RoseCliff Algorithm: Making Passwords Dynamic

Author:

Umejiaku Afamefuna P.1,Sheng Victor S.1

Affiliation:

1. Computer Science Department, Texas Tech University, Lubbock, TX 79409, USA

Abstract

Authentication in the digital landscape faces persistent challenges due to evolving cyber threats. Traditional text-based passwords, which are vulnerable to various attacks, necessitate innovative solutions to fortify user systems. This paper introduces the RoseCliff Algorithm, which is a dual authentication mechanism designed to enhance resilience against sophisticated hacking attempts and to continuously evolve stored passwords. The study explores encryption techniques, including symmetric, asymmetric, and hybrid encryption, thereby addressing the emerging threats posed by quantum computers. The RoseCliff Algorithm introduces introduces dynamism into passwords that allows for more secured communication across multiple platforms. To assess the algorithm’s robustness, potential attacks such as brute force, dictionary attacks, man-in-the-middle attacks, and machine learning-based attacks are examined. The RoseCliff Algorithm, through its dynamic password generation and encryption methodology, proves effective against these threats. Usability evaluation encompasses the implementation and management phase, focusing on seamless integration, and the user experience, emphasizing clarity and satisfaction. Limitations are acknowledged, thus urging further research into encryption technique resilience, robustness against breaches, and the integration of emerging technologies. In conclusion, the RoseCliff Algorithm emerges as a promising solution, thereby effectively addressing the complexities of modern authentication challenges and providing a foundation for future research and enhancements in digital security.

Publisher

MDPI AG

Reference41 articles.

1. Papathanasaki, M., Maglaras, L., and Ayres, N. (2022). Modern authentication methods: A comprehensive survey. AI Comput. Sci. Robot. Technol., 1–24.

2. A Review Of Authentication Methods;Lal;Int. J. Sci. Technol. Res.,2016

3. Konoth, R.K., van der Veen, V., and Bos, H. (2017). How anywhere computing just killed your phone-based two-factor authentication. Financ. Cryptogr. Data Secur., 405–421.

4. (2024, January 01). 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ ATC/CBDCOM/IOP/SCI). Available online: https://ieeexplore.ieee.org/xpl/conhome/8386711/proceeding.

5. Towhidi, F., Manaf, A.A., Daud, S.M., and Lashkari, A.H. (2011, January 18–21). The Knowledge Based Authentication Attacks. Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NV, USA.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3