SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3904
Password Management kit for Secure Authentication
Natanmai Deepak Sundararajan1, Manikandan M.K1 , Karthickkumar J. 1, Dr.Askarunisa A 2,
Saraswathi Meena R2
1,2 Department of Computer Science and Engineering, K.L.N College of Information Technology
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract—Password getting harvested by hackers have
become very common today. The highly securepasswordinthe
world is useless if intruder steals it, but it becomes much
useless if it is not the same password you use for every log-in.
The time has come to throw away the passwords and get
authenticated into the application via passwordlessapi,where
you don’t need to store multiple login credentials for each
account instead an unique identification tokens will be
generated during the time of authentication - while also
controlling costs and maintaining the user experience.
Keywords—Authentication, Password Mobile Device, Human
Computer Interaction, Security, Usability, Deployability.
1. Introduction
Millions of people use Internet on everyday basis for various
purposes which includes email, news, music downloads,
browsing information about anything. Peoples frequently
access internet in their daily lives. Nowadays, it is destined
for users to have a multiple accounts for Email accounts,
websites, social networks, and many other services, all of
which employs authenticationmethodaspasswordsandthus
having different passwords and security policies for each
account. Remembering all the passwords is difficult and
troublesome, so people end up in using simple passwords
and hence compromising security. when we perform online
transactions these practices are bound to help hackers,
especially using computing devices. Hence, what we really
require is a new and an innovative way to access internet
services that does not involve remembering passwordswith
dozens of alphanumeric combinations, as well as does not
add complexity for users. The security in password-based
authentication is determined by the task of successfully
guessing password. Unfortunately, passwords are easier to
guess. To enhance the security of password-based
authentication, a favorable solution is to make use of
technology called multi-factorauthentication,whereinauser
is required to provide more than one authentication factor.
The other piece of authentication information is either
generated by a physical token, for example, RSASecure ID or
with Google Authenticator application. Although the two-
factor authentication is able to enhancethesecurity,different
service providers may require setting up their own two-
factor authentication services. In addition, users have to
undergo painful registration and login procedures.
2. Authentication
Generally User authentication occurs in most human
computerinteractions. In most cases, a userhastoenteranid
and provide the corresponding password to startthe useofa
system. Authentication authorizes human-to-machine
interactions among applications and also allows both wired
and wirelessnetworksto enable accesstonetwork.Inprivate
and public networks, authentication is frequently done
through the use of login id and passwords. Knowledge about
login credentials is supposed to guarantee that the user is
genuine. Each user registers to the system, with the help of
assigned or self-declared password. Upon each use, the user
must know and use the previously declared password.
Nevertheless, password based authentication is not
considered to givemore security for anysystemthatcontains
sensitive data. The domination of password based
authentication is been there from the early days of
authentication and still the only method being used widely.
Certaincharacteristicslikeease ofusing, shouldbefasterand
at the same time secure as well should have in an
authenticationmethod. Differentproviderusecertainrulesin
defining passwords like password should have certain
number ofupper case, lowercase, number, special character.
Example -google mail, which makes authentication process
troublesome and more difficult for users to remember. The
proposalhave been made toreplace textbasedmethod,some
of the scope of proposal include management software,
federated login protocol, graphical password scheme, one
time password, hardware tokens, phone aided schemes and
biometricmethods. When certain methodprovidesignificant
security then the problem is that it will be more costly to
implement as well more difficult to use usability, deploy
ability, security hence serves major factors in any method.
User benefits must be considered the method that must be
memory wise easy to remember, simple for user so that can
implement in large scale without any complexityto user,and
which must avoid carrying object for the purpose but at the
same timenothingtocarry likemobile devicesthat everyone
carries always can be used, physically effortless and easy to
use, learn and also easy to recover from loss of token and
credential like use backup methods. Deployment benefits
