Author
Sai Divya Kalagatla , Arun Sahayadhas
Keywords
Password Authentication; Negative Password; Offline Attacks; Wireless Body Area Networks.
Abstract
Although password authentication is still the most popular method of authentication, in spite of certain security vulnerabilities, secure password storage is an essential component of systems that rely on it. In this study, we present a framework for password authentication that can be readily integrated into current authentication systems and is intended for safe password storage. First, our framework uses a cryptographic hash algorithm (SHA-256) to hash the plain password that a client sends. Next, a negative password is created using the hashed password. Lastly, a symmetric-key method (AES) is used to encrypt the negative password into an encrypted negative password (ENP). Multi-iteration encryption may be used to increase security even further. It is challenging to decipher passwords from ENPs due to the symmetric encryption and cryptographic hash function. In addition, a given plain password has several associated ENPs, making pre-computation attacks (such as lookup table and rainbow table assaults) impractical. According to comparisons and studies of algorithm complexity, the ENP might withstand lookup table attacks and offer more robust password security against dictionary attacks. In addition to not adding additional components (salt), it is important to note that the ENP is still resistant to pre-computation attacks. Most notably, the ENP is the first password protection technique that just requires the plain password and combines the symmetric-key algorithm, the negative password, and the cryptographic hash function.
References
[1] Nazish Khalid a, Adnan Qayyum (2023) “Privacy-preserving artificial intelligence in healthcare: Techniques and applications” 158,106848
[2] Syed Jawad Hussain, Muhammad Irfan (2020) “Performance Enhancement in Wireless Body Area Networks with Secure Communication” https://doi.org/10.1007/s11277-020-07702-7
[3] Jehangir Arshad, Talha Ahmad Siddiqu (2023) “Deployment of an intelligent and secure cattle health monitoring system”, Egyptian Informatics Journal, Vol. 24, pp265-275.
[4] Jean-Paul A. Yaacoub a , Ola Salman (2020) “ Cyber-physical systems security: Limitations, issues and future trends”, Microprocessors and Microsystems. Vol. 77, 10320
[5] Victor Chang, Le Minh Thao Doan (2023) “Digitalization in omnichannel healthcare supply chain businesses: The role of smart wearable devices” , Journal of Business Research. Vol. 156, 113369
[6] Carmen Camara, Pedro Peris (2015) “Security and privacy issues in implantable medical devices: A comprehensive survey” Journal of Biomedical Informatics, Vol. 55, pp.272-289.
[7] Moustafa Mamdouh , Ali Ismail Awad (2021) “Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions” Computer & Security, 111, 102491
[8] Morteza Safaei Pour, Christelle Nader (2023) “A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security” Computers & Security, 128, 03123
[9] Pablo Najera , JavierLopez (2011) “Real-time location and inpatient care systems based on passive RFID” Journal of Network and Computer Applications. Vol. 34, pp.980-989.
[10] Andrew J, Deva Priya Isravel (2023) “Blockchain for healthcare systems: Architecture, security challenges, trends and future directions”, Journal of Network and Computer Applications 215, 103633.
[11] Matan Kintzlingera,c, Nir Nissima (2019) “Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems, Journal of Biomedical Informatics Vol. 95, 103233
[12] Reyazur Rashid Irshad, Shahab Saquib Sohail (2023) “Towards enhancing security of IoT-Enabled healthcare system” Heliyon 9, e22336.
[13] Sushovan Chaudhury, Kartik Sau (2023) “A blockchain-enabled internet of medical things system for breast cancer detection in healthcare” Healthcare Analytics 4, 100221
[2] Syed Jawad Hussain, Muhammad Irfan (2020) “Performance Enhancement in Wireless Body Area Networks with Secure Communication” https://doi.org/10.1007/s11277-020-07702-7
[3] Jehangir Arshad, Talha Ahmad Siddiqu (2023) “Deployment of an intelligent and secure cattle health monitoring system”, Egyptian Informatics Journal, Vol. 24, pp265-275.
[4] Jean-Paul A. Yaacoub a , Ola Salman (2020) “ Cyber-physical systems security: Limitations, issues and future trends”, Microprocessors and Microsystems. Vol. 77, 10320
[5] Victor Chang, Le Minh Thao Doan (2023) “Digitalization in omnichannel healthcare supply chain businesses: The role of smart wearable devices” , Journal of Business Research. Vol. 156, 113369
[6] Carmen Camara, Pedro Peris (2015) “Security and privacy issues in implantable medical devices: A comprehensive survey” Journal of Biomedical Informatics, Vol. 55, pp.272-289.
[7] Moustafa Mamdouh , Ali Ismail Awad (2021) “Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions” Computer & Security, 111, 102491
[8] Morteza Safaei Pour, Christelle Nader (2023) “A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security” Computers & Security, 128, 03123
[9] Pablo Najera , JavierLopez (2011) “Real-time location and inpatient care systems based on passive RFID” Journal of Network and Computer Applications. Vol. 34, pp.980-989.
[10] Andrew J, Deva Priya Isravel (2023) “Blockchain for healthcare systems: Architecture, security challenges, trends and future directions”, Journal of Network and Computer Applications 215, 103633.
[11] Matan Kintzlingera,c, Nir Nissima (2019) “Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems, Journal of Biomedical Informatics Vol. 95, 103233
[12] Reyazur Rashid Irshad, Shahab Saquib Sohail (2023) “Towards enhancing security of IoT-Enabled healthcare system” Heliyon 9, e22336.
[13] Sushovan Chaudhury, Kartik Sau (2023) “A blockchain-enabled internet of medical things system for breast cancer detection in healthcare” Healthcare Analytics 4, 100221
Received : 10 February 2025
Accepted : 24 May 2025
Published : 29 May 2025
DOI: 10.30726/esij/v12.i2.2025.122004