Securing systems using Honeywords and QR Code

Authors

  • Prof. Krishna Tayade -
  • heena ghare BE, Student, nmiet talegaon dabhade, Pune, Maharashtra, India
  • pallavi ghugel BE, Student, nmiet talegaon dabhade, Pune, Maharashtra, India
  • sayali kadu BE, Student, nmiet talegaon dabhade, Pune, Maharashtra, India
  • harshal kesarkar BE, Student, nmiet talegaon dabhade, Pune, Maharashtra, India

Keywords:

Authentication, honeypot, honeywords, login, passwords, password cracking , QR code

Abstract

It is represented the honey word mechanism to observe associate degree opposer who makes an attempt to
login with cracked passwords. New password is that the combination of existing user passwords known as honey words.
Fake password is nothing however the honey words essentially, for every username a collection of sweet words is built
specified only 1 part is that the correct password and also the others area unit honey words (decoy passwords). Hence,
once an opposer tries to enter into the system with a honeyword, associate degree alarm is triggered to advise the
administrator a few password outflow. Honey words to observe attacks against hash password information. for every
user account the legitimate password hold on in variety of honey words. If assaulter Attack on password i.e. honeys
words it can't be positive it's real positive identification or honeyword. during this study, we tend to to look at intimately
with careful attention the honey word system and gift some comment to focus be used weak points. additionally
concentrate on pragmatic positive identification, scale back storage price of password, and alternate ay to selection the
new password from existing user positive identification. we tend to also are planning the new approach here we'll
produce the QR Code for the money transfer, rather than OTP once QR code is scan by banking industry the quantity
can transfer to individual account.

Published

2019-01-25

How to Cite

Prof. Krishna Tayade, heena ghare, pallavi ghugel, sayali kadu, & harshal kesarkar. (2019). Securing systems using Honeywords and QR Code. International Journal of Advance Engineering and Research Development (IJAERD), 6(1), 15–18. Retrieved from https://www.ijaerd.org/index.php/IJAERD/article/view/4020