SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1882
Encrypted Negative Password Using RSA Algorithm
Salwa P.B1, Nice Mathew2
1M.Tech student Computer Science and Engineering,
2Asst.Professor, Department of Computer Science and Engineering, Indira Gandhi Institute of Engineering and
Technology, Nellikuzhi, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Secure password storage is a in systems major fact
based on passwordauthentication, whichhasbeenwidely used
in authentication technique. Proposing a password
authentication framework that is designed for secure
password storage and it can be easily integrated into existing
authentication systems. First, the received plain password
from a client side is hashed using a cryptographic hash
function (e.g., SHA-256).Then, hashed password is converted
into a negative password. Finally, the received negative
password is encrypted into an Encrypted Negative Password
(abbreviated as ENP) using a symmetric-key algorithm (e.g.,
AES).Using multi-iteration encryption could be employed to
further improvesecurity. Boththecryptographichashfunction
and symmetric encryption make it difficulttocrackpasswords
from ENPs. Finally, the received encrypted negative password
is again encrypted using the RSA algorithm to improve the
security of the password.
Key Words: Encrypted Negative Password, Symmetric
key algorithm, Hashed password
1. INTRODUCTION
By the large development of the Internet, a huge number of
online services have emerged, which password
authentication is the most widely used authentication
technique, for it is available at a low cost. Password security
always attracts great interest from academia and industry.
Because of careless behavior of the userspasswordhasbeen
cracked, hence password authentication techniquehasbeen
increasing. For instance, many of the users select weak
passwords so that it can be reuse same passwords in
different systems.Becausetheysettheirpasswordaccording
to their familiar vocabulary. It is very difficult to obtain
passwords from high security systems. On the other side
stealing authentication data tables (containing usernames
and passwords) in high security systems is difficult.
1.1 OBJECTIVE
The aim of the paper is to enhance password security. When
carrying an online guessing attack, there is a limit to the
number of login attempts. However, passwords can be
leaked from weak systems. Some old systems are more
vulnerable due to their lack of maintenance. The passwords
are often reused, adversaries may log into high security
systems through cracked passwords from low security
systems. There are lots of corresponding ENPs for a given
plain password, which makes attacks (e.g., lookup table
attack and rainbow table attack infeasible. The complexity
analyses of algorithm and comparisons show that the ENP
could resist lookup table attack and provide stronger
password protection under dictionary attack. It is
mentioning that the ENP does not introduce extra elements
(e.g. salt). Most importantly, the ENP is the first password
protection scheme that combines the cryptographic hash
function, the negative password and the symmetric-key
algorithm without the need of anyforadditional information
except the plain password. The key certificates has been
used to authenticate the user's key pair. Finally,thereceived
encrypted negative password is again encrypted using the
RSA algorithm to improve the security of the password.
1.2 SCOPE
By securing the password the online sites can provide
security and protected from the cracking password.
Passwords in the authentication data table presented in the
form of hashed passwords. Processor resourcesandstorage
resources are becoming more and more abundant, so that
the hashed passwordscannotresistprecomputationattacks,
such as rainbow table attack and lookup table attack.
Moreover, they download and use attack tools without the
need of any professional securityknowledge.Somepowerful
attack tools, such as hashcat, Rainbow Crack and John the
Ripper, provide functions, such as multiple hash algorithms,
multiple attack models, multiple operating systems, and
multiple platforms, which grand higher demand for secure
password storage. In these situations, attacks are usually
carried such as adversaries pre compute a lookup table,
where the keys are the hash values of elements in a
password list which contains frequent used passwords, and
the records displayed are corresponding plain passwords in
the password list. From the low security system generate a
authentication data table .Finally, they search for the plain
passwords in the lookup table with correspondingmatching
hashed passwords in the authentication data table and the
keys in the lookup table. Then, by log into higher security
systems through cracked usernames and passwords, they
could steal more sensitive information of users. One of the
main advantage that above lookup table attack is that the
corresponding hashed password is determined for a given
plain password. So that the lookup table could be quickly
constructed, and the size of the lookup table could be large,
which result in high success rate of cracking hashed
passwords.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1883
2. RELATED WORK
Some of the password protection schemes are hashed
password, salted password and key stretching.
