Improving Login Process by Salted Hashing Password Using SHA-256 Algorithm in Web Applications
T. Ebanesar1 , G. Suganthi2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 27-32, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.2732
Online published on Mar 31, 2019
Copyright © T. Ebanesar, G. Suganthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: T. Ebanesar, G. Suganthi, “Improving Login Process by Salted Hashing Password Using SHA-256 Algorithm in Web Applications,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.27-32, 2019.
MLA Style Citation: T. Ebanesar, G. Suganthi "Improving Login Process by Salted Hashing Password Using SHA-256 Algorithm in Web Applications." International Journal of Computer Sciences and Engineering 7.3 (2019): 27-32.
APA Style Citation: T. Ebanesar, G. Suganthi, (2019). Improving Login Process by Salted Hashing Password Using SHA-256 Algorithm in Web Applications. International Journal of Computer Sciences and Engineering, 7(3), 27-32.
BibTex Style Citation:
@article{Ebanesar_2019,
author = {T. Ebanesar, G. Suganthi},
title = {Improving Login Process by Salted Hashing Password Using SHA-256 Algorithm in Web Applications},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {27-32},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3791},
doi = {https://doi.org/10.26438/ijcse/v7i3.2732}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.2732}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3791
TI - Improving Login Process by Salted Hashing Password Using SHA-256 Algorithm in Web Applications
T2 - International Journal of Computer Sciences and Engineering
AU - T. Ebanesar, G. Suganthi
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 27-32
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
1046 | 709 downloads | 272 downloads |
Abstract
In today’s digital world, all the web applications are used password for their login process. It is fact that, all the Internet applications still used the text based passwords with encrypted form. In encryption technique, hackers are easily hacking the password with decryption process. It is not a secure method to implement in password process. There are so many possibilities of decrypting a password and gets the password by hackers. It was the existing method to protect the unauthorized person to access or enter into the account. Today’s technology revolution, the hackers are supposed to be hacked the encrypted text based passwords. In order to avoid this, we used salted hashing password technique using SHA-256 algorithm [1]. The main objective of this research paper is to secure the user’s password in order to give protection from hacking. In this paper we had implemented password security in SHA-256 hashing algorithm at server side.
Key-Words / Index Term
Password Security, Salt, Salted Password, Password Attacks, SHA-256, Hash, Hashing Algorithm, 2018 Password Stolen, encryption vs hashing
References
[1] R. Roshdy, M. Fouad, M. Aboul-Dahab “Design And Implementation A New Security Hash Algorithm Based On Md5 And Sha-256”, International Journal of Engineering Sciences & Emerging Technologies (IJESET), Vol.6, Issue.1, pp.29-36, 2013
[2] H. B. Pethe, Dr. S. R. Pande “An overview of Cryptographic Hash Functions MD-5 and SHA”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol.4, Issue.3, pp.37-42, 2016
[3] Pritesh N.Patel,Jigisha K.Patel and Paresh V.Virparia “A Cryptography Application using Salt hash Technique”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol.2, Issue.6, pp.236-239, 2013
[4] Samir Pakojwar, Dr.N.J.Uke “Security in Online Banking Services- A Comparative Study”, International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Vol.3, Issue.10, pp.16850-16857, 2014
[5] S.Vaithyasubramanian, A.Christy and D.Saravanan “Two Factor Authentications for Secured Login in Support of Effective Information Preservation and Network Security”, APRN Journal of Engineering and Applied Sciences (APRN), Vol.10, Issue.5, pp.2053-2056, 2015
[6] S.Vaithyasubramanian, A.Christy and D.Saravanan “Access to Network by Three-Factor Authentication for Effective Information Security”, Hindawi Publishing Corporation,The Scientific World Journal, Vol.10, Issue.4, pp.127-132, 2016
[7] Sirapat Boonkrong and Chaowalit Somboonpattanakit “Dynamic Salt Generation and Placement for Secure Password Storing”, IAENG International Journal of Computer Science, Vol.43, Issue.1, pp.18-27, 2016
[8] Dr.Abdelrahman Karrar,Talal Almutiri,Sultan Algrafi,Naif Alalwi,Ammar Alharbi “Enhancing Salted Password Hashing Technique Using Swapping Elements in an Array Algorithm”, International Journal of Computer Science and Technology, Vol.9, Issue.1, pp.21-25, 2018