• Corpus ID: 7795065

CRYPTOGRAPHICALLY USE OF CAESAR CIPHER TECHNIQUE IN PASSWORD MANAGING AND SECURITY SYSTEM

@inproceedings{Dey2015CRYPTOGRAPHICALLYUO,
  title={CRYPTOGRAPHICALLY USE OF CAESAR CIPHER TECHNIQUE IN PASSWORD MANAGING AND SECURITY SYSTEM},
  author={Prashant Kumar Dey and Tarun Kumar Dey and B. R. A. Bihar},
  year={2015}
}
In this paper we introduced a new type of social engineering attack via the website. We computed the result and then proposed a method to mitigate that attack. The research objective followed by the description of the experiment and then the mitigation of the suggested attack. The results were properly tabulated and contained the observations of our results. The paper ends with using the Caesar cipher for introducing the new password set method and its uniqueness. 
1 Citations

Figures and Tables from this paper

Mixed hill cipher methods with triple pass protocol methods
TLDR
An encoded Hill Cipher algorithm was used that multiplication the square matrix of the apparent text with a non-public key and then combined it with the Triple Pass Protocol method to repeat the encryption three times without relying on a personal key.

References

SHOWING 1-9 OF 9 REFERENCES
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
TLDR
This work revisits Abdalla and Pointcheval’s three-party PAKE protocol, and demonstrates that the protocol is vulnerable to an off-line dictionary attack whereby a malicious client can find out the passwords of other clients.
An off-line dictionary attack on a simple three-party key exchange protocol
TLDR
It is first shown that S-3PAKE is vulnerable to an off-line dictionary attack in which an attacker exhaustively enumerates all possible passwords in anOff-line manner to determine the correct one and how to eliminate the security vulnerability of S- 3PAKE.
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
TLDR
A comparative evaluation on the memorability and users'subjective preferences of the various passwords mechanims is provided, and it suggests that cognitive passwords and associative passwords seem the most appropriate for secondary passwords.
The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review]
  • V. F. Kleist
  • Computer Science
    IEEE Annals of the History of Computing
  • 2002
TLDR
The Cipher of Mary Queen of Scots: From Shunning Vigenère to the Man in the Iron Mask is a posthumous publication based on a manuscript originally written by Gordon C. Dickinson in 2005 and then edited by David I. Dickinson.
Social Engineering Detection Using Neural Networks
TLDR
Initial results are encouraging and indicate that machine learning can add an extra layer of security to protect individuals and organisations from social engineering attacks.
Phishing, Personality Traits and Facebook
TLDR
This study examines the correlation between the Big Five personality traits and email phishing response and examines how these factors affect users behavior on Facebook, including posting personal information and choosing Facebook privacy settings.
Online password strength checker
  • Online password strength checker
  • 2015
Proposed Federal Information Processing Data Encryption Standard
  • Federal Register (40FR12134)
  • 1975
CERT Insider Threat Team. Unintentional Insider Threats: Social Engineering. Software Engineering Institute
  • CERT Insider Threat Team. Unintentional Insider Threats: Social Engineering. Software Engineering Institute
  • 2014