
Implementation of incognito method and SHA-3 as an alternative to PIN selection in web login
Author(s) -
Gesi Deta Hendika Wardani,
Yogha Restu Pramadi
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/852/1/012176
Subject(s) - login , computer science , computer security , hash function , authentication (law) , interface (matter) , web application , world wide web , operating system , bubble , maximum bubble pressure method
Currently, the PIN is still used to verify identity on web-based applications. PIN is widely used because it is easy authentication. However, a PIN has a potential security risk that is vulnerable to shoulder surfing attacks. The way to reduce shoulder surfing attacks is to create an interface that is difficult to attack with shoulder surfing attack techniques. One interface that can be applied is the incognito method. In this research, the application of the incognito method is implemented as a web login application. The application is built based on the web using the SHA3-256 algorithm to hash the PIN. The results of the stufy prove that the application built is resistant to shoulder surfing attack by attackers.