Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

AUTHENTICATION BY ENCRYPTED

NEGATIVE PASSWORD
ABSTRACT:
Secure secret phrase stockpiling is an indispensable angle in frameworks in light of
secret word verification, which is as yet the most broadly utilized verification strategy, in
spite of its some security blemishes. In this paper, we propose a secret word verification
system that is intended for secure secret word stockpiling and could be effectively
incorporated into existing confirmation frameworks. In our structure, first, they got plain
secret phrase from a customer is worked out a cryptographic hash work. At that point, the
hashed secret phrase is changed over into a negative secret key. At long last, the negative
secret key is scrambled into an Encrypted Negative Password utilizing a symmetric-key
calculation (e.g., AES), and multi-cycle encryption could be utilized to further improve
security.
The cryptographic hash work and symmetric encryption make it hard to break passwords
from ENPs. Also, there are loads of comparing ENPs for a given plain secret key, which
makes precipitation assaults infeasible. The calculation intricacy investigations and
examinations demonstrate that the ENP could oppose query table assault and give more
grounded secret key insurance under word reference assault. It is value referencing that the
ENP does not present additional components (e.g., salt); other than this, the ENP could at
present oppose precomputation assaults. In particular, the ENP is the primary secret key
securities conspire that consolidates the cryptographic hash work, the negative secret word
and the symmetric-key calculation, without the requirement for extra data with the
exception of the plain secret phrase.
EXISTING SYSTEM PROPOSED SYSTEM

EXISTING CONCEPT:- PROPOSED CONCEPT: -


 In existing framework, secure secret  It depends on the polynomial duty for
phrase stockpiling is an imperative distributed computing, which can understand
viewpoint in frameworks in light of the certainty of database records in the cloud.
secret word confirmation, which is as Also, the proposed plan can bolster open
yet the most generally utilized undeniable nature in that all customers in the
verification system, in spite of its some framework can confirm the database.
security imperfections.

EXISTING TECHNIQUE:- PROPOSED TECHNIQUE:-


 OSVDB  ENP
TECHNIQUE DEFINITION:- TECHNIQUE DEFINITION:-
 The Open Sourced Vulnerability Database  A password protection scheme called Encrypted
was a free and publicly released weakness Negative Password is proposed, which is based
database. The objective of the task was to give on the Negative Database, cryptographic hash
precise, point by point, current, and impartial function and symmetric encryption, and a
specialized data on security vulnerabilities. password authentication framework based on
The task advanced more noteworthy and the ENP is presented.
progressively open cooperation among
organizations and people.

DRAWBACKS:- ADVANTAGES:-
 Not as User-Friendly as Commercial Software.  The advantages of our techniques are analyzing and
 Lack of extensive tech support comparing the attack complexity of our scheme with
that of typical password storage schemes under
lookup table attack and dictionary attack.
MINIMUM SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS
•PROCESSOR : DUAL CORE 2 DUOS.
•RAM : 2GB DD RAM
•HARD DISK : 250 GB

SOFTWARE REQUIREMENTS
•FRONT END : J2EE (JSP, SERVLET), STRUTS
•BACK END : MY SQL 5.5
•OPERATING SYSTEM : WINDOWS 7
•IDE : ECLIPSE
PROPOSED SYSTEM FUTURE ENHANCEMENT

PROPOSED CONCEPT: - FUTURE CONCEPT: -


 It depends on the polynomial  In the future, other NDB
duty for distributed computing, generation algorithms will be
which can understand the studied and introduced to the ENP
certainty of database records in to further improve password
the cloud. Also, the proposed security. Furthermore, other
plan can bolster open techniques, such as multi–factor
undeniable nature in that all authentication and challenge–
customers in the framework can response authentication, will be
confirm the database. introduced into our password
authentication framework

PROPOSED TECHNIQUE:- FUTURE TECHNIQUE:-


 NDB algorithm
 ENP
TECHNIQUE DEFINITION:- TECHNIQUE DEFINITION:-
 A password protection scheme called  The NDB is a new security technique
Encrypted Negative Password is that is inspired by biological
proposed, which is based on the immune systems and has a wide
Negative Database, cryptographic range of applications. Symmetric
hash function and symmetric encryption is usually deemed
encryption, and a password inappropriate for password
authentication framework based on protection.
the ENP is presented

ADVANTAGES:- EXTRAVAGANCE:-

The advantages of our techniques are 


In database security, a negative database

is a database that extras characteristics
analyzing and comparing the attack
that can't be connected with a particular
complexity of our scheme with that
entry. A negative database is a kind of
of typical password storage schemes
database that contains immense
under lookup table attack and
proportion of data including mirroring
dictionary attack.
data.
1. A hybrid of the prefix algorithm and the q-hidden algorithm for generating
single negative databases.
2. Strong password-only authenticated key exchange.
3. Dynamic salt generation and placement for secure password storing.
4. Complexity metrics and user strength perceptions of the pattern-lock graphical
authentication method.

You might also like