Security Design Pattern for Login System through Authentication using Modified Sha 384 Algorithm

  • Kulkarni R
  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The research has been carried out to develop secure login system by authenticating the login using modified SHA-384 algorithm. It derives 896-bit hash value for the password entered by the user in the user registration form and saves the credentials entered by the user in system’s database. Results obtained are evaluated by resolving the general attacks confirmed that the modified SHA-384 algorithm was more secured compared to the original SHA-384 algorithm as it was not broken using generic attacks such as brute force, rainbow table and other cracking tools available online such as Cain and Abel. The performance of the modified algorithm was measured with only 2 ms additional execution time from SHA-384.

Cite

CITATION STYLE

APA

Kulkarni, R. Y. C., & Joshi, Prof. Dr. S. D. (2021). Security Design Pattern for Login System through Authentication using Modified Sha 384 Algorithm. International Journal of Innovative Technology and Exploring Engineering, 10(8), 68–72. https://doi.org/10.35940/ijitee.h9244.0610821

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free