PASSWORD ENCRYPTION BASED ON DYNAMIC GRAPH LABELING PRIORITY GENERATION (D.G.L.P.G.) TECHNIQUE

The formalization of speedy technical environment due to the progression in hardware technologies is consistently stimulating the terror of brute force attacks and challenging even the strongest encryption algorithms. Current security requisition can never be truly fulfilled if security system of any real world system is dependent upon only static protection mechanism. A dynamic approach must have to be adopted to integrate dynamic protection mechanism along with static protection mechanism. Within in this scope both static and dynamic password encryption mechanisms face the danger of being attacked. Here we have expressed our concern for dynamic password security system which acts as shield against Man in the Middle attacks. In this paper we propose a password encryption technique based on the “Dynamic Graph Labeling Priority Generation (D.G.L.P.G.) Technique” and “Dynamic False Node Insertion (D.F.N.I) Technique” for dynamic password. The algorithm has achieved very low space complexity and time complexity which is O(log n). The emerged technique fits itself in the boundary of the present requisition and is flexible enough to expand its magnitude with the amplifying needs up to the boundary mark of the presented algorithm.

[2]  Okkyung Choi,et al.  Two-factor authentication system based on extended OTP mechanism , 2013, Int. J. Comput. Math..

[3]  Jenq-Shiou Leu,et al.  Design of a time and location based One-Time Password authentication scheme , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[4]  Abhilash Shukla,et al.  Security using 3D Password , 2015 .

[5]  P. Balamuralidhar,et al.  One time password authentication scheme based on elliptic curves for Internet of Things (IoT) , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).

[6]  Fred Cheng Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm , 2011, Mob. Networks Appl..

[7]  Paul Dowland,et al.  Secure Graphical One Time Password (GOTPass): An Empirical Study , 2015, Inf. Secur. J. A Glob. Perspect..

[8]  Muhammad Khurram Khan,et al.  OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[9]  Sumaiya Thaseen,et al.  GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION , 2012 .

[10]  Neha Vishwakarma,et al.  Secure Image Based One Time Password , 2016 .

[11]  Vishal Kolhe,et al.  Secure Authentication with 3D Password , 2013 .

[12]  Krishna M. Sivalingam,et al.  An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.

[14]  Xiaoping Li,et al.  Research on the S / KEY one-time password authentication system and its application in banking and financial systems , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[15]  D. Sumathy OTP Encryption Techniques in Mobiles forAuthentication and Transaction Security , 2014 .

[16]  Weizhong Qiang,et al.  Cloud Authentication Based on Anonymous One-Time Password , 2013 .

[17]  S. Ramesh,et al.  Implementing One Time Password based security mechanism for securing personal health records in cloud , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[18]  Ashwini A. Khatpe,et al.  3D LoginFor More Secure Authentication , 2014 .

[19]  Chun-Ying Huang,et al.  Using one-time passwords to prevent password phishing attacks , 2011, J. Netw. Comput. Appl..

[20]  Varun Gandhi,et al.  New Era of authentication: 3-D Password , 2012 .