{"title":"Web门户上用户凭据的安全性","authors":"Amit Hire, J. Katti","doi":"10.1109/CCGE50943.2021.9776476","DOIUrl":null,"url":null,"abstract":"The most prevalent form of authentication or computer system intrusion protection is the use of alphanumeric usernames and passwords. Strong password schemes have traditionally provided a certain level of protection, but they are complicated and difficult to remember, prompting their owners to write them down on paper. As a consequence, protection is jeopardized.Increasing the sharing of information, internet use, data transfer, protection and validation of passwords have become significant challenges.As a result, many programmes use different hashing and salting algorithms to store password files in databases.Attackers, on the other hand, do not consider password hashing to be safe since they use brute force attacks, password guessing attacks, and other methods to obtain the user's password from the database's password log.Some systems store passwords in databases using honeywords or bogus passwords generated using the generation technique for honeywords to prevent hacker attacks.In our recommended approach, passwords are saved using a distinct hashing mechanism with a less complexity of time in which majority of the processes need basic operation based on binarys.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security of User Credentials on Web Portals\",\"authors\":\"Amit Hire, J. Katti\",\"doi\":\"10.1109/CCGE50943.2021.9776476\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The most prevalent form of authentication or computer system intrusion protection is the use of alphanumeric usernames and passwords. Strong password schemes have traditionally provided a certain level of protection, but they are complicated and difficult to remember, prompting their owners to write them down on paper. As a consequence, protection is jeopardized.Increasing the sharing of information, internet use, data transfer, protection and validation of passwords have become significant challenges.As a result, many programmes use different hashing and salting algorithms to store password files in databases.Attackers, on the other hand, do not consider password hashing to be safe since they use brute force attacks, password guessing attacks, and other methods to obtain the user's password from the database's password log.Some systems store passwords in databases using honeywords or bogus passwords generated using the generation technique for honeywords to prevent hacker attacks.In our recommended approach, passwords are saved using a distinct hashing mechanism with a less complexity of time in which majority of the processes need basic operation based on binarys.\",\"PeriodicalId\":130452,\"journal\":{\"name\":\"2021 International Conference on Computing, Communication and Green Engineering (CCGE)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computing, Communication and Green Engineering (CCGE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCGE50943.2021.9776476\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGE50943.2021.9776476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The most prevalent form of authentication or computer system intrusion protection is the use of alphanumeric usernames and passwords. Strong password schemes have traditionally provided a certain level of protection, but they are complicated and difficult to remember, prompting their owners to write them down on paper. As a consequence, protection is jeopardized.Increasing the sharing of information, internet use, data transfer, protection and validation of passwords have become significant challenges.As a result, many programmes use different hashing and salting algorithms to store password files in databases.Attackers, on the other hand, do not consider password hashing to be safe since they use brute force attacks, password guessing attacks, and other methods to obtain the user's password from the database's password log.Some systems store passwords in databases using honeywords or bogus passwords generated using the generation technique for honeywords to prevent hacker attacks.In our recommended approach, passwords are saved using a distinct hashing mechanism with a less complexity of time in which majority of the processes need basic operation based on binarys.