HomeSMCC Higher Education Research Journal (Computing Journal)vol. 2 no. 1 (2019)

Implementation of Euclidean Algorithm for Single Key Authentication System

RICHARD KIM L MARGATE | CHARLES D MATURAN | RYAN PAUL A ROSALES | DAISA O GUPIT

 

Abstract:

In an age of explosive worldwide growth of technology and communications, many vital national interests require the effective protection of information/data. When used in conjunction with other information security approaches, encryption is a powerful tool for protecting password-based authentication.. Consequently, the current login system policy should be changed to promote and encourage the widespread use of security key and encrypted password for the protection of the user’s account and information while respecting the legitimate coverage functions to the extent consistent with good information protection. The protection of most password authentication mechanisms hinges on the secrecy of only a single phrase - if an adversary obtains the expertise of a victim’s password, the adversary will be in a position to impersonate the victim and gain get right of entry to the sources to which the sufferer is entitled. Although cryptographic potential and protocols offer some degree of safety throughout the transmission and storage of passwords, customers are frequently left unprotected with the aid of nothing; however, protection insurance policies and pointers are regularly neglected. In this research study, we present the findings from our system having a security key in an encrypted password-based authentication system in which the security key will be made through the encrypted password. The findings revealed that it is possible to make the security using the formula of finding the gcd of every string of the user’s password. The researchers also discovered that using this security key in a login system will make the account perceived to be stronger and more secure, which we considered important.