must be in consideration that are accessible in the sensewho
uses password based method must be allowed to use the
method with same ease, minimum cost per user including
both provider side and client side cost, server compatible so
that no need to change existing setup to support current case
,browser compatible which ensure no need to change the
client side settings and can work on web browser and no
extra additional software is required, also mature enough so
that any user can implement or use the scheme for any
purpose. Security benefits that should be considered are as
follows: The attacker cannot be able to impersonate a user
after observing them multiple times to their account,
Resilient to Targeted Impersonation: It’snotonlypossiblefor
skilled investigator to impersonate a user by exploiting
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3905
knowledge of personal details like date of birth, relatives
name etc, Resilient-to-ThrottledGuessing:Anattackerwhose
rate of guessing is constrained by the server and attacker
cannot successfully guess the secrets, Resilient to Internal
Observation: The hacker can’t impersonate a user by
intercepting the input from the user’s device, Resilient to
Leaksfrom Other Verifiers: A verifier could not possibly leak
anythingwhich canhelp an hacker to impersonatetheuserto
the verifier, Resilient to Phishing: An attacker who simulates
an genuine verifier cannot collect details that can be used
later to impersonate the user to the valid server, Resilient to
Theft: If the scheme usesa object for authentication, thenthe
object cannot be utilized for authentication by another
person who gains possession ofthat object,NoTrustedThird
Party: The scheme doesnotrelyon a trusted third party who
offersauthenticationmechanism,RequiringExplicitConsent:
The authentication process cannot start without the explicit
consent of the user. If users can be educated then common
concept is thatto select “correct”password which iscomplex
task, offline brute-force attack to recover information will
surpass the computational ability of machines. In real time,
the entropy is a perfectly random 6 character password.
However, the most common password length, is less than
that of a DES key. Since DES was effectively broken by brute-
force attacks due to error available in algorithm, this
assumption is questionable. Nowadays,avarietyofpassword
policies request 18 character passwords. In such case, the
entropyis comparable to AES. Also, a prevalenceofpassword
policies is given for guiding the users to choose passwords
that are efficient. The main interpretation is that the
community is demarcating the future viability of password
increases in length and policies to ensure effective use of the
password length, but users are capable of remembering
approximately 7 random things.Alsoanincreaseinpassword
length does not mean a commensurate increase in entropy.
The basic limit amount of protection of current passwords
can provide is no longer sufficient toprotectpassword-based
authentication systems exploitable to offline brute force
attacks by the rapidly growing computing resources
available. As all passwords are recoverable, the security of
any system based on passwords will depend on the
availabilityofhacking items, nothow random passwordsare
generated. As such, protocols must be designed to not allow
any type of offline attack, and the material that can beusedto
mount such an attack must be secured with the
understanding that its confidential and is equivalent to the
security of the authentication.
3. Existing system
The most ubiquitous method is the password based and has
number of issues, which includes susceptibility to
unintentional exposure through phishing and cross-site
passwordreuse. There are many existing systemsotherthan
password based authentication being inuse likeOAuth2.0is
the up gradation of OAuth protocol. It focuses on client
developer simplicity along with providing specific
authorization flows for applications. Double factor
authentication schemes have the potential to increase
security mechanism but facesusability and otherchallenges.
Mobile Authentication is a system intended to provide
security assurances in comparison to or greater than that of
conventional double factor authentication systems, in
addition to offering the same authentication experience as
traditional passwords. First, a user’spersonaldevice(phone)
can communicate directly with the user’s computer with no
interaction with the user. Second, it is possible to provide a
layered approach to security, by which a web server can
impose different policies depending on whether or not the
user’s personal device is present. Kerberos is a distributed
authentication service that enables a process (a client)
running on behalf of a principal (a user) to prove its identity
to a verifier (an application server, or just server) without
sending data across the network.
4. Proposed system
During authentication, when the user logs in using their
credentials, a Unique Token will be created and returned
