Efficient Secured Hash Based Password Authentication in Multiple Websites
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
The most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user’s plaintext password to a remote web server, often using secure socket layer. Even when used over an encrypted connection, this form of password authentication is vulnerable to attack. In common password attacks, hackers exploit the fact that web users often use the same password at many different sites. his allows hackers to break into a low security site that simply stores username/passwords in the clear and use the retrieved passwords at a high security site. This work developed an improved secure hash function, whose security is directly related to the syndrome decoding problem from the theory of error-correcting codes. The proposal design and develop a user interface, and mplementation of a browser extension, password hash, that strengthens web password authentication. Providing customized passwords, can reduce the threat of password attacks with no server changes and little or no change to the user experience. The proposed techniques are designed to transparently provide novice users with the benefits of password practices that are otherwise only feasible for security experts. Experimentation are done with Internet Explorer and Fire fox implementations.
Authors and Affiliations
T. S. Thangavel , A. Krishnan
Multiplication Algorithms for VLSI - A Review
In today’s digital world, where portable computers have become as small as the size of palm limitation on processing speed has increased. Thus there’s a need for modification in the traditional approach to overcome this...
PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY
Using smart cards, remote user authentication and key greement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it...
Effective Term Based Text Clustering Algorithms
Text clustering methods can be used to group large sets of text documents. Most of the text clustering methods do not address the problems of text clustering such as very high dimensionality of the data and understandabi...
Modeling Virtual Meetings within Software Engineering Environment
It is a common scenario to see project’s stakeholders, such as managers, team leaders, and developers carrying out their meeting in the online environment without a suitable preparation and facilitation For instance, sta...
DEFINING RELATIONS IN PRECISIATION OF NATURAL LANGUAGE PROCESSING FOR SEMANTIC WEB
As we know people using semantic web which facilitates them to organize, locate and process content. The content access by people comfortably is the natural language which we all use in our day to day life. The Semantic...