ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Enhanced Security Model for Simple Reformation-Based Password Scheme using PHP

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 5)

Publication Date:

Authors : ; ; ; ; ;

Page : 40-50

Keywords : Security; Authentication techniques; data attacks; password scheme; colour password session;

Source : Downloadexternal Find it from : Google Scholarexternal


Lack of security has become a major concern, given the prevalence of attackers, hackers, crackers, scammers and spammers. A key area in security research and practice is authentication, the determination of whether a user should be allowed to access a given system or resource. Existing authentication processes are usually accomplished by user ID and password, with the authentication schemes Pair-based Authentication scheme based. Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this research paper, two different techniques are proposed to generate session passwords using text and colors which are resistant and more secured. These methods are suitable for Personal Digital Assistants. These methods are suitable for Personal Digital Assistants. This scheme can authenticate the user by session passwords that are used only once. It is no longer useful if the session is terminated. For every login process, users have to feed the input with different passwords. It provides better security against dictionary and brute force attacks as password changes for every session. The proposed authentication schemes use text, colors and images for generating session passwords.

Last modified: 2022-05-22 21:24:56