Encrypted Negative Password Using For Authentication
Encrypted Negative Password Using For Authentication
Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1597
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
5. Encrypt the negative password using symmetric
encryption algorithm such as Blowfish algorithm.
6. Finally, store the encrypted password in the
authentication table.
Authentication phase
1. If existing user, the Username and password transmitted
to server.
2. Verify the username and password ,if existing the user
name,
3. Search the ENP from the authentication table.
4. ENP is then decrypted it will get the hash value of the
plain text.
5. If the hash value matches user can login. Architecture
The below figure shows a general diagram the activities
The strength of the PBKDF2 is makes it more durable for BLOWFISH-Drop-in replacement for DES and IDEA
somebody to determine your master password by making algorithm. Blowfish is a symmetric encryption algorithm, it
repeated guesses in a brute forces attack. For giving better uses one key for encryption and the same key is used for
opposition against brute force attacks, PBKDF2 presents decryption. The algorithm analysis shows that blow
CPU-intensive operations. These tasks rely upon an iterated fish algorithm is Faster Encryption and decryption time. And
pseudorandom work (PRF) which aides input values to a it uses less memory (5KB). Blowfish records the
derived key. The most significant properties to guarantee is highest average entropy per byte of encryption, this is the
that the iterated pseudorandom function is cycle free. The achievement of new security aspect. Easily modified for
PBKDF2 includes a 5input parameters. Pseudorandom different security levels. [4][14] This algorithm contains feaster
function, original password, sequence of bits, number of structure, and size of the Plain text 64 bits. Blowfish has a
iteration, specify the derived key length. [13] variable key length up to maximize of 448 long, making it
both flexible and secure. This algorithm contains 16 rounds
to produce the cipher text.
Working
The working of blowfish is divide the plain text into left and
right respectively, and perform the XOR operations on the
left part in original password with using sub key divided
from original plain text. The XOR output apply to the
function, then function output XOR to the right side plain
text. Swap the output each other, the same procedure is
repeated for 16 rounds after 16th round directly add the sub
keys to produce the chipper text.
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1598
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
protection scheme and easier to integrate this with existing
systems. It provides a robust security against
various sorts of attack. To provide an
efficient interface access to the clients to access the
portal. And deploy the project over the cloud in order
that it are often accessed from various geographical
location from any device.
4. Conclusion
Thus this encrypted negative word may be used for securing
the password and conjointly the web pages. This ENP system
prevents the rainbow table assault and also the look up
assault and secures the passwords. The password used is
safe and nobody will ever attempt to break the password.
Rather than simply hashing we are converting the hash value
into negative values and encrypting. So throughout during
verification also thus we check whether it’s the solution or
not but do not know the actual password. In the future,
various NDB generation algorithms will be considered and
acquainted with the ENP to improve e password security.
Furthermore, different techniques, like multi–factor
authentication and challenge–response authentication, are
going to be introduced into our secret authentication
framework.
References
[1] Authentication by Encrypted Negative Paaword for an
Intuitive Stock Management System. K.Subramanian,
Fig.3: Blowfish Algorithm V.Sreyas, M.Nikitha and S.Arathi. 2019, SSRG
Intranatinal Journal of computer Science and
Function value Engineering(SSRG-IJCSE).
Function f divided into 4 S-boxes. The function isolates a 32- [2] Encrypted Negative Password Using RSA Algorithm.
bit input into four bytes and utilizations those as indices into Salwa P.B, Nice Mathew. 2019, International Research
an S-array. The lookup results are then gathered and XORed Journal of Engineering and Technology(IRJET).
single unit to create the output. [3] ieeexplore.ieee.org.
[4] A Comparison of Cryptographic Algorithms: DES,
3DES, AES, RSA and Blowfish for Guessing Attacks
Prevention. Mohammed Nazeh Abdul Wahid,
Abdulrahman Ali, Babak Esparham and Mohamed
Marwan. 2018, Journal of Computer Science
Applications and information technology,.
[5] Priyadarshini Patil, Prashant Narayan, Narayan D.G.,
Meena S.M. A Comprehensive Evaluation of
Cryptographic Algorithms: DES, 3DES, AES, RSA and
Blowfish. 2016.
[6] dspace.calstate.edu › bitstream › handle ›
ChidriLaxmi_Project2019.
[7] Authentication by Encrypted Negative Password. Luo,
Fig.4: Graphic portrayal of F Wenjian. 2018, IEEE.
Algorithm [8] Comparison of Encryption Algorithms: AES, Blowfish
Divide 64-bits into two 32 bits(L,R) and Twofish for Security of Wireless Networks.
For i=1 to 16 Ghosh, Archisman. 2020, International Research
• XL = XL XOR Pi Journal of Engineering and Technology (IRJET) , p. 4.
• XR = F(XL) XOR XR [9] Wikipedia. en.wikipedia.org › wiki › Password.
• Swap XL and XR [10] RSA Algorithm using modified subset sum
Swap XL and XR(16 Rounds) cryptosytem. Sonal S, Prasanth S, Rvi Shankar D. s.l. :
XR = XR XOR 17 2nd international confrence on computer and
XL = XL XOR P18 communication technology, 2011.
Concatenate XL and XR [11] Alarge scale stydy of web password habits.
D.Florencio andC .Herly. s.l. : 16th international
C. Advantages confrence on world wide web, 2017. ACM.
Stronger security algorithm that provides resistance to vary [12] Semanticscholar. www.semanticscholar.org › paper ›
reasonably attacks as well as dictionary attacks and look-up Authentication-by-Encrypted-Negative-....
table attack. No further burden on programmers for [13] wikipedia. en.wikipedia.org › wiki › PBKDF2.
configuring additional parameters. And also Easy and [14] www.embedded.com › ... › Encrypting data with the
convenient to use. This is light weight efficient password Blowfish algorithm.
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1599