1) Hashed Password: The simple way to store
passwords is to directly store plain passwords. However,
this scheme presents a problem that once adversaries has
been obtain the authentication data table, all passwords are
immediately compromised. To store safely hash passwords
using a cryptographic hash function, because it is infeasible
to recover plain passwords from hashed passwords. The
cryptographic hash function maps the data of arbitrary size
to a fixed-size sequence of bits. In the authentication system
that using the hashed password scheme, only hashed
passwords are stored. However, hashed passwords doesn’t
resist lookup table attack. Rainbow table attack is more
practical for its space-timetradeoff.Processorresourcesand
storage resources are becoming richer, so the precomputed
tables used in the above two attacks become large, so that
adversaries obtain a higher success rate of cracking hashed
passwords.
Table -1: Attending pattern examples
PATTERN EXAMPLE PASSWORD EXAMPLE
Appending[0-9] Password1,princess1,angel1
Appending 123 Abc123,love123,red123
Appending 1234 Abcd1234,abc1234,love1234
Appending DOT Password,iloveyou,followingyou
Appending ! Iloveyou!, password!, rockypu!
Appending 101 Love101,zoey101,),sweet101
2) Salted Password: Salted password scheme used to resist
precomputation attack. In this scheme, the plain password
and a random data (called salt) is hashed through a
cryptographic hash function. The salt is usually generated
random, which shows that the hash values of the same plain
passwords are almost different. The greater the size of the
salt is, the password security is higher. However, under
dictionary attack, salted passwords are still weak. By
comparing with salted password, the ENP proposed
guarantees the diversity of passwords without the need for
extra elements (e.g., salt).
3) Key Stretching:. Key stretching were introduced to resist
the dictionary attack. So that it can change weak password
into enhanced password .It could increase the time cost
required to every password attempt, so that the power of
defending against dictionary attack is increased. In the ENP
proposed, like key stretching, multi-iteration encryption is
used to further improve password security underdictionary
attack. Compared with key stretching, the ENP does not
introduce extra elements (e.g., salt).
Fig -1: Password hashing
2.1 Negative Database
The compression of the complement of a positive database
(denoted as DB) is stored in the NDB. Every entry in NDB
contains three symbols: ‘0’, ‘1’, and ‘*’. The symbol ‘0’
matches the bit 0, and the symbol ‘1’ match the bit 1; the
symbol ‘*’ matches either the bit 0 or 1. Entry in an NDB
consists of two kinds of positions: specified positions and
unspecified positions. Positions where the symbolsare‘0’or
‘1’ called specified positions, while positions where the
symbols ‘*’ called unspecified positions.Then,both‘0’and‘1’
are specified symbols, and the ‘*’ istheunspecified symbol.A
sequence of bits is covered by an entry in an NDB; that is to
say, the bits of the sequence are matches the symbols of the
entry at the specified positions. If a sequence of bits is
covered by one entry in an NDB, says that the sequence is
covered by the NDB. If an NDB covers every entry in the (U-
DB), says that the NDB is complete; otherwise, it is
incomplete. The NDB converted from a DB with one entry is
called the single NDB; otherwise, it is called the multiple
NDB.
There are two types of NDB generation algorithms, one for
the single NDBs and one for multiple NDBs. In the first type,
Clause distribution control algorithm,1-hiddenalgorithm, 2-
hidden algorithm, q-hidden algorithm, hybrid algorithm, p-
hidden algorithm, and K-hidden algorithm has been
proposed successively. In the second type, the prefix
algorithm,RandomizeNDB(abbreviatedasRNDB),multiple-
solution algorithm proposed successively. These algorithms
could also be used to generate single NDBs.
3. PROPOSED SYSTEM
The proposed framework two consist of the registration
phase and authentication phase. The main framework to
protect passwords in the authentication data table, the
system designer should first select a cryptographic hash
function and a symmetric-key algorithm, where the
condition satisfied is that the size of the hash value of
selected cryptographic hash function is equal to key size of
the selected symmetric-key algorithm. In addition,
cryptographic hash functionsandsymmetric-keyalgorithms
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1884
could also be used in the ENP, which adequately indicates
the flexibility of our framework.
3.1 Registration Phase
The registration phase consist of six steps.
(1) On the client section, a user enters his/herusernameand
password. Then, the entered username and plain password
are transmitted to the server through a secure channel;
(2) If the received username existsintheauthenticationdata
table, “The username already exists!” is displayed, which
means that the server has rejected the registration, and the
registration phase is terminated; otherwise, go to Step (3);
(3) Then the received password is hashed using the selected
cryptographic hash function.
