Securing Passwords: An Approach Inculcating Argon2 and Three-Fish Algorithm
N. Raja Rajeswari1, Reddaiah Buduri2, K. Santhi3, B. Susheel Kumar4, Kanusu Srinivasa Rao5, Krishnaiah Pulluru6
1N. Raja Rajeswari, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.
2Reddaiah Buduri, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.
3K. Santhi, Department of Animation. Dr. YSRArchitecture and Fine atrs University, Kadapa (Andhra Pradesh), India.
4B. Susheel Kumar, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.
5Dr. Kanusu Srinivasa Rao, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.
6Dr. Krishnaiah Pulluru, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (Andhra Pradesh), India.
Manuscript received on 30 November 2025 | Revised Manuscript received on 26 December 2025 | Second Revised Manuscript received on 18 March 2025 | Manuscript Accepted on 15 April 2025 | Manuscript published on 30 April 2025 | PP: 30-35 | Volume-14 Issue-4, April 2025 | Retrieval Number: 100.1/ijeat.D458214040425 | DOI: 10.35940/ijeat.D4582.14040425
Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Attacks such as phishing and hacking are becoming more common for individuals without authorization in the current environment. Because of this, authorized users of any domain, especially online, are having a difficult time in securing their data. The use of password mechanism at relevant locations is the primary suggestion to survive in these kinds of difficulties. By establishing the data validity in a manner that is more impenetrable, this work contributes to protect unauthorized access by password management. But there is always a possibility that passwords will be compromised at some point of time. Hashing passwords using memory-intensive function known as Argon2i is used in this work along with other approaches to strengthen the legitimacy of process. Consequently, a high-throughput hardware designed Three fish algorithm is used to improve security of user’s password.
Keywords: Passwords, Phishing, Argon2, Three-fish, Side Channel Attacks.
Scope of the Article: Security Technology