back and must be saved locally, Creating a session in the
server and returning a cookie. There are security
considerations that must be taken into account with regards
to the way tokens are stored. Where to Store Tokens are
enumerated. Whenever the user wants to access a protected
route or resource, the user agent should send the Token, in
the Authorization header using the Bearer schema. The
content should look like the following:
Authorization: Bearer <token>
It is a statelessauthentication mechanism asthe userstateis
never saved in memory. The server’s protected routes will
check for a valid Token in the Authorization header, and if
it’s present, the user will be allowed to access resources. As
Token will be self-contained, reducing the need to query the
database multiple times. This allowsyou to fully relyondata
APIs that are stateless and even make requests to
downstream services. It doesn’t matter which domains are
serving your APIs, so Cross-Origin Resource Sharing (CORS)
won’t be an issue as it doesn’t use cookies. The following
diagram shows this process:
The following example Header declares that the encoded
object is a Plaintext Token:
{“alg”:”hmac”}
Base64url encoding the octets of the UTF-8 representation:
eykhbGciRiJoB25lIm0
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3906
The following is an example of a Claims Set:
{
“iss”:”;karthick”,
“exp”:1344519380,
”http://example.com/there”:true
}
The octets of the UTF-8 representation are of Base64url
encoding of the ClaimsSet yieldsthis EncodedPayload(with
line breaks for display purposes only):
eyJpc3MiOiJdwekBJJHBdbbfKICJleHAiOjEzMDA4MTkzODAs
DQogImh0dHA6Ly9leGFt
cGxlLmNvbS9pc19yb290Ijp0cnVlfQ
The Encoded Signature is the empty string.
Concatenating these parts in this order with period (‘.’)
characters between the parts yields this
Complete Tokens (with line breaks for display purposes
only):
eyJhbGciOiJub25lIn0.
eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogI
mh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVUiLA0KI
CJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFt
5. Related work
Yahoo has double step verification make use of two methods
which are combined to give more security in authentication
process basically it makes use of primary method has id and
password and secondary method bymeans ofverificationvia
SMS by sending a one-timepasswordgeneratedtothemobile
device via SMS and user entering that as secondary
verification. Currently two-factor authentication protocols
require a shared secret between the user andtheservice.The
disadvantage of these protocols is that the shared secret can
be exploited if the server is compromised. We choose a
design that is resilient to a exploited the server side data’s
confidentiality at the same time Twitter doesn’t persistently
store secrets, and the private key material needed for
approving login requests never leaves your phone. Other
attacks against two factor authentication have taken
advantage of compromised SMS delivery channels. This
solution overcomes that because the key necessary to
approve requests neverleavesyour phone. Also,theupdated
login verification features additional information about the
request to help user todetermine if thelogin request you see
is the one you’re making. How Twitters two factor
authentication works is When try to login to your Twitter
account from another device, an alert will be sent to your
phone asking you to authorize thelogin.OnAndroid,thealert
in the notifications area is tapped toopentheTwitterappand
go directly to the login requests page. After that, a request to
authorize the login is given with a single tap there are no
codes to enter.
6. Conclusion
In this above paper we studied about different
authentication process and current methods used and what
are the works related to a password-less authentication
mechanism and gather different methodstoprovideabetter,
easy, faster and secure mechanism for authentication andto
replace traditional authentication systems based on
passwords. If any attacker tries to hack the server, the
private keys of users will be still safe and thus attackers
cannot impersonate the users or steal the credentials. Thus
these unique features make an attractive security solution
for password-less web authentication.
References:
[1] RSA Secure ID Hardware Authenticators, RSA Inc.,
available at http://www.emc.com/security/rsa-securid/rsa-
securid-hardwareauthenticators.html
[2] Google Authenticator Project – Two-Step Verification,
Google Inc., available at http://code.google.com/p/google-
authenticator/.
[3] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano.
The Quest to Replace Passwords: A Framework for
Comparative Evaluation of Web Authentication Schemes.
IEEE Symposium on Security and Privacy - S&P 2012, pp.
553-567, IEEE Computer Society, 2012.
[4] L. S. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor,
P.McDaniel, and T. Jaeger. Password exhaustion: Predicting
the end of password usefulness. Information Systems
Security, pp.37- 55, Springer Berlin Heidelberg, 2006.