(4) The hashed password is then converted into a negative
password using an NDB generation.
(5) The negative password is then encryptedtoanENPusing
the selected symmetric-key algorithm, where thekeywill be
the hash value of the plain password. The additional option,
multi-iteration encryption could be used for enhancing
passwords.
6) The username and the resulting ENP get stored in the
authentication data table and “Registration success” is
displayed, means that the server has been accepted the
registration request.
3.2 Authentication Phase
The authentication phase consist of five steps.
(1) On the client section, a user enters his/herusernameand
password. Then, the username and plain password get
transmitted to the server through a secure channel.
(2) If the received username does not exist in the
authentication data table, then “Incorrect username or
password!” is displayed, which means that the server get
rejected the authentication request, and the authentication
phase is terminated; otherwise, go to Step (3);
(3) Search for the authentication data table for the ENP
corresponding to the received username;
(4) The ENP is then decrypted (one or more times according
to the encryption setting in the registration phase) usingthe
selected symmetric-key algorithm, where that the selected
key is the hash value of the plain password; so, the negative
password is obtained;
(5) If the hash value that has been received password is not
the solution of the negative password, then “Incorrect
username or password!” is displayed, which means that the
server rejected the authentication request, then the
authentication phase is terminated; otherwise,
“Authentication success” is returned, that means that the
server has accepted the authentication request.
ENPs could be obtained by the following steps. The received
plain password (i.e., a sequence of characters) from a client
is then hashed using a cryptographic hash function. Next,
that received hashed password is converted into a negative
password using an NDB generation algorithm, the negative
password is then encrypted using a symmetric-key
algorithm. So, the ENP is obtained. The solution of the
negative password will be the hash value of the received
plain password. In this processing, each component (i.e., the
cryptographic hash function, the symmetric-key algorithm,
and the NDB generation algorithm) is indispensable. The
cryptographic hash function will converts plain passwords
to hashed passwords; the fixed length property of that
received hashed passwords offers convenience fortheother
subsequent encryption, since the length requirementfor the
secret key in the symmetric key algorithm; and other
properties (such as avalanche effectandcollisionresistance)
are also important factors of employing the cryptographic
hash function. The reason behind this is theconversion from
a hashed password to a negative password is not
irreversible; therefore, if no encryption, when an adversary
obtains a negative password, then immediately obtains the
corresponding hashed password, which makes the strength
of the ENP equivalent to that of the hashed password.
4. CONCLUSION
This paper proposed a password protection scheme called
ENP, and presenting the password authentication
framework based on the ENP. In this framework, the entries
on the authentication data table are ENPs. In the end,
analyzed and compared the attack complexity of hashed
password, salted password, key stretching and the ENP.The
results will show that the ENP could resist lookup table
attack and provide stronger password protection under
dictionary attack. It is clear that the ENP does not need extra
elements (e.g., salt) while resistinglookuptableattack.Inthe
future, other NDB generation algorithms will be studiedand
introduced to the ENP to further improving password
security. Furthermore, other techniques, also can be used
such as multi factor authentication and challenge–response
authentication, will be introduced into our password
authentication framework. For securing the encrypted
negative password is then encrypted using the RSA
algorithm.
REFERENCES
[1] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano,
“Passwords and the evolution of imperfect authentication,”
Communications of the ACM, vol. 58, no. 7, pp. 78–87, Jun.
2015.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1885
[2] M. A. S. Gokhale and V. S. Waghmare, “The shoulder
surfing resistant graphical password authentication
technique,” ProcediaComputerScience,vol.79,pp.490–498,
2016.
[3] J. Ma, W. Yang, M. Luo, and N. Li, “A study of probabilistic
passwordmodels,” in Proceedings of 2014 IEEESymposium
on Security and Privacy, May 2014, pp. 689–704.
[4] A. Adams and M. A. Sasse, “Users are not the enemy,”
Communications of the ACM, vol. 42, no. 12, pp. 40–46, Dec.
1999.
[5] E. H. Spafford, “Opus: Preventing weak password
choices,” Computers & Security, vol. 11, no. 3, pp. 273–278,
1992.
[6] Y. Li, H. Wang, and K. Sun, “Personal information in
passwords and its security implications,” IEEE Transactions
on Information Forensics and Security, vol. 12, no. 10, pp.
2320–2333, Oct. 2017.
