Securing Passwords: An Approach Inculcating Argon2 and Three-Fish Algorithm
Main Article Content
Abstract
Attacks such as phishing and hacking are becoming more common for individuals without authorization in the current environment. Because of this, authorized users of any domain, especially online, are having a difficult time in securing their data. The use of password mechanism at relevant locations is the primary suggestion to survive in these kinds of difficulties. By establishing the data validity in a manner that is more impenetrable, this work contributes to protect unauthorized access by password management. But there is always a possibility that passwords will be compromised at some point of time. Hashing passwords using memory-intensive function known as Argon2i is used in this work along with other approaches to strengthen the legitimacy of process. Consequently, a high-throughput hardware designed Three fish algorithm is used to improve security of user’s password.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Raghini, S., & Umarani C. (2022). Three Level Password Authentication System Mechanism. International Journal for Research in Applied Science & Engineering Technology, 10 (IV), 215-217. DOI: https://doi.org/10.22214/ijraset.2022.41178.
Turan, M. S., Barker, E., Burr, W., & Chen, L. (2010). Recommendation for password based key derivation, NIST special publication 800: 132. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf
Swapna, P., S., Hanumanthu Naik, K., Amruthavani, G., & Reddaiah, B. (2022). Hybrid Cryptosystem Ensuring CIA Traid. International Journal of Engineering and Advanced Technology, 12(1), 50-53. DOI: https://doi.org/10.35940/ijeat.A3841.1012122.
Udit, B., Nikhil, U., & Prathamesh, P. (2018). Symmetric Jumbling-Salting Encryption Algorithm for Files. The Fifth HCT INFORMATION TECHNOLOGY TRENDS (ITT), Dubai, UAE, 2018(ITT), 82-86. DOI: https://doi.org/10.1109/CTIT.2018.8649503.
Toras Pangidoan, B., Syahril, E., & Erna Budhiarti, N. (2021). Analysis Performance B-Crypt Algorithm to Improve Password Security from Brute Force. ICOSTA 2020 Journal of Physics: Conference Series, 1811(1), IOP Publication. DOI: https://doi.org/10.1088/1742-6596/1811/1/012129.
Rafael, A., Alicia, A., & Antonia, Z. (2018). Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption, Symmetry, 10(12). DOI: https://doi.org/10.3390/sym10120705.
Lam, D. K., Le, V. T. D., & Tran, T. H. (2022). Efficient Architectures for Full Hardware Scrypt-Based Block Hashing System. Electronics, 11, 068. DOI: https://doi.org/10.3390/electronics11071068.
Alex, B., Daniel, D., & Dmitry, K. (2016). Argon2: New Generation of Memory-Hard Functions for Passwords Hashing and Other Applications, IEEE European Symposium on Security and Privacy (Euro S & P). DOI: https://doi.org/10.1109/EuroSP.2016.31.
Kumar, N., & Chaudary, P. (2018). Password security using Bcrypt with AES encryption algorithm. Smart Computing and Informatics, 385-392. DOI: https://doi.org/10.1007/978-981-10-5544-7_37.
Nuray, At., Beuchat, J., & San, I. (2012). Compact Implementation of Threefish and Skein on FPGA. 5th IFIP International Conference on New Technologies, Mobility and Security, IEEE Press. DOI: https://doi.org/10.1109/NTMS.2012.6208693.
Shajarin, S., Leelavathi, P., et al., (2022). Three fish Algorithm: T-Mix Cipher using SHA-256. International Journal of Innovation Technology and Exploring Engineering, 11(10), 5-11. DOI: https://doi.org/10.35940/ijitee.J9267.09111022.
Kumar, D., Patidar, K., Saxena, Mr. G., & Kushwaha, Mr. R. (2021). A Hybrid Visual Cryptography Method using Sigmoid Function for Security Enhancement in Gray Scale Images. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 1, Issue 3, pp. 7–11). DOI: https://doi.org/10.54105/ijainn.b1026.061321
Swapna, P., Fazila, S., Naik, K. H., vani, G. A., & Reddaiah, B. (2022). Hybrid Cryptosystem Ensuring CIA Triad. In International Journal of Engineering and Advanced Technology (Vol. 12, Issue 1, pp. 50–53). DOI: https://doi.org/10.35940/ijeat.a3841.1012122
Poduval, V., Koul, A., Rebello, D., Bhat, K., & Wahul, M. R. M. (2020). Cloud based Secure Storage of Files using Hybrid Cryptography and Image Steganography. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 6, pp. 665–667). DOI: https://doi.org/10.35940/ijrte.f7227.038620
Gautham, H. A., & P, Dr. R. K. (2021). A Systematic Approach for a Secure Authentication System. In International Journal of Soft Computing and Engineering (Vol. 10, Issue 6, pp. 7–11). DOI: https://doi.org/10.35940/ijsce.f3508.0710621