More Related Content

What's hot

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
Sounil Yu
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
Clare Nelson, CISSP, CIPP-E
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
IRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Syed Ubaid Ali Jafri
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
Aditya Gupta
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
IJwest
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
IJERA Editor
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET Journal
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
S.E. CTS CERT-GOV-MD
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
 
Sms based otp
Sms based otpSms based otp
Sms based otp
Hai Nguyen
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Shakas Technologies
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
 

What's hot (20)

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 

Similar to IRJET- Password Management Kit for Secure Authentication

Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
PortalGuard
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
eSAT Publishing House
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
eSAT Journals
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
ijtsrd
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET Journal
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
 

Similar to IRJET- Password Management Kit for Secure Authentication (20)

Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 

Recently uploaded (20)

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 

IRJET- Password Management Kit for Secure Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3904 Password Management kit for Secure Authentication Natanmai Deepak Sundararajan1, Manikandan M.K1 , Karthickkumar J. 1, Dr.Askarunisa A 2, Saraswathi Meena R2 1,2 Department of Computer Science and Engineering, K.L.N College of Information Technology ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract—Password getting harvested by hackers have become very common today. The highly securepasswordinthe world is useless if intruder steals it, but it becomes much useless if it is not the same password you use for every log-in. The time has come to throw away the passwords and get authenticated into the application via passwordlessapi,where you don’t need to store multiple login credentials for each account instead an unique identification tokens will be generated during the time of authentication - while also controlling costs and maintaining the user experience. Keywords—Authentication, Password Mobile Device, Human Computer Interaction, Security, Usability, Deployability. 1. Introduction Millions of people use Internet on everyday basis for various purposes which includes email, news, music downloads, browsing information about anything. Peoples frequently access internet in their daily lives. Nowadays, it is destined for users to have a multiple accounts for Email accounts, websites, social networks, and many other services, all of which employs authenticationmethodaspasswordsandthus having different passwords and security policies for each account. Remembering all the passwords is difficult and troublesome, so people end up in using simple passwords and hence compromising security. when we perform online transactions these practices are bound to help hackers, especially using computing devices. Hence, what we really require is a new and an innovative way to access internet services that does not involve remembering passwordswith dozens of alphanumeric combinations, as well as does not add complexity for users. The security in password-based authentication is determined by the task of successfully guessing password. Unfortunately, passwords are easier to guess. To enhance the security of password-based authentication, a favorable solution is to make use of technology called multi-factorauthentication,whereinauser is required to provide more than one authentication factor. The other piece of authentication information is either generated by a physical token, for example, RSASecure ID or with Google Authenticator application. Although the two- factor authentication is able to enhancethesecurity,different service providers may require setting up their own two- factor authentication services. In addition, users have to undergo painful registration and login procedures. 2. Authentication Generally User authentication occurs in most human computerinteractions. In most cases, a userhastoenteranid and provide the corresponding password to startthe useofa system. Authentication authorizes human-to-machine interactions among applications and also allows both wired and wirelessnetworksto enable accesstonetwork.Inprivate and public networks, authentication is frequently done through the use of login id and passwords. Knowledge about login credentials is supposed to guarantee that the user is genuine. Each user registers to the system, with the help of assigned or self-declared password. Upon each use, the user must know and use the previously declared password. Nevertheless, password based authentication is not considered to givemore security for anysystemthatcontains sensitive data. The domination of password based authentication is been there from the early days of authentication and still the only method being used widely. Certaincharacteristicslikeease ofusing, shouldbefasterand at the same time secure as well should have in an authenticationmethod. Differentproviderusecertainrulesin