[7] D. Florencio and C. Herley, “A large-scale study of web
password habits,” in Proceedings of the 16th International
Conference on World Wide Web. ACM, 2007, pp. 657–666.
[8] R. Shay, S. Komanduri, A. L. Durity, P. S. Huh, M. L.
Mazurek, S. M. Segreti, B. Ur, L. Bauer, N. Christin, and L. F.
Cranor, “Designing password policies for strength and
usability,” ACM Transactions on Information and System
Security, vol. 18, no. 4, pp. 13:1–13:34, May 2016.
[9] D. Wang, D. He, H. Cheng, and P. Wang, “fuzzyPSM: A new
password strength meter using fuzzy probabilistic context-
free grammars,” in Proceedings of 2016 46th Annual
IEEE/IFIP International Conference on DependableSystems
and Networks, Jun. 2016, pp. 595–606.
[10] H. M. Sun, Y. H. Chen, and Y. H. Lin, “oPass: A user
authentication protocol resistant to password stealing and
password reuse attacks,” IEEE Transactions on Information
Forensics and Security, vol. 7, no. 2, pp. 651–663, Apr. 2012.
[11] M. Zviran and W. J. Haga, “Password security: An
empirical study,” Journal of Management Information
Systems, vol. 15, no. 4, pp. 161– 185, 1999.
[12] P. Andriotis, T. Tryfonas, and G. Oikonomou,
“Complexity metrics and user strength perceptions of the
pattern-lock graphical authentication method,” in
Proceedings of Human Aspects of Information Security,
Privacy, and Trust. Springer International Publishing, 2014,
pp. 115– 126.
[13] D. P. Jablon, “Strong password-only authenticated key
exchange,” SIGCOMMComputerCommunicationReview,vol.
26, no. 5, pp. 5–26, Oct. 1996.
[14] J. Jose, T. T. Tomy, V. Karunakaran, A. K. V, A. Varkey,
and N. C. A., “Securing passwordsfromdictionaryattack with
character-tree,” in Proceedings of 2016 International
Conference on Wireless Communications, Signal Processing
and Networking, Mar. 2016, pp. 2301–2307.
[15] A. Arora, A. Nandkumar, and R. Telang, “Does
information security attack frequency increase with
vulnerability disclosure? an empirical analysis,”Information
Systems Frontiers, vol. 8, no. 5, pp. 350–362, Dec. 2006.

More Related Content

PDF
Encrypted Negative Password using for Authentication
PDF
Honey words
PDF
A Survey of Password Attacks and Safe Hashing Algorithms
DOC
Password hacking
PDF
A tool to evaluate symmetric key algorithms
PDF
Security in Manets using Cryptography Algorithms
PDF
Unlimited Length Random Passwords for Exponentially Increased Security
PPTX
Password Cracking
Encrypted Negative Password using for Authentication
Honey words
A Survey of Password Attacks and Safe Hashing Algorithms
Password hacking
A tool to evaluate symmetric key algorithms
Security in Manets using Cryptography Algorithms
Unlimited Length Random Passwords for Exponentially Increased Security
Password Cracking

What's hot (20)

PPTX
Welcome to the world of hacking
PDF
Final report
PDF
Prevention of SQL Injection Attack in Web Application with Host Language
PPTX
ETHICAL HACKING
PDF
Andrey Kutuzov and Elizaveta Kuzmenko - WebVectors: Toolkit for Building Web...
PDF
Footprinting-and-the-basics-of-hacking
PDF
PASSWORD BEST PRACTICES
PDF
A Searchable Symmetric Key Cipher System
PPT
Social media analysis in R using twitter API
PDF
nullcon 2011 - Penetration Testing a Biometric System
PDF
Comparative analysis of efficiency of fibonacci random number generator algor...
PPT
DOCX
Network security interview questions & answers
PDF
IRJET- Estimating Various DHT Protocols
PDF
A1803050106
PPTX
Reconnaissance - For pentesting and user awareness
PDF
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...
PDF
Linguistic Passphrase Cracking
PDF
Ce hv8 module 04 enumeration
Welcome to the world of hacking
Final report
Prevention of SQL Injection Attack in Web Application with Host Language
ETHICAL HACKING
Andrey Kutuzov and Elizaveta Kuzmenko - WebVectors: Toolkit for Building Web...
Footprinting-and-the-basics-of-hacking
PASSWORD BEST PRACTICES
A Searchable Symmetric Key Cipher System
Social media analysis in R using twitter API
nullcon 2011 - Penetration Testing a Biometric System
Comparative analysis of efficiency of fibonacci random number generator algor...
