Password Security Using Bcrypt with AES Encryption Algorithm

  • Narander KumarEmail author
  • Priyanka Chaudhary
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 77)


With the advancement of technology, the Internet has become a widely used tool of communication. Million numbers of individual all over in the world can get the utilization of technology. Novel issues like cyber stalking have been increasing worldwide global attention. Cyber stalking can be explained as threatening behavior or undesirable advances intended for another using the Internet and other way of online communications, so client authentication in computer systems is an essential feature in the present time for avoiding cyber stalking. In this paper, we have scheduled a technique utilizing Bcrypt hashing technique with AES encryption for securing an online account and reducing cyber criminal activity.


Cyber crime Hashing AES encryption algorithm Bcrypt hashing Cyber criminal Cyber stalking 


  1. 1.
    Bocjj, P.: The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals, 2nd edn, pp. 159–161. Greenwood Publishing Group, Westport, CT (2006)Google Scholar
  2. 2.
    Morley, D.: Understanding Computers in a Changing Society, 3rd edn, pp. 196–199. Course Technology Cengage Learning, Boston, MA (2008)Google Scholar
  3. 3.
    Buxton P.: Egg rails at password security, Netimperative, June, 24, (2002)Google Scholar
  4. 4.
    Zombie PCs for Rent Information Security&p%5Bne%wsletterId%5D=609, September 2004Google Scholar
  5. 5.
    Dorrans, B.: ASP.NET Security, Wiley (John Wiley & Sons, Ltd), ISBN:978-0-470-74365-2, 2010Google Scholar
  6. 6.
    Sriramya, P., Karthika, R.A.: Providing password security by salted password hashing using Bcrypt algorithm. J. Eng. Appl. Sci. 10(13), 5551–5556 (2015)Google Scholar
  7. 7.
    Chen, Y.C., Horng, G., Huang, C.C.: Privacy protection in on-line shopping for electronic documents. In: 5th International Conference on Information Assurance and Security, pp. 105–108 (2009)Google Scholar
  8. 8.
    Sultana, S., Ghinita, G. et. al.: A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks. IEEE Trans. Dependable. Secure Comput. 12(3), 256–269 (2015)Google Scholar
  9. 9.
    Halderman, J.A., Waters, B., Felten, E.: A convenient method for securely managing passwords. In: Proceeding of the 14th International World Wide Web Conference, pp. 471–479 (2005)Google Scholar
  10. 10.
    Khiyal, M.S.H., Khan, A., Bibi, N., Ashraf, T.: Analysis of password login phishing based protocols for security improvements. In: Proceeding of IEEE 5th International Conference on Emerging Technologies (ICET 2009), pp. 376–379 (2009)Google Scholar
  11. 11.
    Stallings, W.: Data and computer communications, Pearson Education, Inc., Eighth Edition, ISBN: 0-13-243310-9, (2007)Google Scholar
  12. 12.
    Islam, M.N., Mia, M.M.H., Chowdhury, M.F.I., Matin, M.A.: Effect of security increment to symmetric data encryption through AES methodology. In: Nineth ACIS International Conference on Software Engineering. Artificial Intelligence. Networking and Parallel/Distributed Computing, pp. 291–294 (2008)Google Scholar
  13. 13.
    Zhao, Z., Dong, Z., Wang, Y.: Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theor. Comput. Sci. 352, 280–287 (2006)Google Scholar
  14. 14.
    Khiyal, M.S.H., Khan, A., Bibi, Ashraf, N.T.: Analysis of password login phishing based protocols for security improvement. In: Proceeding of IEEE 5th International Conference on Emerging Technologies (ICET 2009), pp 376–379 (2009)Google Scholar
  15. 15.
    Lakshmanan, T., Muthusamy, M.: A novel secure hash algorithm for public key digital signature schemes. Int. Arab J. Inf. Technol. 262–267 (2012)Google Scholar
  16. 16.
    Ylonen, T.: SSH secure login connections over the internet. In: Proceedings of the USENIX Web Security, Privacy & Commerce, 2nd ednGoogle Scholar
  17. 17.
    Yue, C., Wang, H.: Anti-phishing in offense and defense. In: Proceedings of the 24th Annual Computer Security Applications Conference (AC-SAC’08), pp. 345–354 (2008)Google Scholar
  18. 18.
    Mwagwabi, F., McGill, T., Dixon, M.: Improving compliance with password guidelines: how user perceptions of passwords and security threats affect compliance with guidelines. In: 47th Hawaii International Conference on System Sciences, pp. 3188–3197 (2014)Google Scholar
  19. 19.
    Farmand, S., Zakaria, O.B.: Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4). In: 2nd IEEE International Conference on Information Management and Engineering (ICIME), pp. 644–650 (2010)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceB.B. Ambedkar University (A Central University)LucknowIndia

Personalised recommendations