Abstract
Authentication is the first step for any important applications. Password verification is widely employed in the Internet. Some advanced mechanisms including bio features, such as fingerprints or retina. However, digital password authentication credential is commonly used in the public. In other words, traditional password verification is still an important authentication credential mechanism for today’s online services. Password database may be compromised. Once if the database is stolen, it is dangerous and critical for any services. Consequently, password database leakage becomes an important issue. Detection and countermeasure are essential for such a disaster. Our research proposing a scheme based on a authentication database storage mapping method to detect possible leakage of authentication database. By multiple mapping mechanism, if the authentication database is stolen, an attacker could not know any user’s correct password. This method can reduce additional space of storing passwords with ability to detect security event for stolen authentication databases.
Highlights
1 INTRODUCTION Over the past decades, with the popularity of personal computers and mobile devices, the convenience of the Internet, and the development of social networks, more and more people rely on the Internet to deal with or share things on life, such as online payment, online shopping, etc
The school provides a variety of online services, such as course enrollment system, online courses, etc., to provide teachers and students a convenient campus life
Punithavalli, "LSB, 3D-DCT and Huffman Encoding based Steganography in
Summary
With the popularity of personal computers and mobile devices, the convenience of the Internet, and the development of social networks, more and more people rely on the Internet to deal with or share things on life, such as online payment, online shopping, etc. Password is still the most important credential for today's account certification. It plays a very important role in human life. The evolution of the password so far has developed a variety of forms to achieve certification. The traditional digital password authentication credential is still widely accepted by the public, but in the past few decades, the content of this certification mechanism hasn’t been much change. The password is the first line of defense, but the file leaks are endless. These common password leak events, causing the user's personal information to be stolen. According to Gemalto's 2016 report [1], the most serious is the account access, followed by identity theft
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.