Network security interview questions & answers
IRJET- Estimating Various DHT Protocols
A1803050106
Reconnaissance - For pentesting and user awareness
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...
Linguistic Passphrase Cracking
Ce hv8 module 04 enumeration
Ad

Similar to IRJET- Encrypted Negative Password using RSA Algorithm (20)

DOCX
ieee paper
PDF
Unlimited Length Random Passwords for Exponentially Increased Security
PDF
International Journal of Computer Science, Engineering and Applications (IJCSEA)
PDF
IRJET- Comparative Analysis of Encryption Techniques
PDF
Detecting Password brute force attack and Protecting the cloud data with AES ...
PDF
Implementation of De-Duplication Algorithm
PDF
IRJET- Message Encryption using Hybrid Cryptography
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PPTX
20160225 OWASP Atlanta Prevoty RASP
PDF
H0154448
PDF
IRJET - Enhancement in AES Algorithm
PPTX
20160211 OWASP Charlotte RASP
PPTX
Secured algorithm for gsm encryption & decryption
PDF
Modified MD5 Algorithm for Password Encryption
PDF
IRJET - Deep Learning based Chatbot
PDF
Hybrid Encryption for Database Security
PDF
F018133640.key aggregate paper
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PPTX
OWASP_Top_Ten_Proactive_Controls_v2.pptx
PDF
A novel authenticated cipher for rfid systems
ieee paper
Unlimited Length Random Passwords for Exponentially Increased Security
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IRJET- Comparative Analysis of Encryption Techniques
Detecting Password brute force attack and Protecting the cloud data with AES ...
Implementation of De-Duplication Algorithm
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
20160225 OWASP Atlanta Prevoty RASP
H0154448
IRJET - Enhancement in AES Algorithm
20160211 OWASP Charlotte RASP
Secured algorithm for gsm encryption & decryption
Modified MD5 Algorithm for Password Encryption
IRJET - Deep Learning based Chatbot
Hybrid Encryption for Database Security
F018133640.key aggregate paper
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
OWASP_Top_Ten_Proactive_Controls_v2.pptx
A novel authenticated cipher for rfid systems
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
DOCX
573137875-Attendance-Management-System-original
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Digital Logic Computer Design lecture notes
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Sustainable Sites - Green Building Construction
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Current and future trends in Computer Vision.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Safety Seminar civil to be ensured for safe working.
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
web development for engineering and engineering
PPTX
Artificial Intelligence
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
R24 SURVEYING LAB MANUAL for civil enggi
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
573137875-Attendance-Management-System-original
Embodied AI: Ushering in the Next Era of Intelligent Systems
Digital Logic Computer Design lecture notes
OOP with Java - Java Introduction (Basics)
Sustainable Sites - Green Building Construction
UNIT 4 Total Quality Management .pptx
bas. eng. economics group 4 presentation 1.pptx
Current and future trends in Computer Vision.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Model Code of Practice - Construction Work - 21102022 .pdf
Safety Seminar civil to be ensured for safe working.
