Performance Evaluation Of Shadow Attacks Under No Password Re-Use Method

Kommuri Madhavilatha, Rodda Sireesha


In current day’s security plays a vital role in each and every domain which is used by almost all MNC and IT companies. As security plays an important role there was a vast improvement of information technology to give utmost security for the data which is stored and accessed by the various users. As the information is increasing day by day the storage area also increases with a number of different websites. A lot of users access their valuable information from a different websites; the security level of password-protected accounts is no longer purely determined by individual ones. Although different users may register multiple accounts on the same site or across multiple sites, and these passwords from the same users are likely to be the same or similar. If any attacker tries to hack one account credentials of a particular user, the same credentials can be used to break his other accounts related to him, so that all the other accounts will also be revealed due to these credentials. This type of attack is named as shadow attack on password reuse.Here in our proposed application we try to implement two types of shadow attacks based on the functionality they vary with one another.The attack which occur for an user having same password for his multiple accounts within the same site is known as intra site password reuse (ISPR) and if the same user or different user match with similar passwords either in different sites rather than same site is termed as cross site password reuse(CSPR) approach.We will show both the attacks in our current application provide an alternate solution for both approaches by avoiding passwords not to be used during the time of registration.

Full Text:


Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at 

Paper submission: