A Scheme to Passcode Generation

Volume: 7 Number: 1 March 1, 2018
  • Ahmad Yusairi Bani Hashim

A Scheme to Passcode Generation

Abstract

A passcode is a password usually used to receive permission to access a system. It is a combination of 4 or 6 digits or alphanumerics. Generating a passcode may be done by simply guessing the combination using, for instance, a birthdate, street address, pet’s name. The said approach is straightforward and easy to memorize. This study uses the procedures for generating a passcode by gene encoding. Gene encoding is a framework of a synthetic community that they mingle around, get married, and have children. The data of who is who and whose offspring it is are the critical data that lead to a passcode creation. We use a set of information in the form of thumbprints belong to ten participants. There was a balanced ratio between male and female participants whose age range from 20 to 26 years old. All participants have had no thumbprint trauma. The data was gene encoded. It has created a new community of families of two parents and a child. The child’s personality becomes the basis for the passcode generation. The developed passcodes relate the owner’s biographic and biometric data. The results suggest that the outcomes of the algorithm able to produce the strongest to the weakest passcodes. The method has its strength in giving solutions from selective procedures. It is the artist’s total control on how the algorithm would run the processes. Therefore, the steps in constructing the codes discussed in this work are mere guidelines for generating passcodes.

Keywords

References

  1. J. Ding, S. Alsayigh, J. Lancrenon, S. RV, and M. Snook, "Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World," in Topics in Cryptology – CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings, H. Handschuh, Ed., ed Cham: Springer International Publishing, 2017, pp. 183-204.
  2. C.-M. Chen, W. Fang, K.-H. Wang, and T.-Y. Wu, "Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”," Nonlinear Dynamics, vol. 87, pp. 2073-2075, February 01 2017.
  3. M. S. Farash and M. A. Attari, "An efficient and provably authenticated key exchange protocol based on Chebyshev chaotic maps," Nonlinear Dynamics, vol. 77, pp. 399-411, July 01 2014. password-based
  4. X. Guo and J. Zhang, "Secure group key agreement protocol based on chaotic Hash," Information Sciences, vol. 180, pp. 4069-4074, 2010/10/15/ 2010.
  5. T.-F. Lee, "Enhancing the security of password authenticated key agreement protocols based on chaotic maps," Information Sciences, vol. 290, pp. 63-71, 2015/01/01/ 2015.
  6. J. W. Kalat, Introduction to psychology: Nelson Education, 2016.
  7. A. Y. Bani Hashim, "Development of Artificial Intelligent Control," Universiti Putra Malaysia, 2002. for Manipulator Position
  8. H. Ismail and K. Hon, "The nesting of two-dimensional shapes using genetic algorithms," Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, vol. 209, pp. 115-124, 1995.

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Ahmad Yusairi Bani Hashim This is me

Publication Date

March 1, 2018

Submission Date

-

Acceptance Date

-

Published in Issue

Year 2018 Volume: 7 Number: 1

APA
Hashim, A. Y. B. (2018). A Scheme to Passcode Generation. International Journal of Information Security Science, 7(1), 1-10. https://izlik.org/JA58LK97ZR
AMA
1.Hashim AYB. A Scheme to Passcode Generation. IJISS. 2018;7(1):1-10. https://izlik.org/JA58LK97ZR
Chicago
Hashim, Ahmad Yusairi Bani. 2018. “A Scheme to Passcode Generation”. International Journal of Information Security Science 7 (1): 1-10. https://izlik.org/JA58LK97ZR.
EndNote
Hashim AYB (March 1, 2018) A Scheme to Passcode Generation. International Journal of Information Security Science 7 1 1–10.
IEEE
[1]A. Y. B. Hashim, “A Scheme to Passcode Generation”, IJISS, vol. 7, no. 1, pp. 1–10, Mar. 2018, [Online]. Available: https://izlik.org/JA58LK97ZR
ISNAD
Hashim, Ahmad Yusairi Bani. “A Scheme to Passcode Generation”. International Journal of Information Security Science 7/1 (March 1, 2018): 1-10. https://izlik.org/JA58LK97ZR.
JAMA
1.Hashim AYB. A Scheme to Passcode Generation. IJISS. 2018;7:1–10.
MLA
Hashim, Ahmad Yusairi Bani. “A Scheme to Passcode Generation”. International Journal of Information Security Science, vol. 7, no. 1, Mar. 2018, pp. 1-10, https://izlik.org/JA58LK97ZR.
Vancouver
1.Ahmad Yusairi Bani Hashim. A Scheme to Passcode Generation. IJISS [Internet]. 2018 Mar. 1;7(1):1-10. Available from: https://izlik.org/JA58LK97ZR