SlideShare a Scribd company logo
1 of 11
PBLPresentation on
“Three-Level Password Authentication”
Presented By:
Shikhar Agrawal-2014110603
Shruti Bhartia-2014110606
Nandini Gupta-2014110621
Apoorv Saxena-2014110648
Guided By:
Prof. Aradhana Thorat
Department of Computer Science and Engineering
Bharati Vidyapeeth (Deemed to be University)
College of Engineering, Pune.
Content
• Introduction of Topic
• Justification of Topic
• Literature study of Topic
• Methodology Used
• Snapshot of Implementation Result
• Advantages and Disadvantages of Topic
• Application of Topic
• Conclusion
ABSTRACT
Nowadays, we have known that computer security mostly depends on password to verify and authenticate users. There are
many authentication schemes proposed and most of them are still have weaknesses. Some of them are based on the
physical and behavioral properties of the user such as voice recognition, and some others are based on knowledge of the
user such as textual and graphical passwords. However, these schemes are still not secure enough and allow attackers to
steal the data easily. Moreover, users often use simple password that attackers can guess easily. Therefore, it needs
something for secure and user-friendly authentication schemes to overcome this problem. In this project we will implement
3-level password authentication scheme to overcome the problem. The three different levels used in the 3-level password
authentication scheme are text password, pattern-based password and one-time password (OTP). These authentication
schemes are classified as knowledge-based authentication. The main objective of the three-level security system is to
provide advanced security to the web applications, to prevent unauthorized access and to make the applications more user
friendly. Hopefully, the system can give a better secure environment to the user from unauthorized access.
• Introduction of Topic
The project is an authentication system that only allows users to access the system if they have entered the correct
password. The project includes three levels of user authentication. There are a variety of password systems, many of
which have failed due to bot attacks. while some have pushed them to their limits. In short, almost all passwords
available today can be cracked to some extent. Therefore, this project aims to achieve maximum security in user
authentication.
Contains three logins that have three different types of password systems. The difficulty of the password increases
with each level. Users must enter the correct password to log in successfully. Users have the right to set passwords as
they wish. The project includes text passwords, i.e., passphrase, an image-based password, and a graphic-based
password. for all three levels. That way there would be negligible chances of the bot or anyone else cracking the
passwords, even if they crack the first or second level it would be impossible to crack the third. Therefore, when
developing the technology, the emphasis was on the use of innovative and non-traditional methods. Most of the widely
used text-based password systems are unfriendly for many users, so in the case of three-level passwords, we try to
create a simple user interface and provide users with as much convenience as possible in password resolution.
• Justification of Topic
Authentication plays an important role in protecting resources from unauthorized use. Many sealing actions consist of
simple and expensive password-based authentication systems and computationally intensive biometric sealing schemes.
Passwords are more than just a key. Password serves multiple purposes. our personal identity is a secret key that only we
should know. They guarantee our privacy and protect our sensitive information. They also require a disclaimer and prevent
us from retrospectively denying the validity of transactions authenticated with our passwords.
• Objective of Topic
The difficulty of the password increases with each level passes. Users should enter the correct password to log in
successfully. Users have the privilege to set passwords as they wish.
Any programmer who exceptionally assumes (albeit problematically) to violate more than two security levels mentioned, has
no chance of violating the third security level since in third level user need to correct the puzzles or unless he/she approaches
the identifier of messaging of the first customers.
This paper proposes three level authentications where the user need to Register itself with all three levels if it is a new user
and after registration the user can login, if the user enters invalid password, then the user cannot login and for recovery of
password there is an option where user can verify its Username with Email ID then user can change the password.
Levels in the system:
1. First Level: The first level is a conventional password system that is text-based password or a passphrase. Users would
have to set a text password initially based on some specifications.
2. Second Level: The second level is an image-based password where users can upload their desired image into the system
and then create password by segmenting it and assigning them serial numbers. During login process the system will
automatically disperse the image segmentations and users have to arrange it as set by them initially.
3. Third Level: The third level is a graphical password method where users have to set password based on some color
combinations through RGB button combinations.
• Scope of the topic
Authentication plays an important role in protecting resources from unauthorized use. Many sealing actions consist of
simple and expensive password-based authentication systems and computationally intensive biometric sealing schemes.
Passwords are more than just a key.
The three level of security are:
1.Textual Authentication: The first phase is normal Text-based Authentication where the user needs to log in by giving it
User ID and Password. Password can be any form of a combination of Alphanumeric and symbols minimum of 11
characters. If a user forgets a password or invalid password, then the user can choose the option called Email where the
user needs to confirm its username with an Email ID after confirmation user can reset it whole three-levels password
authentication procedure.
2.Image Authentication: This Authentication system uses colour selection combination where the User needs to choose a
combination and remember the combination while logging in if by default user forgets its colour combination and could
not remember then the user can reset it from email while he/she needs to reset it all three-levels password Authentication.
3.Graphical Authentication: In this level, the user can upload any image related to itself or its own image and that image
will be cropped into 9 small images while logging into the final level User needs to arrange all 9 combinations of images
by selecting each image or can drag and drop it, after arranging user can finally login into the system.
It includes three logins with three different types of password systems. The difficulty of the password increases with each
level passes. Users should enter the correct password to log in successfully. Users have the privilege to set passwords as
they wish.
• Snapshot of the code
2) IMAGE SEQUENCE REGISTRATION
1) HOME PAGE
3) SEQUENCE REGISTRATION
4) ADMIN LOGIN PAGE
5) VIEW FILE PAGE
6) REGISTRATION PAGE
Conclusion
The three-level authentication system had been applied to the above system which makes it highly secure along
with more user-friendly. This system will help with Man-in-the-middle attacks and Brute-force attacks on the
user’s side. A three-level security system is a time-consuming approach since the user needs to enter details
carefully for all three security levels and at last, the user can add any image for its final level Authentications.
Therefore, this system is not suitable for the general purpose of security since it takes time to fill in all three
security level details. But it will be helpful in high-security levels where the security of data is a primary concern
and time complexity is secondary. In the future, we can add more features like OTP (One Time Password)
Authentication and Captcha Authentication where if the user uses VPN (Virtual Private Network) to browse then
multiple Captcha can stop the user to use the software. The main objective of this project is to improve the
security level of the systems for many survey papers where researched. It is found that a three-level authentication
system helps to provide more security compared to one-level and two-level authentication systems. Three levels
are more important because the user needs to enter critical details and log in with three different levels of
authentication.

