SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1597
Encrypted Negative Password using for Authentication
Priya K P1, Dr. Lakshmi J. V. N2
1MCA Student of Information Security Management Service, 2Associate Professor,
1,2Department of Computer Application, Jain Deemed-To-Be University, Bangalore, Karnataka, India
ABSTRACT
Password authentication is one of most likely used authenticationtechniques.
Secure password storage is the most difficult process. In this paper, we
propose a password confirmations structure that is intended for secure
password storage and could be effectively coordinated into existing
authentication systems. In this project, first we receive the plain text from the
user then hashed through a cryptographic function. The next step, hashed
password is converted into a negative password. Finally, the negative
password is encrypted into an EncryptedNegativePasswordusing encryption
algorithm. Challenge–responseauthenticationandmulti-factorauthentication
could be employed to further improve security.
KEYWORDS: Encrypted Negative Password, Algorithm, Blowfish, hashpassword,
encryption
How to cite this paper: Priya K P | Dr.
Lakshmi J. V. N "Encrypted Negative
Password using for Authentication"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-4 | Issue-6,
October 2020,
pp.1597-1599, URL:
www.ijtsrd.com/papers/ijtsrd35711.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
Now day’s cyber-offense is most common, in that password
cracking is one of the attacks. For instance, many user takes
week password according to their familiar vocabulary and
uses the same password for different system. The attacker
uses many ways to get the credentials such as guess the
password, or shoulder surfing, and other passwordcracking
tool is used to steel the sensitive data. To overcome this
problem we should use strongly hashed encrypted
password. The combination of hash function and encryption
work make it is hard to split passwords from ENPs. The
analysis and comparison of algorithm show that the ENP
cloud oppose lookup table assault and give stronger
protection of a password under dictionary assault. Here we
take two steps to make a strong password, first hashing the
password then encrypt the password.
2. Existing system
The aim of the paper is enhancing the security. However,
password is leaked from the week system. Some old system
are more vulnerable due to their lack of maintenance and
algorithm limitations. The hashing and encryption method
leads to lookup table attack and dictionary attack. The older
ENPs uses hashingandencryptionalgorithmwithoutneedof
any additional information except the plain password. And
also in the existing system uses the hashing algorithm such
as MD5 and SHA1 to 256. The encryption algorithm AES and
RSA.[1],[2] The algorithm analysisshowsthatthesealgorithms
as its own drawbacks to overcome this problem hashing
algorithm PBKDF2 and encryption algorithmBlowfish isuse
to improve the security. And also using salt function will
provide stronger protection to the password.
3. Proposed system
The combination ofhashfunctionandsymmetricencryption,
make it is difficult to split passwords from ENP system. The
algorithm analysis and comparison show that the ENP
provides the more security to the password system. In this
system using theadditional informationtothepasswordthat
is add salt value to the plain password it is more difficult to
crack the password system. And also implement the Multi-
iteration encryption provides more security to the system.
A. Methodology
The proposed framework includes two phases: the
registration section and authentication section. Once
adopting ourframework tosafeguardpasswordsinassociate
authenticationinformationtable,thesystemdesignershould
initial choose a cryptographic hash function and a
symmetric-key algorithm, where the conditionthathastobe
satisfied is the size of the hash value of the chosen
cryptographic hash function is capable the key size of the
chosen symmetric key algorithm.
Registration phase
1. User enters the plain text such as user name and
password.
2. The system checks the user name exist in the database
or not.
3. Then received password is hashed through hashing
algorithm such as PBKDF2 withHMAC-SHA1.
4. Hashed password converted into negative password
using NDB algorithm.
IJTSRD35711
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1598
5. Encrypt the negative password using symmetric
encryption algorithm such as Blowfish algorithm.
6. Finally, store the encrypted password in the
authentication table.
Authentication phase
1. If existing user,theUsernameandpasswordtransmitted
to server.
2. Verify the username and password ,if existing the user
name,
3. Search the ENP from the authentication table.
4. ENP is then decrypted it will get the hash value of the
plain text.
5. If the hash value matches user can login. Architecture
The below figure shows a general diagram the activities
System Architecture Diagram
Fig.1: Block Diagram of ENP
B. Algorithms
PBKDF2- This is one in the PBE algorithm. It applies a
pseudorandom function like hashbasedauthenticationcode
(HMAC) to the input text together with the salt value and
repeat the processes accurately and over to produce a
derived key which might be used as a cryptographic key
in the subsequent operation.
The strength of the PBKDF2 is makes it more durable for
somebody to determine your master password by making
repeated guesses in a brute forces attack. For giving better
opposition against brute force attacks, PBKDF2 presents
CPU-intensive operations. These tasks rely upon an iterated