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
web development for engineering and engineering
Artificial Intelligence
Internet of Things (IOT) - A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
R24 SURVEYING LAB MANUAL for civil enggi

IRJET- Encrypted Negative Password using RSA Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1882 Encrypted Negative Password Using RSA Algorithm Salwa P.B1, Nice Mathew2 1M.Tech student Computer Science and Engineering, 2Asst.Professor, Department of Computer Science and Engineering, Indira Gandhi Institute of Engineering and Technology, Nellikuzhi, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Secure password storage is a in systems major fact based on passwordauthentication, whichhasbeenwidely used in authentication technique. Proposing a password authentication framework that is designed for secure password storage and it can be easily integrated into existing authentication systems. First, the received plain password from a client side is hashed using a cryptographic hash function (e.g., SHA-256).Then, hashed password is converted into a negative password. Finally, the received negative password is encrypted into an Encrypted Negative Password (abbreviated as ENP) using a symmetric-key algorithm (e.g., AES).Using multi-iteration encryption could be employed to further improvesecurity. Boththecryptographichashfunction and symmetric encryption make it difficulttocrackpasswords from ENPs. Finally, the received encrypted negative password is again encrypted using the RSA algorithm to improve the security of the password. Key Words: Encrypted Negative Password, Symmetric key algorithm, Hashed password 1. INTRODUCTION By the large development of the Internet, a huge number of online services have emerged, which password authentication is the most widely used authentication technique, for it is available at a low cost. Password security always attracts great interest from academia and industry. Because of careless behavior of the userspasswordhasbeen cracked, hence password authentication techniquehasbeen increasing. For instance, many of the users select weak passwords so that it can be reuse same passwords in different systems.Becausetheysettheirpasswordaccording to their familiar vocabulary. It is very difficult to obtain passwords from high security systems. On the other side stealing authentication data tables (containing usernames and passwords) in high security systems is difficult. 1.1 OBJECTIVE The aim of the paper is to enhance password security. When carrying an online guessing attack, there is a limit to the number of login attempts. However, passwords can be leaked from weak systems. Some old systems are more vulnerable due to their lack of maintenance. The passwords are often reused, adversaries may log into high security systems through cracked passwords from low security systems. There are lots of corresponding ENPs for a given plain password, which makes attacks (e.g., lookup table attack and rainbow table attack infeasible. The complexity analyses of algorithm and comparisons show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is mentioning that the ENP does not introduce extra elements (e.g. salt). Most importantly, the ENP is the first password protection scheme that combines the cryptographic hash function, the negative password and the symmetric-key algorithm without the need of anyforadditional information except the plain password. The key certificates has been used to authenticate the user's key pair. Finally,thereceived encrypted negative password is again encrypted using the RSA algorithm to improve the security of the password. 1.2 SCOPE By securing the password the online sites can provide security and protected from the cracking password. Passwords in the authentication data table presented in the form of hashed passwords. Processor resourcesandstorage resources are becoming more and more abundant, so that the hashed passwordscannotresistprecomputationattacks, such as rainbow table attack and lookup table attack. Moreover, they download and use attack tools without the need of any professional securityknowledge.Somepowerful attack tools, such as hashcat, Rainbow Crack and John the Ripper, provide functions, such as multiple hash algorithms, multiple attack models, multiple operating systems, and multiple platforms, which grand higher demand for secure password storage. In these situations, attacks are usually carried such as adversaries pre compute a lookup table, where the keys are the hash values of elements in a password list which contains frequent used passwords, and the records displayed are corresponding plain passwords in the password list. From the low security system generate a authentication data table .Finally, they search for the plain passwords in the lookup table with correspondingmatching hashed passwords in the authentication data table and the keys in the lookup table. Then, by log into higher security systems through cracked usernames and passwords, they could steal more sensitive information of users. One of the main advantage that above lookup table attack is that the corresponding hashed password is determined for a given plain password. So that the lookup table could be quickly constructed, and the size of the lookup table could be large, which result in high success rate of cracking hashed passwords.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1883 2. RELATED WORK Some of the password protection schemes are hashed password, salted password and key stretching. 