More Related Content

Similar to CNS Review PPT.pptx

GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
Research ppr
Research pprResearch ppr
Research pprSara Sahu
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass facesIJERA Editor
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSIJNSA Journal
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Passwordijtsrd
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 

Similar to CNS Review PPT.pptx (20)

Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
Research ppr
Research pprResearch ppr
Research ppr
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass faces
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

CNS Review PPT.pptx

  • 1. PBLPresentation on “Three-Level Password Authentication” Presented By: Shikhar Agrawal-2014110603 Shruti Bhartia-2014110606 Nandini Gupta-2014110621 Apoorv Saxena-2014110648 Guided By: Prof. Aradhana Thorat Department of Computer Science and Engineering Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune.
  • 2. Content • Introduction of Topic • Justification of Topic • Literature study of Topic • Methodology Used • Snapshot of Implementation Result • Advantages and Disadvantages of Topic • Application of Topic • Conclusion
  • 3. ABSTRACT Nowadays, we have known that computer security mostly depends on password to verify and authenticate users. There are many authentication schemes proposed and most of them are still have weaknesses. Some of them are based on the physical and behavioral properties of the user such as voice recognition, and some others are based on knowledge of the user such as textual and graphical passwords. However, these schemes are still not secure enough and allow attackers to steal the data easily. Moreover, users often use simple password that attackers can guess easily. Therefore, it needs something for secure and user-friendly authentication schemes to overcome this problem. In this project we will implement 3-level password authentication scheme to overcome the problem. The three different levels used in the 3-level password authentication scheme are text password, pattern-based password and one-time password (OTP). These authentication schemes are classified as knowledge-based authentication. The main objective of the three-level security system is to provide advanced security to the web applications, to prevent unauthorized access and to make the applications more user friendly. Hopefully, the system can give a better secure environment to the user from unauthorized access.
  • 4. • Introduction of Topic The project is an authentication system that only allows users to access the system if they have entered the correct password. The project includes three levels of user authentication. There are a variety of password systems, many of which have failed due to bot attacks. while some have pushed them to their limits. In short, almost all passwords available today can be cracked to some extent. Therefore, this project aims to achieve maximum security in user authentication. Contains three logins that have three different types of password systems. The difficulty of the password increases with each level. Users must enter the correct password to log in successfully. Users have the right to set passwords as they wish. The project includes text passwords, i.e., passphrase, an image-based password, and a graphic-based password. for all three levels. That way there would be negligible chances of the bot or anyone else cracking the passwords, even if they crack the first or second level it would be impossible to crack the third. Therefore, when developing the technology, the emphasis was on the use of innovative and non-traditional methods. Most of the widely used text-based password systems are unfriendly for many users, so in the case of three-level passwords, we try to create a simple user interface and provide users with as much convenience as possible in password resolution.
  • 5. • Justification of Topic Authentication plays an important role in protecting resources from unauthorized use. Many sealing actions consist of simple and expensive password-based authentication systems and computationally intensive biometric sealing schemes. Passwords are more than just a key. Password serves multiple purposes. our personal identity is a secret key that only we should know. They guarantee our privacy and protect our sensitive information. They also require a disclaimer and prevent us from retrospectively denying the validity of transactions authenticated with our passwords.
