This paper is published in Volume-4, Issue-3, 2018
Area
Password Authentication
Author
Shruthi Patil, Mercy S, Nagaraja Ramaiah
Org/Univ
Bangalore Institute of Technology, Bengaluru, Karnataka, India
Pub. Date
21 May, 2018
Paper ID
V4I3-1512
Publisher
Keywords
Authentication, Solid password, Security, Key management, Secret key.

Citationsacebook

IEEE
Shruthi Patil, Mercy S, Nagaraja Ramaiah. A brief survey on password authentication, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Shruthi Patil, Mercy S, Nagaraja Ramaiah (2018). A brief survey on password authentication. International Journal of Advance Research, Ideas and Innovations in Technology, 4(3) www.IJARIIT.com.

MLA
Shruthi Patil, Mercy S, Nagaraja Ramaiah. "A brief survey on password authentication." International Journal of Advance Research, Ideas and Innovations in Technology 4.3 (2018). www.IJARIIT.com.

Abstract

Secret key based authentication has been utilized widely as one of the authentication methods. Utilizing passwords for client confirmation is as yet the most regular strategy for some, web administrations and assaults on the password databases represent a serious risk. Web advances are increasing to an ever-increasing extent distinction step by step however the constant survival and replication of password verification plans produce challenges for end clients. The current cybercrimes development is a difficult issue, a huge number of individuals turn into the casualty of cybercrime and most of them can't be avoided effectively just by solid passwords. The assaults incorporate key logging, savage constraining, speculating assaults, replay assault.