International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 346

Research Paper | Information Technology | India | Volume 3 Issue 8, August 2014 | Popularity: 6.7 / 10


     

(t, n) Threshold Scheme to Enhance the Security of the Password Repository

Malladi Venkata Naga Kiranmai, Avinab Marahatta, K. Suresh Babu


Abstract: Passwords unit of measurement the foremost widespread and represent the first line of defense in computer-based security systems; despite the existence of further attack-resistant authentication schemes. Thus on reinforce watchword security, it's imperative to strike a balance between having enough rules to stay up good security and not having too many rules which may compel users to need evasive actions which could, in turn, compromise security. it's noted that the human issue is that the foremost vital half among the protection system for a minimum of three gettable reasons; it is the weakest link, the only real issue that exercises initiatives, furthermore as a result of the problem that transcends all the alternative components of the total system. This illustrates the importance of social engineering in security designs, {and therefore and thus and thus the indisputable fact that security is so operate of every technology and human factors; bearing in mind the actual fact that there could also be no technical hacking in vacuum. This paper examines this divergence among security engineers as regards the principles governing best practices among the employment of passwords: have to be compelled to they be written down or memorized; changed typically or keep permanent? It put together tries to elucidate the facts encompassing variety of the myths associated with computer security. This paper posits that poorness of requisite balance between the factors of technology and factors of humanity is to blame for the purgatory posture of watchword security connected problems. It's thus recommended that, among the handling of watchword security issues, human factors have to be compelled to lean priority over technological factors. The paper proposes the employment of the (k, n)-Threshold theme, just like the Shamir's secret-sharing theme, to strengthen the protection of the watch word repository. This presupposes associate degree inclination towards writing down the password: after all, Diamond, Platinum, Gold and Silver do not appear to be memorized; they are keeping.


Keywords: Cryptography, Computer Security, Social Engineering, Human Hacking


Edition: Volume 3 Issue 8, August 2014


Pages: 2009 - 2016



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Malladi Venkata Naga Kiranmai, Avinab Marahatta, K. Suresh Babu, "(t, n) Threshold Scheme to Enhance the Security of the Password Repository", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 2009-2016, https://www.ijsr.net/getabstract.php?paperid=2015708, DOI: https://www.doi.org/10.21275/2015708



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 5, May 2023

Pages: 2681 - 2682

Blockchain in Cloud Computing

Goutham Sabbani

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1117 - 1121

Cryptocurrency Financial Risk Analysis using Machine Learning

Tanya Kapoor, Laxmi Ahuja

Share this Article

Downloads: 3 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 1415 - 1423

Quantum Computing and Cloud: Future Prospects - Exploration of Quantum Computing Capabilities in the Cloud

Sandeep Chinamanagonda

Share this Article



Top