pseudorandom work (PRF) which aides input values to a
derived key. The most significant properties to guarantee is
that the iterated pseudorandom function is cycle free. The
PBKDF2 includes a 5input parameters. Pseudorandom
function, original password, sequence of bits, number of
iteration, specify the derived key length. [13]
Fig.2: PBKDF2 Algorism
DK= PBKDF2 (PRF, Password, Salt, C, DKlen).[13]
Derived key DK U1 = F (password, salt, c, dkIen)
F (password, salt, c, I) = U1 ^ U2 ^………^ UC-1
Where
U1 = PRF( p,s,c,1 )
U2 = PRF( p,s,c,2 )
..
Uc = PRF(p,s,c,n-1)
Each single square Ti - i.e., Ti = Function (p, s, c, i) - is
computed as Ti = U1 ⊕ U2 ⊕ ... ⊕ Uc
BLOWFISH-Drop-in replacement for DES and IDEA
algorithm. Blowfish is a symmetric encryption algorithm, it
uses one key for encryption and the same key is used for
decryption. The algorithm analysis shows that blow
fish algorithm is Faster Encryptionanddecryptiontime. And
it uses less memory (5KB). Blowfish records the
highest average entropy per byte of encryption, this is the
achievement of new security aspect. Easily modified for
different security levels. [4][14]Thisalgorithmcontainsfeaster
structure, and size of the Plain text 64 bits. Blowfish has a
variable key length up to maximize of 448 long, making it
both flexible and secure. This algorithm contains 16 rounds
to produce the cipher text.
Working
The working of blowfish is divide the plain text into left and
right respectively, and perform the XOR operations on the
left part in original password with using sub key divided
from original plain text. The XOR output apply to the
function, then function output XOR to the right side plain
text. Swap the output each other, the same procedure is
repeated for 16 rounds after 16th round directlyaddthesub
keys to produce the chipper text.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1599
Fig.3: Blowfish Algorithm
Function value
Function f divided into 4 S-boxes. The function isolates a 32-
bit input into four bytes and utilizations thoseasindicesinto
an S-array. The lookup results are then gathered and XORed
single unit to create the output.
Fig.4: Graphic portrayal of F
Algorithm
Divide 64-bits into two 32 bits(L,R)
For i=1 to 16
• XL = XL XOR Pi
• XR = F(XL) XOR XR
• Swap XL and XR
Swap XL and XR(16 Rounds)
XR = XR XOR 17
XL = XL XOR P18
Concatenate XL and XR
C. Advantages
Stronger security algorithm that provides resistance to vary
reasonably attacks as well as dictionary attacks and look-up
table attack. No further burden on programmers for
configuring additional parameters. And also Easy and
convenient to use. This is light weight efficient password
protection scheme and easier to integrate this with existing
systems. It provides a robust security against
various sorts of attack. To provide an
efficient interface access to the clients to access the
portal. And deploy the project over the cloud in order
that it are often accessed from various geographical
location from any device.
4. Conclusion
Thus this encrypted negative word may be usedforsecuring
the password and conjointly the webpages.ThisENPsystem
prevents the rainbow table assault and also the look up
assault and secures the passwords. The password used is
safe and nobody will ever attempt to break the password.
Rather than simply hashing weareconvertingthehashvalue
into negative values and encrypting. So throughout during
verification also thus we check whether it’s the solution or
not but do not know the actual password. In the future,
various NDB generation algorithms will be considered and
acquainted with the ENP to improve e password security.
Furthermore, different techniques, like multi–factor
authentication and challenge–response authentication, are
going to be introduced into our secret authentication
framework.
References
[1] Authentication byEncrypted NegativePaawordforan
Intuitive Stock Management System. K.Subramanian,
V.Sreyas, M.Nikitha and S.Arathi. 2019, SSRG
Intranatinal Journal of computer Science and
Engineering(SSRG-IJCSE).
[2] Encrypted Negative Password Using RSA Algorithm.
Salwa P.B, Nice Mathew.2019,International Research
Journal of Engineering and Technology(IRJET).
[3] ieeexplore.ieee.org.
[4] A Comparison of Cryptographic Algorithms: DES,
3DES, AES, RSA and Blowfish for Guessing Attacks
Prevention. Mohammed Nazeh Abdul Wahid,
Abdulrahman Ali, Babak Esparham and Mohamed
Marwan. 2018, Journal of Computer Science
Applications and information technology,.
[5] Priyadarshini Patil, Prashant Narayan, Narayan D.G.,
Meena S.M. A Comprehensive Evaluation of
Cryptographic Algorithms: DES, 3DES, AES, RSA and
Blowfish. 2016.
[6] dspace.calstate.edu › bitstream › handle ›
ChidriLaxmi_Project2019.
[7] Authentication by Encrypted NegativePassword.Luo,
Wenjian. 2018, IEEE.
[8] Comparison of Encryption Algorithms: AES, Blowfish
and Twofish for Security of Wireless Networks.
Ghosh, Archisman. 2020, International Research
Journal of Engineering and Technology (IRJET) , p. 4.
[9] Wikipedia. en.wikipedia.org › wiki › Password.
[10] RSA Algorithm using modified subset sum
cryptosytem. Sonal S, Prasanth S, Rvi Shankar D. s.l. :
2nd international confrence on computer and
communication technology, 2011.
[11] Alarge scale stydy of web password habits.
D.Florencio andC .Herly. s.l. : 16th international
confrence on world wide web, 2017. ACM.
[12] Semanticscholar. www.semanticscholar.org › paper ›
Authentication-by-Encrypted-Negative-....
[13] wikipedia. en.wikipedia.org › wiki › PBKDF2.
[14] www.embedded.com › ... › Encrypting data with the
Blowfish algorithm.

