Security Design Pattern for Login System through Authentication using Modified Sha-384 Algorithm
Yogini C.Kulkarni1, S.D. Joshi2
1R Yogini C. Kulkarni*, Department of Computer Engineering, Research Scholar, JJT University, Jhunjhunu (Rajasthan), India.
2Prof. Dr. S.D. Joshi, Department of Computer Engineering, Bharati Vidyapeeth (Deemed To be university), Pune (Maharashtra), India.
Manuscript received on May 23, 2021. | Revised Manuscript received on May 29, 2021. | Manuscript published on June 30, 2021. | PP: 68-72 | Volume-10, Issue-8, June 2021 | Retrieval Number: 100.1/ijitee.H92440610821 | DOI: 10.35940/ijitee.H9244.0610821
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The research has been carried out to develop secure login system by authenticating the login using modified SHA-384 algorithm. It derives 896-bit hash value for the password entered by the user in the user registration form and saves the credentials entered by the user in system’s database. Results obtained are evaluated by resolving the general attacks confirmed that the modified SHA-384 algorithm was more secured compared to the original SHA-384 algorithm as it was not broken using generic attacks such as brute force, rainbow table and other cracking tools available online such as Cain and Abel. The performance of the modified algorithm was measured with only 2 ms additional execution time from SHA-384.
Keywords: Modified SHA-384 hash algorithm, attacks, login authentication.