  • 6. • Objective of Topic The difficulty of the password increases with each level passes. Users should enter the correct password to log in successfully. Users have the privilege to set passwords as they wish. Any programmer who exceptionally assumes (albeit problematically) to violate more than two security levels mentioned, has no chance of violating the third security level since in third level user need to correct the puzzles or unless he/she approaches the identifier of messaging of the first customers. This paper proposes three level authentications where the user need to Register itself with all three levels if it is a new user and after registration the user can login, if the user enters invalid password, then the user cannot login and for recovery of password there is an option where user can verify its Username with Email ID then user can change the password. Levels in the system: 1. First Level: The first level is a conventional password system that is text-based password or a passphrase. Users would have to set a text password initially based on some specifications. 2. Second Level: The second level is an image-based password where users can upload their desired image into the system and then create password by segmenting it and assigning them serial numbers. During login process the system will automatically disperse the image segmentations and users have to arrange it as set by them initially. 3. Third Level: The third level is a graphical password method where users have to set password based on some color combinations through RGB button combinations.
  • 7. • Scope of the topic Authentication plays an important role in protecting resources from unauthorized use. Many sealing actions consist of simple and expensive password-based authentication systems and computationally intensive biometric sealing schemes. Passwords are more than just a key. The three level of security are: 1.Textual Authentication: The first phase is normal Text-based Authentication where the user needs to log in by giving it User ID and Password. Password can be any form of a combination of Alphanumeric and symbols minimum of 11 characters. If a user forgets a password or invalid password, then the user can choose the option called Email where the user needs to confirm its username with an Email ID after confirmation user can reset it whole three-levels password authentication procedure. 2.Image Authentication: This Authentication system uses colour selection combination where the User needs to choose a combination and remember the combination while logging in if by default user forgets its colour combination and could not remember then the user can reset it from email while he/she needs to reset it all three-levels password Authentication. 3.Graphical Authentication: In this level, the user can upload any image related to itself or its own image and that image will be cropped into 9 small images while logging into the final level User needs to arrange all 9 combinations of images by selecting each image or can drag and drop it, after arranging user can finally login into the system. It includes three logins with three different types of password systems. The difficulty of the password increases with each level passes. Users should enter the correct password to log in successfully. Users have the privilege to set passwords as they wish.
  • 8. • Snapshot of the code 2) IMAGE SEQUENCE REGISTRATION 1) HOME PAGE
  • 9. 3) SEQUENCE REGISTRATION 4) ADMIN LOGIN PAGE
  • 10. 5) VIEW FILE PAGE 6) REGISTRATION PAGE
  • 11. Conclusion The three-level authentication system had been applied to the above system which makes it highly secure along with more user-friendly. This system will help with Man-in-the-middle attacks and Brute-force attacks on the user’s side. A three-level security system is a time-consuming approach since the user needs to enter details carefully for all three security levels and at last, the user can add any image for its final level Authentications. Therefore, this system is not suitable for the general purpose of security since it takes time to fill in all three security level details. But it will be helpful in high-security levels where the security of data is a primary concern and time complexity is secondary. In the future, we can add more features like OTP (One Time Password) Authentication and Captcha Authentication where if the user uses VPN (Virtual Private Network) to browse then multiple Captcha can stop the user to use the software. The main objective of this project is to improve the security level of the systems for many survey papers where researched. It is found that a three-level authentication system helps to provide more security compared to one-level and two-level authentication systems. Three levels are more important because the user needs to enter critical details and log in with three different levels of authentication.