More Related Content

What's hot

IRJET- Encrypted Negative Password using RSA Algorithm
IRJET- Encrypted Negative Password using RSA AlgorithmIRJET- Encrypted Negative Password using RSA Algorithm
IRJET- Encrypted Negative Password using RSA Algorithm
IRJET Journal
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
IJCNCJournal
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
Nagendra Posani
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
IJNSA Journal
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
ShrikantSharma86
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
Christopher Frenz
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
IJRES Journal
 
N45028390
N45028390N45028390
N45028390
IJERA Editor
 

What's hot (20)

Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
IRJET- Encrypted Negative Password using RSA Algorithm
IRJET- Encrypted Negative Password using RSA AlgorithmIRJET- Encrypted Negative Password using RSA Algorithm
IRJET- Encrypted Negative Password using RSA Algorithm
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
 
82 86
82 8682 86
82 86
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
 
N45028390
N45028390N45028390
N45028390
 

Similar to Encrypted Negative Password using for Authentication

Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164Thivya Devaraj
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
IJNSA Journal
 
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for CryptographyImplementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
AM Publications
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption Algorithm
Khubaib Ahmad Kunjahi
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
International Journal of Science and Research (IJSR)
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
MahmudJion
 
Slide cipher based encryption
Slide cipher based encryptionSlide cipher based encryption
Slide cipher based encryption
Mizi Mohamad
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
CSCJournals
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
Editor IJCATR
 

Similar to Encrypted Negative Password using for Authentication (20)

Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for CryptographyImplementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption Algorithm
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
Slide cipher based encryption
Slide cipher based encryptionSlide cipher based encryption
Slide cipher based encryption
 
82 86
82 8682 86
82 86
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Encrypted Negative Password using for Authentication