1) Hashed Password: The simple way to store passwords is to directly store plain passwords. However, this scheme presents a problem that once adversaries has been obtain the authentication data table, all passwords are immediately compromised. To store safely hash passwords using a cryptographic hash function, because it is infeasible to recover plain passwords from hashed passwords. The cryptographic hash function maps the data of arbitrary size to a fixed-size sequence of bits. In the authentication system that using the hashed password scheme, only hashed passwords are stored. However, hashed passwords doesn’t resist lookup table attack. Rainbow table attack is more practical for its space-timetradeoff.Processorresourcesand storage resources are becoming richer, so the precomputed tables used in the above two attacks become large, so that adversaries obtain a higher success rate of cracking hashed passwords. Table -1: Attending pattern examples PATTERN EXAMPLE PASSWORD EXAMPLE Appending[0-9] Password1,princess1,angel1 Appending 123 Abc123,love123,red123 Appending 1234 Abcd1234,abc1234,love1234 Appending DOT Password,iloveyou,followingyou Appending ! Iloveyou!, password!, rockypu! Appending 101 Love101,zoey101,),sweet101 2) Salted Password: Salted password scheme used to resist precomputation attack. In this scheme, the plain password and a random data (called salt) is hashed through a cryptographic hash function. The salt is usually generated random, which shows that the hash values of the same plain passwords are almost different. The greater the size of the salt is, the password security is higher. However, under dictionary attack, salted passwords are still weak. By comparing with salted password, the ENP proposed guarantees the diversity of passwords without the need for extra elements (e.g., salt). 3) Key Stretching:. Key stretching were introduced to resist the dictionary attack. So that it can change weak password into enhanced password .It could increase the time cost required to every password attempt, so that the power of defending against dictionary attack is increased. In the ENP proposed, like key stretching, multi-iteration encryption is used to further improve password security underdictionary attack. Compared with key stretching, the ENP does not introduce extra elements (e.g., salt). Fig -1: Password hashing 2.1 Negative Database The compression of the complement of a positive database (denoted as DB) is stored in the NDB. Every entry in NDB contains three symbols: ‘0’, ‘1’, and ‘*’. The symbol ‘0’ matches the bit 0, and the symbol ‘1’ match the bit 1; the symbol ‘*’ matches either the bit 0 or 1. Entry in an NDB consists of two kinds of positions: specified positions and unspecified positions. Positions where the symbolsare‘0’or ‘1’ called specified positions, while positions where the symbols ‘*’ called unspecified positions.Then,both‘0’and‘1’ are specified symbols, and the ‘*’ istheunspecified symbol.A sequence of bits is covered by an entry in an NDB; that is to say, the bits of the sequence are matches the symbols of the entry at the specified positions. If a sequence of bits is covered by one entry in an NDB, says that the sequence is covered by the NDB. If an NDB covers every entry in the (U- DB), says that the NDB is complete; otherwise, it is incomplete. The NDB converted from a DB with one entry is called the single NDB; otherwise, it is called the multiple NDB. There are two types of NDB generation algorithms, one for the single NDBs and one for multiple NDBs. In the first type, Clause distribution control algorithm,1-hiddenalgorithm, 2- hidden algorithm, q-hidden algorithm, hybrid algorithm, p- hidden algorithm, and K-hidden algorithm has been proposed successively. In the second type, the prefix algorithm,RandomizeNDB(abbreviatedasRNDB),multiple- solution algorithm proposed successively. These algorithms could also be used to generate single NDBs. 3. PROPOSED SYSTEM The proposed framework two consist of the registration phase and authentication phase. The main framework to protect passwords in the authentication data table, the system designer should first select a cryptographic hash function and a symmetric-key algorithm, where the condition satisfied is that the size of the hash value of selected cryptographic hash function is equal to key size of the selected symmetric-key algorithm. In addition, cryptographic hash functionsandsymmetric-keyalgorithms
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1884 could also be used in the ENP, which adequately indicates the flexibility of our framework. 3.1 Registration Phase The registration phase consist of six steps. (1) On the client section, a user enters his/herusernameand password. Then, the entered username and plain password are transmitted to the server through a secure channel; (2) If the received username existsintheauthenticationdata table, “The username already exists!” is displayed, which means that the server has rejected the registration, and the registration phase is terminated; otherwise, go to Step (3); (3) Then the received password is hashed using the selected cryptographic hash function. (4) The hashed password is then converted into a negative password using an NDB generation. (5) The negative password is then encryptedtoanENPusing the selected symmetric-key algorithm, where thekeywill be the hash value of the plain password. The additional option, multi-iteration encryption could be used for enhancing passwords. 6) The username and the resulting ENP get stored in the authentication data table and “Registration success” is displayed, means that the server has been accepted the registration request. 