High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Survey Paper on Improving Password Security using Honey-Words and Honey Encryption

Author(s):

Anand N. Varale , Dr. D.Y. Patil Institute of Technology, Pimpri; Amol I. Parde, Dr. D.Y. Patil Institute of Technology, Pimpri; Swapnil N. Jagtap, Dr. D.Y. Patil Institute of Technology, Pimpri; Harshal S. Kamble, Dr. D.Y. Patil Institute of Technology, Pimpri; Rupesh G. Mahajan, Dr. D.Y. Patil Institute of Technology, Pimpri

Keywords:

Authentication Processing, Password Cracking, Honeypot, Honey Indexing, Honey Sets

Abstract

In this Paper we discuss about the honey word mechanism to detect an adversary who attempts to login with cracked passwords. New password is the combination of existing user passwords called honey words. Fake password is nothing but the honey words basically, for each username a set of sweet words is constructed such that only one element is the correct password and the others are honey words (decoy passwords). Hence, when an adversary tries to enter into the system with a honey word, an alarm is triggered to notify the administrator about a password leakage. Honey words to detect attacks against hash password database. For each user account the legitimate password stored in form of honey words. If attacker Attack on password i.e. honeys words it cannot be sure it is real password or honey word.

Other Details

Paper ID: IJSRDV6I20145
Published in: Volume : 6, Issue : 2
Publication Date: 01/05/2018
Page(s): 701-703

Article Preview

Download Article