defining passwords like password should have certain number ofupper case, lowercase, number, special character. Example -google mail, which makes authentication process troublesome and more difficult for users to remember. The proposalhave been made toreplace textbasedmethod,some of the scope of proposal include management software, federated login protocol, graphical password scheme, one time password, hardware tokens, phone aided schemes and biometricmethods. When certain methodprovidesignificant security then the problem is that it will be more costly to implement as well more difficult to use usability, deploy ability, security hence serves major factors in any method. User benefits must be considered the method that must be memory wise easy to remember, simple for user so that can implement in large scale without any complexityto user,and which must avoid carrying object for the purpose but at the same timenothingtocarry likemobile devicesthat everyone carries always can be used, physically effortless and easy to use, learn and also easy to recover from loss of token and credential like use backup methods. Deployment benefits must be in consideration that are accessible in the sensewho uses password based method must be allowed to use the method with same ease, minimum cost per user including both provider side and client side cost, server compatible so that no need to change existing setup to support current case ,browser compatible which ensure no need to change the client side settings and can work on web browser and no extra additional software is required, also mature enough so that any user can implement or use the scheme for any purpose. Security benefits that should be considered are as follows: The attacker cannot be able to impersonate a user after observing them multiple times to their account, Resilient to Targeted Impersonation: It’snotonlypossiblefor skilled investigator to impersonate a user by exploiting
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3905 knowledge of personal details like date of birth, relatives name etc, Resilient-to-ThrottledGuessing:Anattackerwhose rate of guessing is constrained by the server and attacker cannot successfully guess the secrets, Resilient to Internal Observation: The hacker can’t impersonate a user by intercepting the input from the user’s device, Resilient to Leaksfrom Other Verifiers: A verifier could not possibly leak anythingwhich canhelp an hacker to impersonatetheuserto the verifier, Resilient to Phishing: An attacker who simulates an genuine verifier cannot collect details that can be used later to impersonate the user to the valid server, Resilient to Theft: If the scheme usesa object for authentication, thenthe object cannot be utilized for authentication by another person who gains possession ofthat object,NoTrustedThird Party: The scheme doesnotrelyon a trusted third party who offersauthenticationmechanism,RequiringExplicitConsent: The authentication process cannot start without the explicit consent of the user. If users can be educated then common concept is thatto select “correct”password which iscomplex task, offline brute-force attack to recover information will surpass the computational ability of machines. In real time, the entropy is a perfectly random 6 character password. However, the most common password length, is less than that of a DES key. Since DES was effectively broken by brute- force attacks due to error available in algorithm, this assumption is questionable. Nowadays,avarietyofpassword policies request 18 character passwords. In such case, the entropyis comparable to AES. Also, a prevalenceofpassword policies is given for guiding the users to choose passwords that are efficient. The main interpretation is that the community is demarcating the future viability of password increases in length and policies to ensure effective use of the password length, but users are capable of remembering approximately 7 random things.Alsoanincreaseinpassword length does not mean a commensurate increase in entropy. The basic limit amount of protection of current passwords can provide is no longer sufficient toprotectpassword-based authentication systems exploitable to offline brute force attacks by the rapidly growing computing resources available. As all passwords are recoverable, the security of any system based on passwords will depend on the availabilityofhacking items, nothow random passwordsare generated. As such, protocols must be designed to not allow any type of offline attack, and the material that can beusedto mount such an attack must be secured with the understanding that its confidential and is equivalent to the security of the authentication. 3. Existing system The most ubiquitous method is the password based and has number of issues, which includes susceptibility to unintentional exposure through phishing and cross-site passwordreuse. There are many existing systemsotherthan password based authentication being inuse likeOAuth2.0is the up gradation of OAuth protocol. It focuses on client developer simplicity along with providing specific authorization flows for applications. Double factor authentication schemes have the potential to increase security mechanism but facesusability and otherchallenges. Mobile Authentication is a system intended to provide security assurances in comparison to or greater than that of conventional double factor authentication systems, in addition to offering the same authentication experience as traditional passwords. First, a user’spersonaldevice(phone) can communicate directly with the user’s computer with no interaction with the user. Second, it is possible to provide a layered approach to security, by which a web server can impose different policies depending on whether or not the user’s personal device is present. Kerberos is a distributed authentication service that enables a process (a client) running on behalf of a principal (a user) to prove its identity to a verifier (an application server, or just server) without sending data across the network. 