SlideShare a Scribd company logo
• What he look like to you the most……. ?
• Pirate….. ??
• Is he a HACKER ??
hat is HACKING …?
hy do people HACK…?
How Do We Secure……………….??
High Secure Password Authentication System
Akhil Nadh PC
High Secure Password Authentication System
What Are We Now…
Username Password
Username Password
Username Password
Username 5f4dcc3b5aa76
High Secure Password Authentication System
 MD2
 MD4
MD5
 MD6
 SHA0
SHA1
 SHA2
 SHA3
 Sql Injection
 Session Hijacking
 Brute force attacks
 Key loggers
 Single Server
Password
w
s
a
p
s
r
o
d
HOW..?!
Step 1 : Input
Step 2 : Hashing
Step 3 : ASCII Conversion
Step 4 : Subtracting Consecutive ASCII
Digits
Step 5 : Finding Position
Step 6 : Load Balancing
Input :- ‘ password ’
Randomness ensure more security
 Encryption :- MD5
• Irreversible
password
MD5
5f4dcc3b5aa765d61d8327deb882cf99
ASCII
is a character-encoding scheme
originally based on the English
alphabet
High Secure Password Authentication System
parts of hashed password are stored in different
servers.
each character in the hashed password should be
stored in the specific server at a specific position.
corresponding positions cannot be predetermined.
the positions can be generated only by using the
input string (the positions are of integer type).
ASCII conversion is used to map the hashed
characters to integers.
5f4dcc3b5aa765d61d8327deb882cf99
ASCII conversion
??53
 Subtract the consecutive ASCII Integers.
 the absolute value of the result is taken.
WHY… ??
HOW……. ??
5f4dcc3b5aa765d61d8327deb882cf99
ASCII conversion
53 102 52
Subtract ASCII
53 |102-53| |52-102|
49 50
What randomness this
can GIVE…?
5f4dcc3b5aa765d61d8327deb882cf99
 Result obtained in step 4 is divided using the number
of servers (say, n).
 n number of arrays are maintained to store the hashed
password’s characters temporarily.
 Remainder from the above division implies the
location of the hashed characters.
 the array is appended when more than one character
takes the same storage location.
53
Lets take n=5
5
10
3
5
495
9
45
4
505
10
0
0 4
1
2
3 5
4 f
0 4 c 5 a 1 3 8 9 9
1 c 6 5 6 d 2 e 2
2 b 7 d 7 8
3 5 d 3 d b f
4 f a 8 c
5f4dcc3b5aa765d61d8327deb882cf99
 number of temporary arrays and the number of servers
are equal.
 copy these arrays into corresponding servers.
 to make the characters in each servers almost the
same, concatenate all the n number of temporary
arrays.
 the whole string is then divided into n equal or almost
equal parts.
 these parts are then stored into n servers.
0 4 c 5 a 1 3 8 9 9
1 c 6 5 6 d 2 e 2
2 b 7 d 7 8
3 5 d 3 d b f
4 f a 8 c
9
8
5
6
4
4c5a13899c656d2e2b7d785d3dbffa8c
0 4 c 5 a 1 3 8
1 9 9 c 6 5 6 d
2 2 e 2 b 7 d 7
3 8 5 d 3 d b f
4 f a 8 c
GGGAINPUT=PASSWORD
HASHING
FUNCTION
IDENTIFYING POSITION
ASCII CONVERSION
AT = |Am-Am-1 | ; m>1
AT = Am ; m=1
AT mod n
A B
LOAD BALANCING
BLOCK 1 BLOCK 2 BLOCK n
CONCATENATE THE n BLOCKS
n BLOCKS OF DATA
BLOCK 1 BLOCK 2 BLOCK
n
SERVER 1 SERVER
2
SERVER
n
AA B
Input: Hashed password, Number of servers (say n, 3<n<33)
Output: n parts of password in n servers
Step 1: Find the number of characters in the hashed password (say m).
Step 2: FOR each character in the password
Find ASCII value(say Am).
ENDFOR
Step 3: FOR each character Am obtained
Find AT = |Am-Am-1 | ; m>1
AT = Am ; m=1
ENDFOR
Step 4: Copy each hashed password character by appending one of the n
temporary arrays. The array is identified by performing modulus operation
on each AT by n
Step 5: Concatenate all the arrays obtained from the step 4.
Step 6: Divide the m characters obtained in step 5 equally or almost equally to the
number of servers.
Step 7:Copy the n parts obtained in step 5 to n servers.
 The run time complexity of the proposed system
depends only on the number of the servers used.
The running time varies linearly with the number of
servers taken.
The length of the password is not considered as a
factor to determine the complexity.
High Secure Password Authentication System
Anirudhan Adukkathayar C
Sruthy S Menon
[1] NIST. Secure Hash Standard, FIPS PUB 180-2, 2002.
[2] A. K. Lenstra. Further Progress in Hashing Cryptanalysis (white paper).
http://cm.bell-labs.com/who/akl/hash.pdf, February 2005.
[3] R. Rivest. The MD5 Message-Digest Algorithm [rfc1321], 1992.
[4] Wang Xiaoyun, Chen Yin ru. Collision Analysis for Every Round Function of the
MD5, 1996.
[5] Wang Xiaoyun. How to Break MD5 and Other Hash Functions, 2005.
[6] Zhao Shaolan, Xing Guobo, Yang Yixian. The Analysis on Amelioration and Security
of MD5, 2005.
[7] L. Dadda, M. Macchetti, and J. Owen. An ASIC design for a high speed
implementation of the hash function SHA-256 (384,512). In ACM Great Lakes
Symposium on VLSI, pages 421–425. ACM, 2004.
[8] L. Dadda, M. Macchetti, and J. Owen. The design of a high speed ASIC unit for the
hash function SHA-256 (384, 512).In DATE 2004, pages 70–75. IEEE Computer
Society, 2004.
[9] R. Lien, T. Grembowski, and K. Gaj. A 1 Gbit/s partially unrolled architecture of
hash functions SHA-1 and SHA-512.In CT-RSA 2004, volume 2964 of LNCS, pages
324–338.Springer, 2004.
High Secure Password Authentication System
High Secure Password Authentication System

