SECURE OF WEB-ACCOUNTS USING PERSONAL-PCFG

Vaishnavi Mahajan, Pratima Nikam, Kalyani Padmawar, Nihar Ranjan

Abstract


For security of the data as well as maintaining privacy over the internet, authentication is used. For this the password is used but the user uses small password, easy to memorize password or password which can be guessed easily. People use personal information as their password for easy memorization. In this paper, we analysis the various passwords from the leaked dataset to research their personal information for finding the relation between them and the password. We use Probabilistic Context-Free Grammars (PCFG) method with semantic-rich method to propose Personal-PCFG method. This method will help us to crack the password much faster than the PCFG method which increases the chances of successful password crack. To protect user from this type of attacks we use distortion function.

Keywords


Cyber security, Information security, PCFG

Full Text:

PDF

References


J. H. Seo, K. Emura, “Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Cryptographers” Track at the RSA Conference. Springer Berlin Heidelberg. 2013; 343-358.

J. Shao, Z. Cao, “Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption”. Information Sciences, 2012; 206, 83-95.

J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”. IEEE Transactions

K. Liang, Z. Liu, X. Tan, D. S. Wong, C. Tang, “A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: International Conference on Information Security and Cryptology”. Springer Berlin Heidelberg. 2012; 231-246.

L. Ferretti, M. Colajanni, M. Marchetti,”Distributed, concurrent, and independent access to encrypted cloud databases”. IEEE transactions on parallel and distributed systems, 2014; 25(2), 437-446. on Computers, 2016; 65(6), 1992-2004.

J. H. Seo, K. Emura,“Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Cryptographers” Track at the RSA Conference. Springer Berlin Heidelberg. 2013; 343-358.

J. Shao, Z. Cao, “Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption”. Information Sciences, 2012; 206, 83-95.

J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”. IEEE Transactions

K. Liang, Z. Liu, X. Tan, D. S. Wong, C. Tang, “A CCA-secure identity-based conditional proxy re-encryption without random oracles”. In: International Conference on Information Security and Cryptology. Springer Berlin Heidelberg. 2012; 231-246.

L. Ferretti, M. Colajanni, M. Marchetti, “Distributed, concurrent, and independent access to encrypted cloud databases”. IEEE transactions on parallel and distributed systems, 2014; 25(2), 437-446. on Computers, 2016; 65(6), 1992-2004.


Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2018 INTERNATIONAL EDUCATION AND RESEARCH JOURNAL