Web Application:(with) HoneyWords and HoneyEncryption
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 2)Publication Date: 2015-02-05
Authors : Harish Reddy B; Beatrice Ssowmiya J;
Page : 2313-2316
Keywords : Honeywords; Honey Encryption; Authentication; Security; Password;
- The Benefits of the Absolute Quantifying Method with TaqMan Probeversus Other Methods
- A Novel UV-Vis Spectrophotometric Method for Quantifying Rifaximin: Method Development and Validation
- Role of Quantitative Methods in Quantifying
- Clinical Characterization of H1N1 Influenza Taqman Real Time PCR Positive Cases
- Absolute Polar Duty Cycle Division Multiplexing: A Spectrally Efficient Multiplexing Method
Abstract
It has become much easier for an attacker to steal hash passwords and enter into the account through legitimate user by cracking the hash passwords. So, for each user account, the legitimate password is stored with several honeywords in order to sense impersonation. If honeywords are selected properly, an adversary who steals a file of hashed passwords cannot be sure if it is the real password or a honeyword for any account. Moreover, entering with a honeyword to login will trigger an alarm notifying the administrator about a password file breach. Here I am implementing Honey Encryption for the protection of data stored by the user in a web application, that produces a cipher text, which, when decrypted with an incorrect key as guessed by the attacker, presents a plausible-looking yet incorrect plaintext password or encryption key.
Other Latest Articles
- Household Appliance Scheduling
- A Survey on Image Segmentation Techniques
- Diagnosis of Heart Disease Using Data Mining Technique
- Antioxidant Activity of Methanolic Extract of Cordia dichotoma Collected from Different Geographical Region
- Miswak (Salvadora persica) Roots as Antibacterial Agent and a Potential Food Bio Preservative
Last modified: 2021-06-30 21:22:46