More Related Content

What's hot (20)

PDF
CNIT 141: 6. Hash Functions
Sam Bowne
 
PDF
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
Aaron Zauner
 
PDF
Is unit 5_message authentication and hash functions
Sarthak Patel
 
PDF
CNIT 141 6. Hash Functions
Sam Bowne
 
PPTX
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk
Nazar Tymoshyk, CEH, Ph.D.
 
PPTX
Information and data security pseudorandom number generation and stream cipher
Mazin Alwaaly
 
PDF
CNIT 141 5. Stream Ciphers
Sam Bowne
 
PPTX
Chacha ppt
VikramSingh1378
 
PDF
Recover A RSA Private key from a TLS session with perfect forward secrecy
Priyanka Aash
 
PPT
RC4&RC5
guestff64339
 
PDF
An effective RC4 Stream Cipher
Tharindu Weerasinghe
 
PPTX
Salsa20 Cipher
Nisarg Shah
 
PPTX
I mage encryption using rc5
Suramrit Singh
 
PPTX
anti-ddos GNTC based on P4 /BIH
Leo Chu
 
PPTX
Practical rsa padding oracle attacks
Alexandre Moneger
 
PPTX
Scapy TLS: A scriptable TLS 1.3 stack
Alexandre Moneger
 
PDF
Post Quantum Cryptography - Emerging Frontiers
Gokul Alex
 
PDF
CNIT 141: 4. Block Ciphers
Sam Bowne
 
PPTX
Message digest 5
Tirthika Bandi
 
PDF
TLS Perf: from three to zero in one spec
Natasha Rooney
 
CNIT 141: 6. Hash Functions
Sam Bowne
 
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
Aaron Zauner
 
Is unit 5_message authentication and hash functions
Sarthak Patel
 
CNIT 141 6. Hash Functions
Sam Bowne
 
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk
Nazar Tymoshyk, CEH, Ph.D.
 
