Innovations in Information and Communication Technology


Advances in Computing, Communication, Automation and Biomedical Technology


Password Protection using Honeywords

Sudarshan Pattabiraman, Nisha Soms and Poovanan A, Department of Computer Science and Engineering, Sri Ramakrishna Institute of Technology, Tamil Nadu, India.

Online First : 30 December 2020

Publisher Name : IJAICT India Publications, India.

Print ISBN : 978-81-950008-0-7

Online ISBN : 978-81-950008-1-4

Page : 002-005

Abstract


In today‘s world, stealing of a password hash file and cracking the hash passwords has become very easy for an adversary. Due to this, every individual‘s account is under a rigorous threat of being hacked which is occurring in a swift rate. As cyber security threats are boomingly increasing, there is a need to create to adopt a new method for protecting our credentials. Hence if a password-file breach takes place, Juels and Rivest pioneered a notion of distraction passwords known as “Honeywords”. In this technique, a number of fake passwords are generated for every user account. In this way, the hashed password database will comprise of real and fake passwords. In case the password file is broken by an adversary it becomes difficult for him to identify the collection of real passwords. If the intruder attempts any of the honeywords other than the actual password, the Honeyword model intimates about the password file attack with an alarm as a warning. Hence, it becomes a huge risk for an adversary to get detected. This paper proposes a decoy mechanism for securing the data from malicious users and tracing the IP address of the detected user to act against the felony.

Keywords


honeyword, username, hashing login, password file, false password, intruder, breach, sign in

Cite this article


Sudarshan Pattabiraman, Nisha Soms and Poovanan A, “Password Protection using Honeywords”, Innovations in Information and Communication Technology, pp. 002-005, December 2020.

Copyright


© 2020 Sudarshan Pattabiraman, Nisha Soms and Poovanan A. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.