Password Authentication Using Modify Multi-Connect Architecture Associative Memory

Authors

  • Rusul Hussein University of Baghdad, Baghdad, Iraq
  • Inaam Salman Aboud College of Education Al-Mustansiriya University, Baghdad, Iraq
  • Rasha Majid Hassoon University of Baghdad, Baghdad, Iraq

DOI:

https://doi.org/10.26740/vubeta.v2i2.38218

Keywords:

Associative Memory, MMCA, Authentication , Password

Abstract

Abstract: Password authentication is one of the mechanisms that are widely used to authenticate an authorized user. In this research proposed password authentication for both graphical and textual password by using new technique is Modify Multi-connect architecture (MMCA) algorithm for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user, and the process time to authenticate each user is 0.5 and 1 seconds for textual password and graphical password respectively.

References

[1] A. Mostafa, M. Ezz, M. Elbashir, M. Alruily, E. Hamouda, M. Alsarhani et al., "Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication", Applied Sciences, vol. 13, no. 19, pp. 10871, 2023. https://doi.org/10.3390/app131910871

[2] D. Gupta, N. Mazumdar, A. Nag, & J. Singh, "Secure Data Authentication and Access Control Protocol for Industrial Healthcare System", Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 4853-4864, 2023. https://doi.org/10.1007/s12652-022-04370-2

[3] N. Karim, O. Khashan, H. Kanaker, W. Abdulraheem, M. Alshinwan, & A. Al-Banna, “Online Banking User Authentication Methods: A Systematic Literature Review", IEEE Access, vol. 12, pp. 741-757, 2024. https://doi.org/10.1109/access.2023.3346045

[4] E. Hamouda, M. Ezz, A. Mostafa, M. Elbashir, M. Alruily, & M. Tarek, "Innovative Hetero-Associative Memory Encoder (HAMTE) for Palmprint Template Protection", Computer Systems Science and Engineering, vol. 46, no. 1, pp. 619-636, 2023. https://doi.org/10.32604/csse.2023.035830

[5] T. Kang, N. Woo, & J. Ryu, "Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain", IEEE Access, vol. 12, pp. 35612-35629, 2024. https://doi.org/10.1109/access.2024.3373879

[6] S. Kaur, G. Kaur, & M. Shabaz, "A Secure Two-Factor Authentication Framework in Cloud Computing", Security and Communication Networks, vol. 2022, pp. 1-9, 2022. https://doi.org/10.1155/2022/7540891

[7] M. Ahmad, G. Tripathi, F. Siddiqui, M. Alam, M. Ahad, M. Akhtar et al., "BAuth-ZKP—A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities", Sensors, vol. 23, no. 5, pp. 2757, 2023. https://doi.org/10.3390/s23052757

[8] T. Suleski, M. Ahmed, W. Yang, & E. Wang, "A Review of Multi-Factor Authentication in the Internet of Healthcare Things", Digital Health, vol. 9, 2023. https://doi.org/10.1177/20552076231177144

[9] M. Almaiah, F. Hajjej, A. Ali, M. Pasha, & O. Almomani, "A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS", Sensors, vol. 22, no. 4, pp. 1448, 2022. https://doi.org/10.3390/s22041448

[10] H. Seksak, K. Amin, & S. Zarif, "Choice-Based Graphical Password (CGP) Scheme for Web Applications", IJCI. International Journal of Computers and Information, vol. 10, no. 3, pp. 104-112, 2023. https://doi.org/10.21608/ijci.2023.236026.1127

[11] C. Fidas and D. Lyras, "A Review of EEG-Based User Authentication: Trends and Future Research Directions", IEEE Access, vol. 11, pp. 22917-22934, 2023. https://doi.org/10.1109/access.2023.3253026

[12] J. Rivera, M. Afaq, & W. Song, "Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication", IEEE Open Journal of the Communications Society, vol. 5, pp. 2792-2814, 2024. https://doi.org/10.1109/ojcoms.2024.3391728

[13] I. Alkhwaja, M. Albugami, A. Alkhwaja, M. Alghamdi, H. Abahussain, F. Alfawaz et al., "Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming", Applied Sciences, vol. 13, no. 10, pp. 5979, 2023. https://doi.org/10.3390/app13105979