Information and data security pseudorandom number generation and stream cipher
Mazin Alwaaly
 
CNIT 141 5. Stream Ciphers
Sam Bowne
 
Chacha ppt
VikramSingh1378
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Priyanka Aash
 
RC4&RC5
guestff64339
 
An effective RC4 Stream Cipher
Tharindu Weerasinghe
 
Salsa20 Cipher
Nisarg Shah
 
I mage encryption using rc5
Suramrit Singh
 
anti-ddos GNTC based on P4 /BIH
Leo Chu
 
Practical rsa padding oracle attacks
Alexandre Moneger
 
Scapy TLS: A scriptable TLS 1.3 stack
Alexandre Moneger
 
Post Quantum Cryptography - Emerging Frontiers
Gokul Alex
 
CNIT 141: 4. Block Ciphers
Sam Bowne
 
Message digest 5
Tirthika Bandi
 
TLS Perf: from three to zero in one spec
Natasha Rooney
 

Similar to High Secure Password Authentication System (20)

PPTX
Hash Techniques in Cryptography
Basudev Saha
 
PDF
Md5
annamalai
 
PPT
An Introduction to Hashing: A basic understanding
prabhatv1
 
PPTX
TM112 Meeting12-Cryptography.pptx
MohammedYusuf609377
 
PPTX
Cryptographic hash function md5
Khulna University, Khulna, Bangladesh
 
PPTX
Data streaming algorithms
Hridyesh Bisht
 
PPTX
Module 2onblockchain technologies 2.pptx
shruthig40
 
PPT
Hash Function & Analysis
Pawandeep Kaur
 
PPTX
Cryptography Ashik
Ashik Iqbal
 
PDF
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
PDF
Password Storage and Attacking in PHP
Anthony Ferrara
 
PPTX
Rainbow Tables
Panggi Libersa
 
PPTX
Comparative hash algorithm power point presentation
HajaAjmeerdeen
 
PDF
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
PDF
Data Storage and Security Strategies of Network Identity
Antiy Labs
 
PPTX
Hashing Considerations In Web Applications
Islam Heggo
 
PDF
Comparative study of password storing using hash function with MD5, SHA1, SHA...
International Journal of Reconfigurable and Embedded Systems
 
PDF
Sha
ha123
 
PDF
A Survey of Password Attacks and Safe Hashing Algorithms
IRJET Journal
 
PDF
Password Storage And Attacking In PHP - PHP Argentina
Anthony Ferrara
 
Hash Techniques in Cryptography
Basudev Saha
 
An Introduction to Hashing: A basic understanding
prabhatv1
 
TM112 Meeting12-Cryptography.pptx
MohammedYusuf609377
 
Cryptographic hash function md5
Khulna University, Khulna, Bangladesh
 
Data streaming algorithms
Hridyesh Bisht
 
Module 2onblockchain technologies 2.pptx
shruthig40
 
Hash Function & Analysis
Pawandeep Kaur
 
Cryptography Ashik
Ashik Iqbal
 
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
Password Storage and Attacking in PHP
Anthony Ferrara
 
Rainbow Tables
Panggi Libersa
 
Comparative hash algorithm power point presentation
HajaAjmeerdeen
 
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Data Storage and Security Strategies of Network Identity
Antiy Labs
 
Hashing Considerations In Web Applications
Islam Heggo
 
Comparative study of password storing using hash function with MD5, SHA1, SHA...
International Journal of Reconfigurable and Embedded Systems
 
Sha
ha123
 
A Survey of Password Attacks and Safe Hashing Algorithms
IRJET Journal
 
Password Storage And Attacking In PHP - PHP Argentina
Anthony Ferrara
 
Ad

More from Akhil Nadh PC (8)

