Security Design Pattern for Login System through Authentication using Modified Sha-384 Algorithm
Authors/Creators
- 1. Department of Computer Engineering, Research Scholar, JJT University, Jhunjhunu (Rajasthan), India.
- 2. Department of Computer Engineering, Bharati Vidyapeeth (Deemed To be university), Pune (Maharashtra), India
Contributors
- 1. Publisher
Description
The research has been carried out to develop secure login system by authenticating the login using modified SHA-384 algorithm. It derives 896-bit hash value for the password entered by the user in the user registration form and saves the credentials entered by the user in system’s database. Results obtained are evaluated by resolving the general attacks confirmed that the modified SHA-384 algorithm was more secured compared to the original SHA-384 algorithm as it was not broken using generic attacks such as brute force, rainbow table and other cracking tools available online such as Cain and Abel. The performance of the modified algorithm was measured with only 2 ms additional execution time from SHA-384.
Files
H92440610821.pdf
Files
(671.6 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:dfad54e377b1282be4840748f29a6f2d
|
671.6 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2278-3075 (ISSN)
Subjects
- ISSN
- 2278-3075
- Retrieval Number
- 100.1/ijitee.H92440610821