Paper The following article is Open access

Implementation of incognito method and SHA-3 as an alternative to PIN selection in web login

and

Published under licence by IOP Publishing Ltd
, , Citation Gesi Deta Hendika Wardani and Yogha Restu Pramadi 2020 IOP Conf. Ser.: Mater. Sci. Eng. 852 012176 DOI 10.1088/1757-899X/852/1/012176

1757-899X/852/1/012176

Abstract

Currently, the PIN is still used to verify identity on web-based applications. PIN is widely used because it is easy authentication. However, a PIN has a potential security risk that is vulnerable to shoulder surfing attacks. The way to reduce shoulder surfing attacks is to create an interface that is difficult to attack with shoulder surfing attack techniques. One interface that can be applied is the incognito method. In this research, the application of the incognito method is implemented as a web login application. The application is built based on the web using the SHA3-256 algorithm to hash the PIN. The results of the stufy prove that the application built is resistant to shoulder surfing attack by attackers.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.
10.1088/1757-899X/852/1/012176