Generating Honeywords using Toughnuts

  • Unique Paper ID: 148075
  • PageNo: 316-319
  • Abstract:
  • As society relies on digital world, the threat continues to quickly increase. once a year new mechanism against cyber security threats is introduced. At same time the cybercriminals in addition produce new techniques to beat these efforts. One in every of the important security issue is with revealing of positive identification file. To tune up this issue the construct of honeywords i.e. false password is introduced. we tend to tend to point out an easy methodology for raising the protection of hashed passwords: the upkeep of extra “honeywords” (false passwords) associated with each user’s account. AN opponent WHO steals a file of hashed passwords and inverts the hash function cannot tell if he has found the password or a honeyword. The tried use of a honeyword for login triggers AN alarm. AN auxiliary server (the “honeychecker”) can distinguish the user positive identification from honeywords for the login routine, and can go off AN alarm if a honeyword is submitted.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{148075,
        author = {Harikrishna Reghu and Gibi Thomas and Pranav P  and Kavya Prasad and Akhija Lakshmi R},
        title = {Generating Honeywords using Toughnuts},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {5},
        number = {12},
        pages = {316-319},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=148075},
        abstract = {As society relies on digital world, the threat continues to quickly increase. once a year new mechanism against cyber security threats is introduced. At same time the cybercriminals in addition produce new techniques to beat these efforts. One in every of the important security issue is with revealing of positive identification file. To tune up this issue the construct of honeywords i.e. false password is introduced. we tend to tend to point out an easy methodology for raising the protection of hashed passwords: the upkeep of extra “honeywords” (false passwords) associated with each user’s account. AN opponent WHO steals a file of hashed passwords and inverts the hash function cannot tell if he has found the password or a honeyword. The tried use of a honeyword for login triggers AN alarm. AN auxiliary server (the “honeychecker”) can distinguish the user positive identification from honeywords for the login routine, and can go off AN alarm if a honeyword is submitted.},
        keywords = {Honeywords, Authentication, Password},
        month = {},
        }

Cite This Article

Reghu, H., & Thomas, G., & P, P., & Prasad, K., & R, A. L. (). Generating Honeywords using Toughnuts. International Journal of Innovative Research in Technology (IJIRT), 5(12), 316–319.

Related Articles