Secure Data Management - Secret Sharing Principles Applied To Data Or Password Protection

dc.contributor.authorUpadhya, A.H.K.
dc.contributor.authorAvinash.K
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2026-02-08T16:50:47Z
dc.date.issued2016
dc.description.abstractThis paper deals with the introduction of an information security mechanism to deal with the increasing threats of password hijack attacks. The proposed work deals with application of secret sharing principles for the protection of critical credentials of the stakeholders such as login Id and password. It is based on the fact that individual segments of passwords or credentials are ineffective without the existence of the remaining segments. We try to establish this fact to our advantage by proposing an implementation where password segments are distributed across several databases to strengthen their security and integrity and thereby, eliminate the threat of credential hijacking or phishing. The distributed nature of the divided segments of data can ensure lower probability of a successful attack. To summarize, an alternative encryption mechanism based on secret sharing is proposed which could be computationally efficient and which could provide equivalent or greater security in comparison with the standard cryptographic algorithms. © 2016 Walter de Gruyter GmbH, Berlin/Boston.
dc.identifier.citationComputation and Communication Technologies, 2016, Vol., , p. 204-216
dc.identifier.isbn9783110450071
dc.identifier.isbn9783110450101
dc.identifier.urihttps://doi.org/10.1115/1.4067197
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/33975
dc.publisherDe Gruyter
dc.subjectAugmented Password Protection
dc.subjectCryptographic Algorithms
dc.subjectSecret Sharing Principles
dc.subjectSecure Data Management
dc.titleSecure Data Management - Secret Sharing Principles Applied To Data Or Password Protection

Files

Collections