3.2 Authentication Phase The authentication phase consist of five steps. (1) On the client section, a user enters his/herusernameand password. Then, the username and plain password get transmitted to the server through a secure channel. (2) If the received username does not exist in the authentication data table, then “Incorrect username or password!” is displayed, which means that the server get rejected the authentication request, and the authentication phase is terminated; otherwise, go to Step (3); (3) Search for the authentication data table for the ENP corresponding to the received username; (4) The ENP is then decrypted (one or more times according to the encryption setting in the registration phase) usingthe selected symmetric-key algorithm, where that the selected key is the hash value of the plain password; so, the negative password is obtained; (5) If the hash value that has been received password is not the solution of the negative password, then “Incorrect username or password!” is displayed, which means that the server rejected the authentication request, then the authentication phase is terminated; otherwise, “Authentication success” is returned, that means that the server has accepted the authentication request. ENPs could be obtained by the following steps. The received plain password (i.e., a sequence of characters) from a client is then hashed using a cryptographic hash function. Next, that received hashed password is converted into a negative password using an NDB generation algorithm, the negative password is then encrypted using a symmetric-key algorithm. So, the ENP is obtained. The solution of the negative password will be the hash value of the received plain password. In this processing, each component (i.e., the cryptographic hash function, the symmetric-key algorithm, and the NDB generation algorithm) is indispensable. The cryptographic hash function will converts plain passwords to hashed passwords; the fixed length property of that received hashed passwords offers convenience fortheother subsequent encryption, since the length requirementfor the secret key in the symmetric key algorithm; and other properties (such as avalanche effectandcollisionresistance) are also important factors of employing the cryptographic hash function. The reason behind this is theconversion from a hashed password to a negative password is not irreversible; therefore, if no encryption, when an adversary obtains a negative password, then immediately obtains the corresponding hashed password, which makes the strength of the ENP equivalent to that of the hashed password. 4. CONCLUSION This paper proposed a password protection scheme called ENP, and presenting the password authentication framework based on the ENP. In this framework, the entries on the authentication data table are ENPs. In the end, analyzed and compared the attack complexity of hashed password, salted password, key stretching and the ENP.The results will show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is clear that the ENP does not need extra elements (e.g., salt) while resistinglookuptableattack.Inthe future, other NDB generation algorithms will be studiedand introduced to the ENP to further improving password security. Furthermore, other techniques, also can be used such as multi factor authentication and challenge–response authentication, will be introduced into our password authentication framework. For securing the encrypted negative password is then encrypted using the RSA algorithm. REFERENCES [1] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “Passwords and the evolution of imperfect authentication,” Communications of the ACM, vol. 58, no. 7, pp. 78–87, Jun. 2015.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1885 [2] M. A. S. Gokhale and V. S. Waghmare, “The shoulder surfing resistant graphical password authentication technique,” ProcediaComputerScience,vol.79,pp.490–498, 2016. [3] J. Ma, W. Yang, M. Luo, and N. Li, “A study of probabilistic passwordmodels,” in Proceedings of 2014 IEEESymposium on Security and Privacy, May 2014, pp. 689–704. [4] A. Adams and M. A. Sasse, “Users are not the enemy,” Communications of the ACM, vol. 42, no. 12, pp. 40–46, Dec. 1999. [5] E. H. Spafford, “Opus: Preventing weak password choices,” Computers & Security, vol. 11, no. 3, pp. 273–278, 1992. [6] Y. Li, H. Wang, and K. Sun, “Personal information in passwords and its security implications,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2320–2333, Oct. 2017. [7] D. Florencio and C. Herley, “A large-scale study of web password habits,” in Proceedings of the 16th International Conference on World Wide Web. ACM, 2007, pp. 657–666. [8] R. Shay, S. Komanduri, A. L. Durity, P. S. Huh, M. L. Mazurek, S. M. Segreti, B. Ur, L. Bauer, N. Christin, and L. F. Cranor, “Designing password policies for strength and usability,” ACM Transactions on Information and System Security, vol. 18, no. 4, pp. 13:1–13:34, May 2016. [9] D. Wang, D. He, H. Cheng, and P. Wang, “fuzzyPSM: A new password strength meter using fuzzy probabilistic context- free grammars,” in Proceedings of 2016 46th Annual IEEE/IFIP International Conference on DependableSystems and Networks, Jun. 2016, pp. 595–606. [10] H. M. Sun, Y. H. Chen, and Y. H. Lin, “oPass: A user authentication protocol resistant to password stealing and password reuse attacks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 651–663, Apr. 2012. [11] M. Zviran and W. J. Haga, “Password security: An empirical study,” Journal of Management Information Systems, vol. 15, no. 4, pp. 161– 185, 1999. [12] P. Andriotis, T. Tryfonas, and G. Oikonomou, “Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method,” in Proceedings of Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, 2014, pp. 115– 126. [13] D. P. Jablon, “Strong password-only authenticated key exchange,” SIGCOMMComputerCommunicationReview,vol. 26, no. 5, pp. 5–26, Oct. 1996. [14] J. Jose, T. T. Tomy, V. Karunakaran, A. K. V, A. Varkey, and N. C. A., “Securing passwordsfromdictionaryattack with character-tree,” in Proceedings of 2016 International Conference on Wireless Communications, Signal Processing and Networking, Mar. 2016, pp. 2301–2307. [15] A. Arora, A. Nandkumar, and R. Telang, “Does information security attack frequency increase with vulnerability disclosure? an empirical analysis,”Information Systems Frontiers, vol. 8, no. 5, pp. 350–362, Dec. 2006.