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1597 Encrypted Negative Password using for Authentication Priya K P1, Dr. Lakshmi J. V. N2 1MCA Student of Information Security Management Service, 2Associate Professor, 1,2Department of Computer Application, Jain Deemed-To-Be University, Bangalore, Karnataka, India ABSTRACT Password authentication is one of most likely used authenticationtechniques. Secure password storage is the most difficult process. In this paper, we propose a password confirmations structure that is intended for secure password storage and could be effectively coordinated into existing authentication systems. In this project, first we receive the plain text from the user then hashed through a cryptographic function. The next step, hashed password is converted into a negative password. Finally, the negative password is encrypted into an EncryptedNegativePasswordusing encryption algorithm. Challenge–responseauthenticationandmulti-factorauthentication could be employed to further improve security. KEYWORDS: Encrypted Negative Password, Algorithm, Blowfish, hashpassword, encryption How to cite this paper: Priya K P | Dr. Lakshmi J. V. N "Encrypted Negative Password using for Authentication" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6, October 2020, pp.1597-1599, URL: www.ijtsrd.com/papers/ijtsrd35711.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION Now day’s cyber-offense is most common, in that password cracking is one of the attacks. For instance, many user takes week password according to their familiar vocabulary and uses the same password for different system. The attacker uses many ways to get the credentials such as guess the password, or shoulder surfing, and other passwordcracking tool is used to steel the sensitive data. To overcome this problem we should use strongly hashed encrypted password. The combination of hash function and encryption work make it is hard to split passwords from ENPs. The analysis and comparison of algorithm show that the ENP cloud oppose lookup table assault and give stronger protection of a password under dictionary assault. Here we take two steps to make a strong password, first hashing the password then encrypt the password. 2. Existing system The aim of the paper is enhancing the security. However, password is leaked from the week system. Some old system are more vulnerable due to their lack of maintenance and algorithm limitations. The hashing and encryption method leads to lookup table attack and dictionary attack. The older ENPs uses hashingandencryptionalgorithmwithoutneedof any additional information except the plain password. And also in the existing system uses the hashing algorithm such as MD5 and SHA1 to 256. The encryption algorithm AES and RSA.[1],[2] The algorithm analysisshowsthatthesealgorithms as its own drawbacks to overcome this problem hashing algorithm PBKDF2 and encryption algorithmBlowfish isuse to improve the security. And also using salt function will provide stronger protection to the password. 3. Proposed system The combination ofhashfunctionandsymmetricencryption, make it is difficult to split passwords from ENP system. The algorithm analysis and comparison show that the ENP provides the more security to the password system. In this system using theadditional informationtothepasswordthat is add salt value to the plain password it is more difficult to crack the password system. And also implement the Multi- iteration encryption provides more security to the system. A. Methodology The proposed framework includes two phases: the registration section and authentication section. Once adopting ourframework tosafeguardpasswordsinassociate authenticationinformationtable,thesystemdesignershould initial choose a cryptographic hash function and a symmetric-key algorithm, where the conditionthathastobe satisfied is the size of the hash value of the chosen cryptographic hash function is capable the key size of the chosen symmetric key algorithm. Registration phase 1. User enters the plain text such as user name and password. 2. The system checks the user name exist in the database or not. 3. Then received password is hashed through hashing algorithm such as PBKDF2 withHMAC-SHA1. 4. Hashed password converted into negative password using NDB algorithm. IJTSRD35711
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1598 5. Encrypt the negative password using symmetric encryption algorithm such as Blowfish algorithm. 6. Finally, store the encrypted password in the authentication table. Authentication phase 1. If existing user,theUsernameandpasswordtransmitted to server. 2. Verify the username and password ,if existing the user name, 3. Search the ENP from the authentication table. 4. ENP is then decrypted it will get the hash value of the plain text. 5. If the hash value matches user can login. Architecture The below figure shows a general diagram the activities System Architecture Diagram Fig.1: Block Diagram of ENP B. Algorithms PBKDF2- This is one in the PBE algorithm. It applies a pseudorandom function like hashbasedauthenticationcode (HMAC) to the input text together with the salt value and repeat the processes accurately and over to produce a derived key which might be used as a cryptographic key in the subsequent operation. The strength of the PBKDF2 is makes it more durable for somebody to determine your master password by making repeated guesses in a brute forces attack. For giving better opposition against brute force attacks, PBKDF2 presents CPU-intensive operations. These tasks rely upon an iterated pseudorandom work (PRF) which aides input values to a derived key. The most significant properties to guarantee is that the iterated pseudorandom function is cycle free. The PBKDF2 includes a 5input parameters. Pseudorandom function, original password, sequence of bits, number of iteration, specify the derived key length. [13] Fig.2: PBKDF2 Algorism DK= PBKDF2 (PRF, Password, Salt, C, DKlen).