receive the plain text from the user then hashed through a cryptographic function. The next step, hashed password is converted into a negative password. Finally, the negative password is encrypted into an EncryptedNegativePasswordusing encryption algorithm. Challenge–responseauthenticationandmulti-factorauthentication could be employed to further improve security. KEYWORDS: Encrypted Negative Password, Algorithm, Blowfish, hashpassword, encryption How to cite this paper: Priya K P | Dr. Lakshmi J. V. N "Encrypted Negative Password using for Authentication" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6, October 2020, pp.1597-1599, URL: www.ijtsrd.com/papers/ijtsrd35711.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION Now day’s cyber-offense is most common, in that password cracking is one of the attacks. For instance, many user takes week password according to their familiar vocabulary and uses the same password for different system. The attacker uses many ways to get the credentials such as guess the password, or shoulder surfing, and other passwordcracking tool is used to steel the sensitive data. To overcome this problem we should use strongly hashed encrypted password. The combination of hash function and encryption work make it is hard to split passwords from ENPs. The analysis and comparison of algorithm show that the ENP cloud oppose lookup table assault and give stronger protection of a password under dictionary assault. Here we take two steps to make a strong password, first hashing the password then encrypt the password. 2. Existing system The aim of the paper is enhancing the security. However, password is leaked from the week system. Some old system are more vulnerable due to their lack of maintenance and algorithm limitations. The hashing and encryption method leads to lookup table attack and dictionary attack. The older ENPs uses hashingandencryptionalgorithmwithoutneedof any additional information except the plain password. And also in the existing system uses the hashing algorithm such as MD5 and SHA1 to 256. The encryption algorithm AES and RSA.[1],[2] The algorithm analysisshowsthatthesealgorithms as its own drawbacks to overcome this problem hashing algorithm PBKDF2 and encryption algorithmBlowfish isuse to improve the security. And also using salt function will provide stronger protection to the password. 3. Proposed system The combination ofhashfunctionandsymmetricencryption, make it is difficult to split passwords from ENP system. The algorithm analysis and comparison show that the ENP provides the more security to the password system. In this system using theadditional informationtothepasswordthat is add salt value to the plain password it is more difficult to crack the password system. And also implement the Multi- iteration encryption provides more security to the system. A. Methodology The proposed framework includes two phases: the registration section and authentication section. Once adopting ourframework tosafeguardpasswordsinassociate authenticationinformationtable,thesystemdesignershould initial choose a cryptographic hash function and a symmetric-key algorithm, where the conditionthathastobe satisfied is the size of the hash value of the chosen cryptographic hash function is capable the key size of the chosen symmetric key algorithm. Registration phase 1. User enters the plain text such as user name and password. 2. The system checks the user name exist in the database or not. 3. Then received password is hashed through hashing algorithm such as PBKDF2 withHMAC-SHA1. 4. Hashed password converted into negative password using NDB algorithm. IJTSRD35711
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1598 5. Encrypt the negative password using symmetric encryption algorithm such as Blowfish algorithm. 6. Finally, store the encrypted password in the authentication table. Authentication phase 1. If existing user,theUsernameandpasswordtransmitted to server. 2. Verify the username and password ,if existing the user name, 3. Search the ENP from the authentication table. 4. ENP is then decrypted it will get the hash value of the plain text. 5. If the hash value matches user can login. Architecture The below figure shows a general diagram the activities System Architecture Diagram Fig.1: Block Diagram of ENP B. Algorithms PBKDF2- This is one in the PBE algorithm. It applies a pseudorandom function like hashbasedauthenticationcode (HMAC) to the input text together with the salt value and repeat the processes accurately and over to produce a derived key which might be used as a cryptographic key in the subsequent operation. The strength of the PBKDF2 is makes it more durable for somebody to determine your master password by making repeated guesses in a brute forces attack. For giving better opposition against brute force attacks, PBKDF2 presents CPU-intensive operations. These tasks rely upon an iterated pseudorandom work (PRF) which aides input values to a derived key. The most significant properties to guarantee is that the iterated pseudorandom function is cycle free. The PBKDF2 includes a 5input parameters. Pseudorandom function, original password, sequence of bits, number of iteration, specify the derived key length. [13] Fig.2: PBKDF2 Algorism DK= PBKDF2 (PRF, Password, Salt, C, DKlen).