Secure Multi-Agent Integrated Password Management (MIPM) Application

Authors

  • N. Awang Faculty of Computer & Mathematical Sciences, UiTM Shah Alam.
  • N. H. A. Zukri Faculty of Computer & Mathematical Sciences, UiTM (Melaka) Kampus Jasin
  • N. A. M. Rashid Faculty of Computer & Mathematical Sciences, UiTM (Melaka) Kampus Jasin
  • Z. A. Zulkifli Faculty of Computer & Mathematical Sciences, UiTM (Melaka) Kampus Jasin
  • N. A. N. Adnan Faculty of Computer & Mathematical Sciences, UiTM (Melaka) Kampus Jasin

Keywords:

AES encryption, multi-agent, Java Agent Development Environment, password management,

Abstract

Rapid development of the Internet and increasing number of available Web applications require users to memorize the passwords for authentication. Password management system is a solution to store login information such as password and help users to log in automatically. In preventing from password leaking, this project was integrated with the multi-agents using Java Agent Development Environment (JADE). The purpose of the embedded agents is act as the third party software to ease the encryption process. The application agent sends data to Crypto Agent using Agent Communication Language (ACL) message, a method of communication between agents. Upon receiving, crypto agent encrypts the data using AES 128-bit encryption algorithm. AES will facilitate the process of the encryption and decryption, and withstand the application from the brute force attack. As whole, MIPM is a development on android application that provide secure platform to store their login account information such as their username, emails and passwords. While, the implementation of the multi-agent communication in this project can be expanded to be commercialize for any web applications development.

References

Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering (IJCSE), 4(05), 877-882.

Amato, A., Di Martino, B., & Venticinque, S. (2012, July). Semantically augmented exploitation of pervasive environments by intelligent agents. In Parallel and Distributed Processing with Applications (ISPA), 2012 IEEE 10th International Symposium on (pp. 807-814). IEEE.

Hariri, M., Aldhubaib, R., Qurashi, R. J., Khan, F. Q., Fazil, M. (2012). Fourth Annual Undergraduate Research Conference on Applied Computing (URC 2012).

Pahal, R., & Kumar, V. (2013). Efficient Implementation of AES. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7), 290-295.

Saranya, K., Mohanapriya, R., & Udhayan, J. (2014). A Review on Symmetric Key Encryption Techniques in Cryptography. International Journal of Science, Engineering and Technology Research (IJSETR), 3(3), 539-544.

Singh, A., & Gilhotra, R. (2011). Data security using private key encryption system based on arithmetic coding. International Journal of Network Security & Its Applications (IJNSA), 3(3), 58-67.

CGI. (2004). Public Key Encryption and Digital Signature: How do they work? [White Paper]. CGI Group Inc.

Tripathi, R., & Agrawal, S. (2014). Comparative study of symmetric and asymmetric cryptography techniques. International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(6), 68-76.

Zhou, X., & Tang, X. (2011). Research and implementation of RSA algorithm for encryption and decryption. International Forum on Strategic Technology (IFOST), 6(2), pp. 1118-1121.

Wooldridge, M. (2002). An Introduction to MultiAgent Systems. John Wiley & Sons. LTD

Parkin, S., Driss, S., Krol, K., & Sasse, M. A. (2015). Assessing the User Experience of Password Reset Policies in a University. In International Conference on Passwords (pp. 21-38). Springer International Publishing.

Downloads

Published

2017-09-15

How to Cite

Awang, N., Zukri, N. H. A., Rashid, N. A. M., Zulkifli, Z. A., & Adnan, N. A. N. (2017). Secure Multi-Agent Integrated Password Management (MIPM) Application. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-12), 131–135. Retrieved from https://jtec.utem.edu.my/jtec/article/view/2782