Loading

A Secure Scheme to Manage Complex Password Capable of Overcoming Human Memory Limitations
S. Maruthi Srinivas1, Bharath Manchikanti2, G. Chetan Babu3, N. Harini4

1S. Maruthi Srinivas, Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore (Tamil Nadu), India.
2Bharath Manchikanti, Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore (Tamil Nadu), India.
3G. Chetan Babu, Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore (Tamil Nadu), India.
4N. Harini, Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore (Tamil Nadu), India.
Manuscript received on 22 April 2019 | Revised Manuscript received on 01 May 2019 | Manuscript Published on 08 May 2019 | PP: 137-143 | Volume-7 Issue-5S3 February 2019 | Retrieval Number: E11260275S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security policies are required that protect information from illegal access, and also respect challenges users face in creating, and particularly managing, increasing numbers of passwords. With the increase in dependence of people on internet services for their day to day activities the number of passwords in use is more, the relationship between the passwords and the services is more complex. Each of the users follows their own strategy to remember and manage. Clearly, managing multiple passwords requires effort for creation, encoding, retrieval and execution. Most of us rely on the memory or reuse of passwords for easy management. The intricate characteristics of secure passwords, however, posit an unfortunate problem for password users. That is, whereas such passwords are difficult to be guessed by intruders, they are in general considerably difficult to be remembered by authorized users. This paper proposes a highly secure scheme that facilitates complex password management at ease without lack of user-friendliness.
Keywords: Encryption, Finger Print, Biometric, Authentication, Single Factor, Multi Factor.
Scope of the Article: Human Computer Interactions