Downloads: 117 | Views: 267
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.2 / 10
A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass
Joga Venkata Hari Babu V, G. Lavanya
Abstract: Now-a-days, most of the users are using the websites, at the time of login session user have to enter the user name and password. Here, text password is the most familiar form of user authentication on websites, due to its well-located and simplicity. however, users password are prone to be stolen and compromised under different coercion and vulnerabilities. Sometimes, user may select the weak password for their remembrance and reuse the same password across the many variant websites. This may leads to the domino effects. Sometimes user may use the passwords in unauthorized computer suffers password thief coercions. the password is prone to stealing attacks such as phishing, malware and key loggers etc. In this paper, a user authentication protocol named Opass is designed, that makes use of the customers cellular phone and short message service to ensure protection against password stealing attacks. Opass requires a unique phone number that will be possessed by each participating website. The registration and the recovery phases involve a telecommunication service provider. The main concept of the project is reducing the password reuse attack. We have implemented the one time password technology, and then reduce the password validity time. The performance had improved the security.
Keywords: user authentication, hash function, network security, one-time password, password reuse attack, password stealing attack, encryption
Edition: Volume 3 Issue 9, September 2014
Pages: 1006 - 1011
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash