2021
DOI: 10.1088/1742-6596/1783/1/012041
|View full text |Cite
|
Sign up to set email alerts
|

Login Security Using One Time Password (OTP) Application with Encryption Algorithm Performance

Abstract: During the Covid-19 pandemic, almost all jobs and activities to be limited, relying on the internet network. Data security in an internet network is most important and needs to be a concern for internet users. The internet network is a public network, which is vulnerable to security attacks. Attacks may occur to retrieve user data in the form of a username and password. This study conducts system design to improve the security of the username and password data when logging into web applications. Login using On… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 9 publications
0
5
0
1
Order By: Relevance
“…e method of filling is as follows: fill a 1 and countless after the information. Do not stop filling information with 0 until the above conditions are met [12].…”
Section: Md5 Encryption Algorithm Descriptionmentioning
confidence: 99%
“…e method of filling is as follows: fill a 1 and countless after the information. Do not stop filling information with 0 until the above conditions are met [12].…”
Section: Md5 Encryption Algorithm Descriptionmentioning
confidence: 99%
“…They also presented that the overall performance score of password and biometric combination outranks all other authentication schemes individually or combined in security, usability, and deployability wise. Kurniawan et al (2021) proposed a methodology for user authentication through the One-Time Password (OTP) system which employs AES and Blowfish algorithms to finetune the performance and security of the existing OTP authentication approach. They presented that 13.6% of survey participants positively responded to password sharing among others and 9.9% of account hacking events.…”
Section: Password Alternativesmentioning
confidence: 99%
“…We reviewed various publications [20], [21], [22], [23], [24], [25] that assess the performance of various encryption techniques by analysing the prevalence of Avalanche effect. These techniques primarily include symmetric key ciphers such as Advanced Encryption Standard (AES) [20], [21], [22], [23], Data Encryption Standard (DES) [21], [24], Twofish [21] and Blowfish [21], [22].…”
Section: A Major Contributionsmentioning
confidence: 99%
“…We reviewed various publications [20], [21], [22], [23], [24], [25] that assess the performance of various encryption techniques by analysing the prevalence of Avalanche effect. These techniques primarily include symmetric key ciphers such as Advanced Encryption Standard (AES) [20], [21], [22], [23], Data Encryption Standard (DES) [21], [24], Twofish [21] and Blowfish [21], [22]. Vadaviya and Tandel [25] described the importance of the Avalanche effect in determining the strength of various cryptographic schemes and hash functions, assessed the exhibition of the Avalanche effect by AES and proposed an algorithm that involves a relatively stronger impact of the Avalanche effect [25].…”
Section: A Major Contributionsmentioning
confidence: 99%