Generating and Managing Strong Passwords using Hotel Mnemonic

10/03/2021
by   Sumith Yesudasan, et al.
0

Weak passwords and availability of supercomputers to password crackers make the financial institutions and businesses at stake. This calls for use of strong passwords and multi factor authentication for secure transactions. Remembering a long and complex password by humans is a daunting task and mnemonic has helped to mitigate this situation to an extent. This paper discusses creating and using long random password and storing them securely using a hybrid strategy of hash-encryption method. The hash function uses a mnemonic password based on the hotel names and other characteristics like room number, floor number and breakfast meal preferences to generate the encryption key. The random strong password can be then encrypted using the key and stored safely. A computer program named Hector is developed which demonstrates these steps and can be used to generate and store the passwords.

READ FULL TEXT

page 2

page 4

page 6

page 7

page 8

research
11/29/2017

Secure Encryption scheme with key exchange for Two server Architecture

In the distributed environment, authentication and key exchange mechanis...
research
02/01/2022

Securing the data in cloud using Algebra Homomorphic Encryption scheme based on updated Elgamal(AHEE)

Cloud computing is the broad and diverse phenomenon. Users are allowed t...
research
08/01/2018

Effective Caching for the Secure Content Distribution in Information-Centric Networking

The secure distribution of protected content requires consumer authentic...
research
02/05/2018

Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

Cloud computing is an upcoming technology that has been designed for com...
research
12/05/2018

BSSSQS: A Blockchain Based Smart and Secured Scheme for Question Sharing in the Smart Education System

Existing education systems are facing a threat of question paper leaking...
research
08/09/2020

Randomness Evaluation of a Genetic Algorithm for Image Encryption: A Signal Processing Approach

In this paper a randomness evaluation of a block cipher for secure image...
research
02/22/2018

Options for encoding names for data linking at the Australian Bureau of Statistics

Publicly, ABS has said it would use a cryptographic hash function to con...

Please sign up or login with your details

Forgot password? Click here to reset