Ready to Start Your Career?

By: Prashant Kumar Dey
July 28, 2016
Prashant's Algorithm for Password Management

By: Prashant Kumar Dey
July 28, 2016
Prashant's Algorithm for Password Management
IntroductionWe've seen many forms of Social Engineering Attacks (SEA). The main aim of these SEA are to exploit the human vulnerability. The biggest vulnerability in Cyber Security is the human.Consider the following:- There's significant increase in websites and, without thinking, many people make accounts on them.
- Problems arise when we see a warning message like "Choose an unique Password" yet we keep same password for each and every site.
- This is something we can't ignore.
- We can't remember hundreds and thousands of password for hundreds and thousands of site.
- Herein lies vulnerability.
ROT 1 | ROT 2 | ROT 4 | ROT 6 | |
Plain Text | PRASHANT | PRASHANT | PRASHANT | PRASHANT |
Caesar Cipher | QSBTIBOU | RTCUJCPV | TVEWLERX | VXGYNGTZ |
Main Password Combination | Sites we are visiting | Final password combination |
Prashant$4007 | Prgasfhapntb$4c00l7 | |
Prashant$4007 | Gmail | Prhasjhanntm$4b00h7 |
Prashant$4007 | Pruasuhasntj$4f00x7 |