[13] Derived key DK U1 = F (password, salt, c, dkIen) F (password, salt, c, I) = U1 ^ U2 ^………^ UC-1 Where U1 = PRF( p,s,c,1 ) U2 = PRF( p,s,c,2 ) .. Uc = PRF(p,s,c,n-1) Each single square Ti - i.e., Ti = Function (p, s, c, i) - is computed as Ti = U1 ⊕ U2 ⊕ ... ⊕ Uc BLOWFISH-Drop-in replacement for DES and IDEA algorithm. Blowfish is a symmetric encryption algorithm, it uses one key for encryption and the same key is used for decryption. The algorithm analysis shows that blow fish algorithm is Faster Encryptionanddecryptiontime. And it uses less memory (5KB). Blowfish records the highest average entropy per byte of encryption, this is the achievement of new security aspect. Easily modified for different security levels. [4][14]Thisalgorithmcontainsfeaster structure, and size of the Plain text 64 bits. Blowfish has a variable key length up to maximize of 448 long, making it both flexible and secure. This algorithm contains 16 rounds to produce the cipher text. Working The working of blowfish is divide the plain text into left and right respectively, and perform the XOR operations on the left part in original password with using sub key divided from original plain text. The XOR output apply to the function, then function output XOR to the right side plain text. Swap the output each other, the same procedure is repeated for 16 rounds after 16th round directlyaddthesub keys to produce the chipper text.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35711 | Volume – 4 | Issue – 6 | September-October 2020 Page 1599 Fig.3: Blowfish Algorithm Function value Function f divided into 4 S-boxes. The function isolates a 32- bit input into four bytes and utilizations thoseasindicesinto an S-array. The lookup results are then gathered and XORed single unit to create the output. Fig.4: Graphic portrayal of F Algorithm Divide 64-bits into two 32 bits(L,R) For i=1 to 16 • XL = XL XOR Pi • XR = F(XL) XOR XR • Swap XL and XR Swap XL and XR(16 Rounds) XR = XR XOR 17 XL = XL XOR P18 Concatenate XL and XR C. Advantages Stronger security algorithm that provides resistance to vary reasonably attacks as well as dictionary attacks and look-up table attack. No further burden on programmers for configuring additional parameters. And also Easy and convenient to use. This is light weight efficient password protection scheme and easier to integrate this with existing systems. It provides a robust security against various sorts of attack. To provide an efficient interface access to the clients to access the portal. And deploy the project over the cloud in order that it are often accessed from various geographical location from any device. 4. Conclusion Thus this encrypted negative word may be usedforsecuring the password and conjointly the webpages.ThisENPsystem prevents the rainbow table assault and also the look up assault and secures the passwords. The password used is safe and nobody will ever attempt to break the password. Rather than simply hashing weareconvertingthehashvalue into negative values and encrypting. So throughout during verification also thus we check whether it’s the solution or not but do not know the actual password. In the future, various NDB generation algorithms will be considered and acquainted with the ENP to improve e password security. Furthermore, different techniques, like multi–factor authentication and challenge–response authentication, are going to be introduced into our secret authentication framework. References [1] Authentication byEncrypted NegativePaawordforan Intuitive Stock Management System. K.Subramanian, V.Sreyas, M.Nikitha and S.Arathi. 2019, SSRG Intranatinal Journal of computer Science and Engineering(SSRG-IJCSE). [2] Encrypted Negative Password Using RSA Algorithm. Salwa P.B, Nice Mathew.2019,International Research Journal of Engineering and Technology(IRJET). [3] ieeexplore.ieee.org. [4] A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. Mohammed Nazeh Abdul Wahid, Abdulrahman Ali, Babak Esparham and Mohamed Marwan. 2018, Journal of Computer Science Applications and information technology,. [5] Priyadarshini Patil, Prashant Narayan, Narayan D.G., Meena S.M. A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. 2016. [6] dspace.calstate.edu › bitstream › handle › ChidriLaxmi_Project2019. [7] Authentication by Encrypted NegativePassword.Luo, Wenjian. 2018, IEEE. [8] Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks. Ghosh, Archisman. 2020, International Research Journal of Engineering and Technology (IRJET) , p. 4. [9] Wikipedia. en.wikipedia.org › wiki › Password. [10] RSA Algorithm using modified subset sum cryptosytem. Sonal S, Prasanth S, Rvi Shankar D. s.l. : 2nd international confrence on computer and communication technology, 2011. [11] Alarge scale stydy of web password habits. D.Florencio andC .Herly. s.l. : 16th international confrence on world wide web, 2017. ACM. [12] Semanticscholar. www.semanticscholar.org › paper › Authentication-by-Encrypted-Negative-.... [13] wikipedia. en.wikipedia.org › wiki › PBKDF2. [14] www.embedded.com › ... › Encrypting data with the Blowfish algorithm.