[14] G. Andreianu, "Protecting Your E-Commerce Business. Analysis on Cyber Security Threats", Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3), 2023. https://doi.org/10.19107/cybercon.2023.17

[15] K. Jyothi, S. Borra, K. Srilakshmi, P. Balachandran, G. Reddy, I. Colak et al., "A Novel Optimized Neural Network Model for Cyber Attack Detection using Enhanced Whale Optimization Algorithm", Scientific Reports, vol. 14, no. 1, 2024. https://doi.org/10.1038/s41598-024-55098-2

[16] K. Wang and M. Reiter, "Using Amnesia to Detect Credential Database Breaches", Advances in Information Security, pp. 183-215, 2022. https://doi.org/10.1007/978-3-031-16613-6_9

[17] H. El-Taj, D. Hamedah, & R. Saeed, "Artificial Intelligence and Advanced Cybersecurity to Mitigate Credential-Stuffing Attacks in the Banking Industry", International Journal of Computational and Experimental Science and Engineering, vol. 11, no. 1, 2025. https://doi.org/10.22399/ijcesen.754

[18] G. Misra, B. Hazela, & B. Chaurasia, "Privacy Preserving Authentication of IoMT in Cloud Computing", EAI Endorsed Transactions on Internet of Things, vol. 10, 2024. https://doi.org/10.4108/eetiot.6235

[19] S. Shinde, "A Study for an Ideal Password Management System", International Journal for Research in Applied Science and Engineering Technology, vol. 10, no. 1, pp. 976-980, 2022. https://doi.org/10.22214/ijraset.2022.39970

[20] W. Yu, Q. Yin, H. Yin, W. Xiao, T. Chang, L. He et al., "A Systematic Review on Password Guessing Tasks", Entropy, vol. 25, no. 9, pp. 1303, 2023. https://doi.org/10.3390/e25091303

[21] A. Juozapavičius, A. Brilingaitė, B. Linas, & R. Lugo, "Age and Gender Impact on Password Hygiene", Applied Sciences, vol. 12, no. 2, pp. 894, 2022. https://doi.org/10.3390/app12020894

[22] X. Guo, K. Tan, Y. Liu, M. Jin, & H. Lu, "LPG–PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords", Sensors, vol. 22, no. 12, pp. 4604, 2022. https://doi.org/10.3390/s22124604

[23] J. Blocki, B. Harsha, & S. Zhou, "On the Economics of Offline Password Cracking", 2018 IEEE Symposium on Security and Privacy (SP), pp. 853-871, 2018. https://doi.org/10.1109/sp.2018.00009

[24] T. Batubara, S. Efendi, & E. Nababan, "Analysis Performance BCRYPT Algorithm to Improve Password Security from Brute Force", Journal of Physics: Conference Series, vol. 1811, no. 1, pp. 012129, 2021. https://doi.org/10.1088/1742-6596/1811/1/012129

[25] S. Eum, H. Kim, M. Song, & H. Seo, "Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit", Applied Sciences, vol. 13, no. 16, pp. 9295, 2023. https://doi.org/10.3390/app13169295

[26] A. Obiki-Osafiele, E. Agu, & N. Chiekezie, "Protecting Digital Assets in Fintech: Essential Cybersecurity Measures and Best Practices", Computer Science & IT Research Journal, vol. 5, no. 8, pp. 1884-1896, 2024. https://doi.org/10.51594/csitrj.v5i8.1449

[27] M. Roopesh, "Cybersecurity Solutions and Practices: Firewalls, Intrusion Detection/Prevention, Encryption, Multi-Factor Authentication", Academic Journal on Business Administration, Innovation Sustainability, vol. 4, no. 3, pp. 37-52, 2024. https://doi.org/10.69593/ajbais.v4i3.90

[28] M. Hasan, F. Rozony, M. Kamruzzaman, & M. Uddin, "Common Cybersecurity Vulnerabilities: Software Bugs, Weak Passwords, Misconfigurations, Social Engineering", Global Mainstream Journal, vol. 3, no. 4, pp. 42-57, 2024. https://doi.org/10.62304/jieet.v3i04.193

