Loading

Securing Passwords: An Approach Inculcating Argon2 and Three-Fish Algorithm
N. Raja Rajeswari1, Reddaiah Buduri2, K. Santhi3, B. Susheel Kumar4, Kanusu Srinivasa Rao5, Krishnaiah Pulluru6

1N. Raja Rajeswari, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.

2Reddaiah Buduri, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.

3K. Santhi, Department of Animation. Dr. YSRArchitecture and Fine atrs University, Kadapa (Andhra Pradesh), India.

4B. Susheel Kumar, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.

5Dr. Kanusu Srinivasa Rao, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.

6Dr. Krishnaiah Pulluru, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.       

Manuscript received on 30 November 2025 | Revised Manuscript received on 26 December 2025 | Second Revised Manuscript received on 18 March 2025 | Manuscript Accepted on 15 April 2025 | Manuscript published on 30 April 2025 | PP: 30-35 | Volume-14 Issue-4, April 2025 | Retrieval Number: 100.1/ijeat.D458214040425 | DOI: 10.35940/ijeat.D4582.14040425

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Attacks such as phishing and hacking are becoming more common for individuals without authorization in the current environment. Because of this, authorised users of any domain, especially those online, are having a difficult time securing their data. The use of a password mechanism at relevant locations is the primary suggestion for surviving these kinds of difficulties. By establishing data validity in a more impenetrable manner, this work contributes to protecting unauthorised access through password management. However, there is always a possibility that passwords will be compromised at some point. This work employs a memory-intensive function, Argon2i, in conjunction with other approaches to enhance the legitimacy of the password hashing process. Consequently, a high-throughput hardware-based Three Fish algorithm is used to improve the security of users’ passwords.

Keywords: Passwords, Phishing, Argon2, Three-fish, Side Channel Attacks.
Scope of the Article: Security Technology