PPTX
Introduction to Computer basics for students
Akhil Nadh PC
 
PPSX
Cyber security awareness for students
Akhil Nadh PC
 
PDF
Blockchain Technology - A Systematic Study.
Akhil Nadh PC
 
PPTX
Linux Basic Networking Command
Akhil Nadh PC
 
PDF
Introduction to python programming [part 1]
Akhil Nadh PC
 
PDF
Introduction to Information Channel
Akhil Nadh PC
 
PPTX
Web Security and SSL - Secure Socket Layer
Akhil Nadh PC
 
PPTX
Chorus - Distributed Operating System [ case study ]
Akhil Nadh PC
 
Introduction to Computer basics for students
Akhil Nadh PC
 
Cyber security awareness for students
Akhil Nadh PC
 
Blockchain Technology - A Systematic Study.
Akhil Nadh PC
 
Linux Basic Networking Command
Akhil Nadh PC
 
Introduction to python programming [part 1]
Akhil Nadh PC
 
Introduction to Information Channel
Akhil Nadh PC
 
Web Security and SSL - Secure Socket Layer
Akhil Nadh PC
 
Chorus - Distributed Operating System [ case study ]
Akhil Nadh PC
 
Ad

Recently uploaded (20)

PPTX
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
How to Manage Promotions in Odoo 18 Sales
Celine George
 
PPTX
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
PPTX
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
PPTX
How to Configure Lost Reasons in Odoo 18 CRM
Celine George
 
PPTX
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
PDF
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
PPTX
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
PPTX
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
PPTX
ROLE OF ANTIOXIDANT IN EYE HEALTH MANAGEMENT.pptx
Subham Panja
 
PPTX
How to Define Translation to Custom Module And Add a new language in Odoo 18
Celine George
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
HEAD INJURY IN CHILDREN: NURSING MANAGEMENGT.pptx
PRADEEP ABOTHU
 
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
How to Manage Promotions in Odoo 18 Sales
Celine George
 
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
How to Configure Lost Reasons in Odoo 18 CRM
Celine George
 
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
ROLE OF ANTIOXIDANT IN EYE HEALTH MANAGEMENT.pptx
Subham Panja
 
How to Define Translation to Custom Module And Add a new language in Odoo 18
Celine George
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
HEAD INJURY IN CHILDREN: NURSING MANAGEMENGT.pptx
PRADEEP ABOTHU
 

