Abstract

Today, electronic systems and information have become no less important than food and water for human life. No one can deny this fact. Electronic information systems contribute to the development of life in many areas. But some electronic information systems should not be available for anyone to use, such as reading, operating, modifying or destroying without permission. This type of electronic information systems must be protected in some way based on the related situation. . Password-based authentication is the first defense for most information systems. Password security enhances the security of the entire information system. Therefore, password protection models become very important in such cases to help users improve authentication security. Researchers published various methods based on salting, hashing, symmetric encryption, and key splitting methods. The paper conducted by Saleh Al-Asali describes a method for generating a suitable secret key that is easy to memorize and remember, as he succeeded in generating a password that is strong and easy to remember. This paper improves the previous method by adding some improvements mentioned in the section described in the suggested method.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call