International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 267

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.2 / 10


     

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya


Abstract: Now-a-days, most of the users are using the websites, at the time of login session user have to enter the user name and password. Here, text password is the most familiar form of user authentication on websites, due to its well-located and simplicity. however, users password are prone to be stolen and compromised under different coercion and vulnerabilities. Sometimes, user may select the weak password for their remembrance and reuse the same password across the many variant websites. This may leads to the domino effects. Sometimes user may use the passwords in unauthorized computer suffers password thief coercions. the password is prone to stealing attacks such as phishing, malware and key loggers etc. In this paper, a user authentication protocol named Opass is designed, that makes use of the customers cellular phone and short message service to ensure protection against password stealing attacks. Opass requires a unique phone number that will be possessed by each participating website. The registration and the recovery phases involve a telecommunication service provider. The main concept of the project is reducing the password reuse attack. We have implemented the one time password technology, and then reduce the password validity time. The performance had improved the security.


Keywords: user authentication, hash function, network security, one-time password, password reuse attack, password stealing attack, encryption


Edition: Volume 3 Issue 9, September 2014


Pages: 1006 - 1011



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Joga Venkata Hari Babu V, G. Lavanya, "A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 1006-1011, https://www.ijsr.net/getabstract.php?paperid=SEP14282, DOI: https://www.doi.org/10.21275/SEP14282



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article



Top