Full width home advertisement

Advertisement

LATEST SECURITY NEWS

LEARN ETHICAL HACKING

Advertisement

New encryption method called  Splintering  

Tide has implemented the new splintering technique in Tide Protocol. This technique takes encrypted passwords an authentication system, Then breaks them up into multiple splinters and stores them on a decentralized distributed network(DDN) from where they can be reassembled when required. 

simply This technique provides the most strong authentication system. It works to break down the user given password and distribute them at most 20 nodes and when needed it could be reassembled break password

Key feature:
  1. Break passwords and distribute with nodes
  2. The minimum number of splinters 20 nodes
  3. Each node is assigned to a splinter and can be assembled when requested.
Research and result:
Tide is a non-profit foundation, focusing on building data privacy-focused technologies. Researchers at tide tested the splintering technology against 60 million LinkedIn passwords. Splintering reduced the rate of successful dictionary attack (Reverse Engineering or Brute force attacks) from 100% to 0.00072%. Researchers found Splintering is 14 million percent more difficult to hack when compared to other techniques.

Achievement:
On this technique, it is most difficult to construct a password. So, those traditional attacking methods like Reverse Engineering or Brute force attacks can't get success. how fast is this process? type of this question researchers count splintering process time, but the most amazing result is this process takes between 1,500 milliseconds to 4,000 milliseconds. How fast is this anyone can imagine.

conclusion:
         splintering is the most effective authentication system which is super fast, strong security protocol and also best defender for hackers
and best friend of password

No comments:

Post a Comment

Advertisement