Katha Chanda

Work place: Department of Computer Science and Engineering, Amity School of Engineering and Technology, Noida, Uttar Pradesh, India

E-mail: katha4494@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms

Biography

Ms Katha Chanda is a final student of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Noida. She is currently pursuing her Bachelor of Technology in CSE from the aforementioned university and expects to graduate in June 2016.

Currently, she is a visiting research student at Singapore University of Technology and Design, Singapore, researching on classification of audio files. Her research interests include computer security and machine leaning. Her past work involves a proposal for a hybrid botnet detection framework which was subsequently published.

Author Articles
Password Security: An Analysis of Password Strengths and Vulnerabilities

By Katha Chanda

DOI: https://doi.org/10.5815/ijcnis.2016.07.04, Pub. Date: 8 Jul. 2016

Passwords can be used to gain access to specific data, an account, a computer system or a protected space. A single user may have multiple accounts that are protected by passwords. Research shows that users tend to keep same or similar passwords for different accounts with little differences. Once a single password becomes known, a number of accounts can be compromised. This paper deals with password security, a close look at what goes into making a password strong and the difficulty involved in breaking a password. The following sections discuss related work and prove graphically and mathematically the different aspects of password securities, overlooked vulnerabilities and the importance of passwords that are widely ignored. This work describes tests that were carried out to evaluate the resistance of passwords of varying strength against brute force attacks. It also discusses overlooked parameters such as entropy and how it ties in to password strength. This work also discusses the password composition enforcement of different popular websites and then presents a system designed to provide an adaptive and effective measure of password strength. This paper contributes toward minimizing the risk posed by those seeking to expose sensitive digital data. It provides solutions for making password breaking more difficult as well as convinces users to choose and set hard-to-break passwords.

[...] Read more.
Other Articles