[13] Derived key DK U1 = F (password, salt, c, dkIen) F (password, salt, c, I) = U1 ^ U2 ^………^ UC-1 Where U1 = PRF( p,s,c,1 ) U2 = PRF( p,s,c,2 ) .. Uc = PRF(p,s,c,n-1) Each single square Ti - i.e., Ti = Function (p, s, c, i) - is computed as Ti = U1 ⊕ U2 ⊕ ... ⊕ Uc BLOWFISH-Drop-in replacement for DES and IDEA algorithm. Blowfish is a symmetric encryption algorithm, it uses one key for encryption and the same key is used for decryption. The algorithm analysis shows that blow fish algorithm is Faster Encryptionanddecryptiontime. And it uses less memory (5KB). Blowfish records the highest average entropy per byte of encryption, this is the achievement of new security aspect. Easily modified for different security levels. [4][14]Thisalgorithmcontainsfeaster structure, and size of the Plain text 64 bits. Blowfish has a variable key length up to maximize of 448 long, making it both flexible and secure. This algorithm contains 16 rounds to produce the cipher text. Working The working of blowfish is divide the plain text into left and right respectively, and perform the XOR operations on the left part in original password with using sub key divided from original plain text. The XOR output apply to the function, then function output XOR to the right side plain text. Swap the output each other, the same procedure is repeated for 16 rounds after 16th round directlyaddthesub keys to produce the chipper text.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1599 Fig.3: Blowfish Algorithm Function value Function f divided into 4 S-boxes. The function isolates a 32- bit input into four bytes and utilizations thoseasindicesinto an S-array. The lookup results are then gathered and XORed single unit to create the output. Fig.4: Graphic portrayal of F Algorithm Divide 64-bits into two 32 bits(L,R) For i=1 to 16 • XL = XL XOR Pi • XR = F(XL) XOR XR • Swap XL and XR Swap XL and XR(16 Rounds) XR = XR XOR 17 XL = XL XOR P18 Concatenate XL and XR C. Advantages Stronger security algorithm that provides resistance to vary reasonably attacks as well as dictionary attacks and look-up table attack. No further burden on programmers for configuring additional parameters. And also Easy and convenient to use. This is light weight efficient password protection scheme and easier to integrate this with existing systems. It provides a robust security against various sorts of attack. To provide an efficient interface access to the clients to access the portal. And deploy the project over the cloud in order that it are often accessed from various geographical location from any device. 4. Conclusion Thus this encrypted negative word may be usedforsecuring the password and conjointly the webpages.ThisENPsystem prevents the rainbow table assault and also the look up assault and secures the passwords. The password used is safe and nobody will ever attempt to break the password. Rather than simply hashing weareconvertingthehashvalue into negative values and encrypting. So throughout during verification also thus we check whether it’s the solution or not but do not know the actual password. In the future, various NDB generation algorithms will be considered and acquainted with the ENP to improve e password security. Furthermore, different techniques, like multi–factor authentication and challenge–response authentication, are going to be introduced into our secret authentication framework. References [1] Authentication byEncrypted NegativePaawordforan Intuitive Stock Management System. K.Subramanian, V.Sreyas, M.Nikitha and S.Arathi. 2019, SSRG Intranatinal Journal of computer Science and Engineering(SSRG-IJCSE). [2] Encrypted Negative Password Using RSA Algorithm. Salwa P.B, Nice Mathew.2019,International Research Journal of Engineering and Technology(IRJET). [3] ieeexplore.ieee.org. [4] A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. Mohammed Nazeh Abdul Wahid, Abdulrahman Ali, Babak Esparham and Mohamed Marwan. 2018, Journal of Computer Science Applications and information technology,. [5] Priyadarshini Patil, Prashant Narayan, Narayan D.G., Meena S.M. A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. 2016. [6] dspace.calstate.edu › bitstream › handle › ChidriLaxmi_Project2019. [7] Authentication by Encrypted NegativePassword.Luo, Wenjian. 2018, IEEE. [8] Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks. Ghosh, Archisman. 2020, International Research Journal of Engineering and Technology (IRJET) , p. 4. [9] Wikipedia. en.wikipedia.org › wiki › Password. [10] RSA Algorithm using modified subset sum cryptosytem. Sonal S, Prasanth S, Rvi Shankar D. s.l. : 2nd international confrence on computer and communication technology, 2011. [11] Alarge scale stydy of web password habits. D.Florencio andC .Herly. s.l. : 16th international confrence on world wide web, 2017. ACM. [12] Semanticscholar. www.semanticscholar.org › paper › Authentication-by-Encrypted-Negative-.... [13] wikipedia. en.wikipedia.org › wiki › PBKDF2. [14] www.embedded.com › ... › Encrypting data with the Blowfish algorithm.