[29] M. Grilo, J. Campos, J. Ferreira, J. Almeida, & A. Mendes, "Verified Password Generation from Password Composition Policies", Lecture Notes in Computer Science, pp. 271-288, 2022. https://doi.org/10.1007/978-3-031-07727-2_15

[30] G. Balayogi and K. Kuppusamy, "An Approach for Mitigating Cognitive Load in Password Management by Integrating QR Codes and Steganography", Security and Privacy, vol. 7, no. 6, 2024. https://doi.org/10.1002/spy2.447

[31] P. Gallus, D. Stanek, & I. Klaban, "Security Evaluation of Password Managers: A Comparative Analysis and Penetration Testing of Existing Solutions", International Conference on Cyber Warfare and Security, vol. 20, no. 1, pp. 105-113, 2025. https://doi.org/10.34190/iccws.20.1.3330

[32] A. Prasad, "Breaking Barriers: Passwordless Authentication as the Future of Security", International Journal of Computer Applications, vol. 186, no. 60, pp. 29-35, 2025. https://doi.org/10.5120/ijca2025924353

[33] T. Oduguwa and A. Arabo, "Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics", Journal of Cybersecure Privacy, vol.4, pp. 278-297, 2024. https://doi.org/10.20944/preprints202401.1466.v1

[34] D. Krishna, R. Ramaguru, K. Praveen, M. Sethumadhavan, K. Ravichandran, R. Krishankumar et al., "SSH-Dauth: Secret Sharing Based Decentralized OAuth using Decentralized Identifier", Scientific Reports, vol. 13, no. 1, 2023. https://doi.org/10.1038/s41598-023-44586-6

[35] A. Pratama, F. Firmansyah, & F. Rahma, "Security Awareness of Single Sign-on Account in the Academic Community: The Roles of Demographics, Privacy Concerns, and Big-Five Personality", PeerJ Computer Science, vol. 8, pp. e918, 2022. https://doi.org/10.7717/peerj-cs.918

[36] Μ. Παπαϊωάννου, F. Pelekoudas‐Oikonomou, Γ. Μαντάς, E. Serrelis, J. Rodrı́guez, & M. Fengou, "A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones", Sensors, vol. 23, no. 6, pp. 2979, 2023. https://doi.org/10.3390/s23062979

[37] A. Wong, Z. Huang, X. Chen, & K. Wu, "ArtiLock: Smartphone User Identification Based on Physiological and Behavioral Features of Monosyllable Articulation", Sensors, vol. 23, no. 3, pp. 1667, 2023. https://doi.org/10.3390/s23031667

[38] Μ. Παπαϊωάννου, G. Zachos, Γ. Μαντάς, I. Essop, F. Saghezchi, & J. Rodrı́guez, "Outlier Detection for Risk-Based User Authentication on Mobile Devices", GLOBECOM 2023 - 2023 IEEE Global Communications Conference, pp. 2778-2783, 2023. https://doi.org/10.1109/globecom54140.2023.10437467

[39] A. Chakravarthy, P. Avadhani, P. Prasad, N. Rajeev, & D. Reddy, "A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network", Advanced Computing: An International Journal, vol. 2, no. 4, pp. 33-42, 2011. https://doi.org/10.5121/acij.2011.2404

[40] A. Chakravarthy, P. Raja, & P. Avadhani, "A Novel Approach for Pass Word Authentication Using Bidirectional Associative Memory", Advanced Computing: An International Journal, vol. 2, no. 6, pp. 123-135, 2011. https://doi.org/10.5121/acij.2011.2404

[41] R. Hasan, N. Jabr, & E. Kareem, “Password Authentication Based on Modify Bidirectional Associative Memory (MBAM)”, International Journal of Recent Trends in Engineering & Research, vol. 2, no. 2, pp. 261-267, 2016.

Downloads

Published

2025-06-19

How to Cite

[1]
R. Hussein, Inaam Salman Aboud, and Rasha Majid Hassoon, “Password Authentication Using Modify Multi-Connect Architecture Associative Memory”, Vokasi Unesa Bull. Eng. Technol. Appl. Sci., vol. 2, no. 2, pp. 333–341, Jun. 2025.

Issue

Section

Article
Abstract views: 102 , PDF Downloads: 69