High Secure Password Authentication System

  • 1. • What he look like to you the most……. ? • Pirate….. ?? • Is he a HACKER ??
  • 2. hat is HACKING …? hy do people HACK…? How Do We Secure……………….??
  • 3. High Secure Password Authentication System Akhil Nadh PC
  • 5. What Are We Now… Username Password Username Password Username Password Username 5f4dcc3b5aa76
  • 7.  MD2  MD4 MD5  MD6  SHA0 SHA1  SHA2  SHA3
  • 8.  Sql Injection  Session Hijacking  Brute force attacks  Key loggers  Single Server
  • 10. Step 1 : Input Step 2 : Hashing Step 3 : ASCII Conversion Step 4 : Subtracting Consecutive ASCII Digits Step 5 : Finding Position Step 6 : Load Balancing
  • 11. Input :- ‘ password ’ Randomness ensure more security
  • 12.  Encryption :- MD5 • Irreversible password MD5 5f4dcc3b5aa765d61d8327deb882cf99
  • 13. ASCII is a character-encoding scheme originally based on the English alphabet
  • 15. parts of hashed password are stored in different servers. each character in the hashed password should be stored in the specific server at a specific position. corresponding positions cannot be predetermined. the positions can be generated only by using the input string (the positions are of integer type). ASCII conversion is used to map the hashed characters to integers.
  • 17.  Subtract the consecutive ASCII Integers.  the absolute value of the result is taken. WHY… ?? HOW……. ??
  • 18. 5f4dcc3b5aa765d61d8327deb882cf99 ASCII conversion 53 102 52 Subtract ASCII 53 |102-53| |52-102| 49 50 What randomness this can GIVE…?
  • 20.  Result obtained in step 4 is divided using the number of servers (say, n).  n number of arrays are maintained to store the hashed password’s characters temporarily.  Remainder from the above division implies the location of the hashed characters.  the array is appended when more than one character takes the same storage location.
  • 22. 0 4 c 5 a 1 3 8 9 9 1 c 6 5 6 d 2 e 2 2 b 7 d 7 8 3 5 d 3 d b f 4 f a 8 c 5f4dcc3b5aa765d61d8327deb882cf99
  • 23.  number of temporary arrays and the number of servers are equal.  copy these arrays into corresponding servers.  to make the characters in each servers almost the same, concatenate all the n number of temporary arrays.  the whole string is then divided into n equal or almost equal parts.  these parts are then stored into n servers.
  • 24. 0 4 c 5 a 1 3 8 9 9 1 c 6 5 6 d 2 e 2 2 b 7 d 7 8 3 5 d 3 d b f 4 f a 8 c 9 8 5 6 4
  • 25. 4c5a13899c656d2e2b7d785d3dbffa8c 0 4 c 5 a 1 3 8 1 9 9 c 6 5 6 d 2 2 e 2 b 7 d 7 3 8 5 d 3 d b f 4 f a 8 c
  • 27. LOAD BALANCING BLOCK 1 BLOCK 2 BLOCK n CONCATENATE THE n BLOCKS n BLOCKS OF DATA BLOCK 1 BLOCK 2 BLOCK n SERVER 1 SERVER 2 SERVER n AA B
  • 28. Input: Hashed password, Number of servers (say n, 3<n<33) Output: n parts of password in n servers Step 1: Find the number of characters in the hashed password (say m). Step 2: FOR each character in the password Find ASCII value(say Am). ENDFOR Step 3: FOR each character Am obtained Find AT = |Am-Am-1 | ; m>1 AT = Am ; m=1 ENDFOR Step 4: Copy each hashed password character by appending one of the n temporary arrays. The array is identified by performing modulus operation on each AT by n Step 5: Concatenate all the arrays obtained from the step 4. Step 6: Divide the m characters obtained in step 5 equally or almost equally to the number of servers. Step 7:Copy the n parts obtained in step 5 to n servers.
  • 29.  The run time complexity of the proposed system depends only on the number of the servers used. The running time varies linearly with the number of servers taken. The length of the password is not considered as a factor to determine the complexity.
  • 32. [1] NIST. Secure Hash Standard, FIPS PUB 180-2, 2002. [2] A. K. Lenstra. Further Progress in Hashing Cryptanalysis (white paper). http://cm.bell-labs.com/who/akl/hash.pdf, February 2005. [3] R. Rivest. The MD5 Message-Digest Algorithm [rfc1321], 1992. [4] Wang Xiaoyun, Chen Yin ru. Collision Analysis for Every Round Function of the MD5, 1996. [5] Wang Xiaoyun. How to Break MD5 and Other Hash Functions, 2005. [6] Zhao Shaolan, Xing Guobo, Yang Yixian. The Analysis on Amelioration and Security of MD5, 2005. [7] L. Dadda, M. Macchetti, and J. Owen. An ASIC design for a high speed implementation of the hash function SHA-256 (384,512). In ACM Great Lakes Symposium on VLSI, pages 421–425. ACM, 2004. [8] L. Dadda, M. Macchetti, and J. Owen. The design of a high speed ASIC unit for the hash function SHA-256 (384, 512).In DATE 2004, pages 70–75. IEEE Computer Society, 2004. [9] R. Lien, T. Grembowski, and K. Gaj. A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512.In CT-RSA 2004, volume 2964 of LNCS, pages 324–338.Springer, 2004.