Skip to main content

2015 | OriginalPaper | Buchkapitel

A Scheme to Create Secured Random Password Using Markov Chain

verfasst von : S. Vaithyasubramanian, A. Christy

Erschienen in: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Habitually, access to computer systems is based on the use of alphanumeric passwords. Password affords the foremost line of protection against illicit access to computer. Password security is of course only one factor of overall system security. Even though it is an essential component, passwords are measured as the fragile link in computer security. Most users will make use of simple passwords. Simple passwords are easy to memorize, but in the same sense easy to crack!! However, the common user is likely to use simple password and more often the same password for different login. This makes them vulnerable to various types of cyber attacks. To create/generate secured random passwords, in this paper, we describe a new scheme of creation/generation of passwords using Markov chain technique. The tree structure of creation/generation of passwords using Markov chain technique is also specified.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat R. Morris, K. Thompson, Password security: a case history. Commun. ACM 22, 594–597 (1979) R. Morris, K. Thompson, Password security: a case history. Commun. ACM 22, 594–597 (1979)
2.
Zurück zum Zitat S. Granger, The simplest security: a guide to better password practices (2011) S. Granger, The simplest security: a guide to better password practices (2011)
3.
Zurück zum Zitat E.F. Gehringer, Choosing passwords: security and human factors, in IEEE 2002 international symposium on Technology and Society (ISTAS’02) pp. 369–373 E.F. Gehringer, Choosing passwords: security and human factors, in IEEE 2002 international symposium on Technology and Society (ISTAS’02) pp. 369–373
4.
Zurück zum Zitat D. Florencio, C. Herley, B. Coskun, Do strong web passwords accomplish anything?, in Proceeding HOTSEC’07 Proceedings of the 2nd USENIX workshop on Hot topics in security, ACM Digital Library (2007) D. Florencio, C. Herley, B. Coskun, Do strong web passwords accomplish anything?, in Proceeding HOTSEC’07 Proceedings of the 2nd USENIX workshop on Hot topics in security, ACM Digital Library (2007)
6.
Zurück zum Zitat Jeff Yan, Alan Blackwell, Ross Anderson, A. Grant, Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)CrossRef Jeff Yan, Alan Blackwell, Ross Anderson, A. Grant, Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)CrossRef
7.
Zurück zum Zitat D. Florencio, C. Herley, A large-scale study of web password habits, in Proceedings of the 16th international conference on the World Wide Web, ACM Digital Library (2007), pp. 657–666 D. Florencio, C. Herley, A large-scale study of web password habits, in Proceedings of the 16th international conference on the World Wide Web, ACM Digital Library (2007), pp. 657–666
8.
Zurück zum Zitat J. Hong, Passwords getting painful, computing still blissful. Communic. ACM I. 56(3), (2013) J. Hong, Passwords getting painful, computing still blissful. Communic. ACM I. 56(3), (2013)
9.
Zurück zum Zitat S. Vaithyasubramanian, A. Christy, A practice to create user friendly secured password using CFG, in Accepted for International Conference on Mathematical & Engineering Sciences 2014. (2014) S. Vaithyasubramanian, A. Christy, A practice to create user friendly secured password using CFG, in Accepted for International Conference on Mathematical & Engineering Sciences 2014. (2014)
10.
Zurück zum Zitat B. AlFayyadh, P. Thorsheim, A. Josang, H. Klevje, Improving usability of password management with standardized password policies, in The Seventh Conference on Network and Information Systems Security—SAR-SSI 2012 (Cabourg, 2012) B. AlFayyadh, P. Thorsheim, A. Josang, H. Klevje, Improving usability of password management with standardized password policies, in The Seventh Conference on Network and Information Systems Security—SAR-SSI 2012 (Cabourg, 2012)
11.
Zurück zum Zitat S. Wiedenbech, J. waters, J.C. Birget, A. Brodskiy, N. Memon, Authentication using graphical passwords: basic results, in Human-Computer Interaction International (HCII) (2005) S. Wiedenbech, J. waters, J.C. Birget, A. Brodskiy, N. Memon, Authentication using graphical passwords: basic results, in Human-Computer Interaction International (HCII) (2005)
12.
Zurück zum Zitat A. P. Sabzevar, A. Stavrou, Universal multi-factor authentication using graphical passwords, in Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems pp. 625–632 A. P. Sabzevar, A. Stavrou, Universal multi-factor authentication using graphical passwords, in Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems pp. 625–632
13.
Zurück zum Zitat X. Suo, Y. Zhu, G.S. Owen, Graphical passwords: a survey, in 21st Annual Computer Security Applications Conference (2005), pp. 463–472 X. Suo, Y. Zhu, G.S. Owen, Graphical passwords: a survey, in 21st Annual Computer Security Applications Conference (2005), pp. 463–472
14.
Zurück zum Zitat S.M.S. Ahmad et al., Technical issues and challenges of biometric applications as access control tools of information security. Int. J. Innov. Comput., Inf. Control. 8(11), 7983–7999 (2012) S.M.S. Ahmad et al., Technical issues and challenges of biometric applications as access control tools of information security. Int. J. Innov. Comput., Inf. Control. 8(11), 7983–7999 (2012)
15.
Zurück zum Zitat M. Bhatnagar, Raina K. Jain, Nilam S. Khairnar, A Survey on Behavioral Biometric Techniques: Mouse vs. Keyboard Dynamics, in IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology. (2013), (pp. 27–30) M. Bhatnagar, Raina K. Jain, Nilam S. Khairnar, A Survey on Behavioral Biometric Techniques: Mouse vs. Keyboard Dynamics, in IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology. (2013), (pp. 27–30)
17.
Zurück zum Zitat H. Gao, W. Jia, F. Ye, L. Ma, A survey on the use of graphical passwords in security. J. Softw. 8(7), (2013) H. Gao, W. Jia, F. Ye, L. Ma, A survey on the use of graphical passwords in security. J. Softw. 8(7), (2013)
18.
Zurück zum Zitat B. Hayes, First links in the Markov chain. Mag. Sigma Xi, Sci. Res. Soc. 101(2), 92 (2013) B. Hayes, First links in the Markov chain. Mag. Sigma Xi, Sci. Res. Soc. 101(2), 92 (2013)
Metadaten
Titel
A Scheme to Create Secured Random Password Using Markov Chain
verfasst von
S. Vaithyasubramanian
A. Christy
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2135-7_85

Premium Partner