4. Proposed system During authentication, when the user logs in using their credentials, a Unique Token will be created and returned back and must be saved locally, Creating a session in the server and returning a cookie. There are security considerations that must be taken into account with regards to the way tokens are stored. Where to Store Tokens are enumerated. Whenever the user wants to access a protected route or resource, the user agent should send the Token, in the Authorization header using the Bearer schema. The content should look like the following: Authorization: Bearer <token> It is a statelessauthentication mechanism asthe userstateis never saved in memory. The server’s protected routes will check for a valid Token in the Authorization header, and if it’s present, the user will be allowed to access resources. As Token will be self-contained, reducing the need to query the database multiple times. This allowsyou to fully relyondata APIs that are stateless and even make requests to downstream services. It doesn’t matter which domains are serving your APIs, so Cross-Origin Resource Sharing (CORS) won’t be an issue as it doesn’t use cookies. The following diagram shows this process: The following example Header declares that the encoded object is a Plaintext Token: {“alg”:”hmac”} Base64url encoding the octets of the UTF-8 representation: eykhbGciRiJoB25lIm0
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3906 The following is an example of a Claims Set: { “iss”:”;karthick”, “exp”:1344519380, ”http://example.com/there”:true } The octets of the UTF-8 representation are of Base64url encoding of the ClaimsSet yieldsthis EncodedPayload(with line breaks for display purposes only): eyJpc3MiOiJdwekBJJHBdbbfKICJleHAiOjEzMDA4MTkzODAs DQogImh0dHA6Ly9leGFt cGxlLmNvbS9pc19yb290Ijp0cnVlfQ The Encoded Signature is the empty string. Concatenating these parts in this order with period (‘.’) characters between the parts yields this Complete Tokens (with line breaks for display purposes only): eyJhbGciOiJub25lIn0. eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogI mh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVUiLA0KI CJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFt 5. Related work Yahoo has double step verification make use of two methods which are combined to give more security in authentication process basically it makes use of primary method has id and password and secondary method bymeans ofverificationvia SMS by sending a one-timepasswordgeneratedtothemobile device via SMS and user entering that as secondary verification. Currently two-factor authentication protocols require a shared secret between the user andtheservice.The disadvantage of these protocols is that the shared secret can be exploited if the server is compromised. We choose a design that is resilient to a exploited the server side data’s confidentiality at the same time Twitter doesn’t persistently store secrets, and the private key material needed for approving login requests never leaves your phone. Other attacks against two factor authentication have taken advantage of compromised SMS delivery channels. This solution overcomes that because the key necessary to approve requests neverleavesyour phone. Also,theupdated login verification features additional information about the request to help user todetermine if thelogin request you see is the one you’re making. How Twitters two factor authentication works is When try to login to your Twitter account from another device, an alert will be sent to your phone asking you to authorize thelogin.OnAndroid,thealert in the notifications area is tapped toopentheTwitterappand go directly to the login requests page. After that, a request to authorize the login is given with a single tap there are no codes to enter. 6. Conclusion In this above paper we studied about different authentication process and current methods used and what are the works related to a password-less authentication mechanism and gather different methodstoprovideabetter, easy, faster and secure mechanism for authentication andto replace traditional authentication systems based on passwords. If any attacker tries to hack the server, the private keys of users will be still safe and thus attackers cannot impersonate the users or steal the credentials. Thus these unique features make an attractive security solution for password-less web authentication. References: [1] RSA Secure ID Hardware Authenticators, RSA Inc., available at http://www.emc.com/security/rsa-securid/rsa- securid-hardwareauthenticators.html [2] Google Authenticator Project – Two-Step Verification, Google Inc., available at http://code.google.com/p/google- authenticator/. [3] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE Symposium on Security and Privacy - S&P 2012, pp. 553-567, IEEE Computer Society, 2012. [4] L. S. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P.McDaniel, and T. Jaeger. Password exhaustion: Predicting the end of password usefulness. Information Systems Security, pp.37- 55, Springer Berlin Heidelberg, 2006.