Javascript must be enabled to continue!
Development of Hash-Based Multi-Factor Password Generating System
View through CrossRef
The use of passwords or passphrases is essential for every internet user. However, users often face a dilemma between choosing simple passwords that are easy to crack and complex passwords that are difficult to remember, leading to frequent and cumbersome password recovery processes. This paper focuses on addressing this issue by developing a multifactor, unique password-generating system using SHA-256. The system incorporates factors such as a Unique Identifier, a biometric key value, and an Android mobile phone with a Biometric scanner. To accomplish this, an algorithm is devised using JavaScript that concatenates and generates a hash value by applying the SHA-256 algorithm to the Unique Identifier and Biometric Key values. The software implementation is achieved using the JavaScript programming language, with support from predefined plugins. Once the application is created, passwords can be generated by inputting a user's fingerprint ID and an Identifier (e.g., “Facebook.com”), resulting in the generation of a 32-character unique password. This process can be applied to any identifier and can reproduce the same password when the same factors are supplied. The experimentation results demonstrate that the system is capable of generating unique passwords for different platforms and can reproduce the same password for each platform if needed. While the focus of this paper is on the development of a system for Android mobile phone operating systems, It is suggested that its functionality be expanded by developing a browser extension and versions for other operating systems to improve its usability and accessibility across multiple platforms.
African Journals Online (AJOL)
Title: Development of Hash-Based Multi-Factor Password Generating System
Description:
The use of passwords or passphrases is essential for every internet user.
However, users often face a dilemma between choosing simple passwords that are easy to crack and complex passwords that are difficult to remember, leading to frequent and cumbersome password recovery processes.
This paper focuses on addressing this issue by developing a multifactor, unique password-generating system using SHA-256.
The system incorporates factors such as a Unique Identifier, a biometric key value, and an Android mobile phone with a Biometric scanner.
To accomplish this, an algorithm is devised using JavaScript that concatenates and generates a hash value by applying the SHA-256 algorithm to the Unique Identifier and Biometric Key values.
The software implementation is achieved using the JavaScript programming language, with support from predefined plugins.
Once the application is created, passwords can be generated by inputting a user's fingerprint ID and an Identifier (e.
g.
, “Facebook.
com”), resulting in the generation of a 32-character unique password.
This process can be applied to any identifier and can reproduce the same password when the same factors are supplied.
The experimentation results demonstrate that the system is capable of generating unique passwords for different platforms and can reproduce the same password for each platform if needed.
While the focus of this paper is on the development of a system for Android mobile phone operating systems, It is suggested that its functionality be expanded by developing a browser extension and versions for other operating systems to improve its usability and accessibility across multiple platforms.
Related Results
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Linked List Elimination from Hashing Methods
Linked List Elimination from Hashing Methods
Hashing has been used for decades in many fields such as encryption, password verification, and pattern search. Hash systems consist mainly of three components: the hash function, ...
Machine Learning Based Password Strength Analysis
Machine Learning Based Password Strength Analysis
Passwords, as the most used method of authentication because to its ease of implementation, allow attackers to get access to the accounts owned by others by means of cracking passw...
Building a 256-bit hash function on a stronger MD variant
Building a 256-bit hash function on a stronger MD variant
AbstractCryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash func...
Graphical Password Authentication
Graphical Password Authentication
A pattern password is an authentication system that works when a user selects images in a specific sequence displayed on a graphical user interface (GUI). For this reason, the grap...
Tightly security code based two tier signature using
chameleon hash functions
Tightly security code based two tier signature using
chameleon hash functions
Abstract
The advancement of quantum algorithms threatens traditional digital signatures, prompting the exploration of post-quantum solutions such as code-based signatures w...
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme...

