SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                                  International Journal of Advanced Research in Computer Engineering & Technology
                                                                                      Volume 1, Issue 4, June 2012



                     Security Built On Dynamic Reusable Passwords
                                On Online Purchase
Rajeswari.P                                                                            C.Rajendra

M.tech(CS)                                                                         Head Of Tha Department

Raji.0534@gmail.com

Audishankara College of Engineering                                        Audishankara College of Engineering

 and Technology.                                                                   and Technology.

                              .

Abstract:Internet      is providing different types of
applications to the user. Based on the user requirement
internet is growing longer in the day-to-day life for the E-
                                                                  Introduction:
transaction process internet is the main source for all                    Now a days most of the people using the
applications when increasing of the E-transaction usage           internet because internet providing the more
in the internet as well as fraud is also increasing, for the      services to the customer for e.g., Net Banking, E-
E-transaction mostly we are using smart cards only. To            Transaction, Online           applications     etc..,
                                                                  Authentication is more required for internet
protect our bank details and to avoid unauthorized
                                                                  providing services because there is no
person usage we can use TWO FACTOR AUTHENTICATION
                                                                  authentication at that time unauthorized persons is
mechanism. one is USER KNOWS and another one is THEY              also easy to access the authorized persons profile
HAVE TO KNOW almost all banking systems are satisfied             for this one authentication is required for internet
with   this system because based on the initial                   providing services The internet providing the
password(SEED) we can get number of multiple one time
                                                                  username,password options these are unique
                                                                  one.Based on these username and password easy to
passwords(OTP) to the mobile phone. through the
                                                                  login and transaction       that particular website
process of OTP generation mobile phone is working as a
                                                                  through our smart cards. In this process we are
software token the different number of multiple OTPs              facing one problem that is..,
are coming through by the SMS to the mobile phone.IN
                                                                  PREOBLM:
the paper we can mainly focus on decrease the usage of
fraud in the internet by using the otp through TWO                An unauthorized person that to who knows our
FACTOR AUTHENTICATION mechanism                                   details like username and password also they are
                                                                  having our smart card at that time they can easily
                                                                  login to that website and easy to purchase through
Key Words: Public key Encryption ,Hashing Technique,
                                                                  that our smart card to over come this problem ,In
OTP Configuration, One Way Functions ,Psuedo random
                                                                  the proposed one,we are describing the TWO
output.                                                           FACTOR AUTHENTICATION mechanism.[1



                                                                                                                  325
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                           International Journal of Advanced Research in Computer Engineering & Technology
                                                                               Volume 1, Issue 4, June 2012


                                                             SOLUTION:



         Two factor authentication gives a                   session or transaction.Otp is emphasizes that each
protection for E_Transaction process by the name             time the user tries to log on, the algorithm produces
itself   it   describes    that   TWO     FACTOR             pseudorandom output generator thus improving the
AUTHENTICATION that is,for authentication it                 security.
provides two factors,one is,already the USER
KNOWS,another one is,They HAVE TO KNOW.                      PUBLIC KEY ENCRYPTION:

                                                                     Needham and Schroeder[5]described a
                                                             means for authenticating signatures using public key
The first password is getting from the banking               encryption First A’s is a secret key and B’s is a public
system.where we get the second one,that is also              key
provided by the banking system only.how to get the
second one is,number of second multiple passwords            Notation: AB:{{PASSWORD}ASK}BPK.
are coming from the initial sedd [2]to the mobile
phone through the sms.the use of the sms systems
the user knows password is a static password.                         The sending message is USER A to USER
                                                             B,which has been doubly encrypted.The receiver B is
                                                             read the message by applying the A’s secret key then
WHY WE NEED MOBILE PHONE:                                    decrypting the encrypted text.In a world of
                                                             permanent and uncompromised keys this technique
                                                             provides a fool proof authentication mechanism.[7]

         An authentication scheme using the mobile
phone as an aurhentication token because in this
one, GSM method is used already the people had               HASHING:
learned that how to use the GMS method in the
mobile phone and also In the proposed solution               The OTP generation is more secure. A secret key is
does not require any extra hardware device installed         used together with the challenge.The secret key is
in the mobile phone at the user side.Parallely, the          shared between the server and the client. The
mobile phone is working as a hardware token                  simple password exponential key exchange protocol
device,to the E-transaction process.[3]                      is used for exchange the key.To exchange the keys
                                                             we are using the simple password exponential key
                                                             exchange protocol this is more securable.[5] this is
                                                             also used for an hacker that means who is able to
LITERATURE SURVEY:                                           read and modify all the messages between the client
                                                             and server that person cannot learn the shared key
          The idea of an OTP was first suggested by
                                                             and cannot make more than one guess for the
leslie lamport*4+ in the early 1980’s. otp means that
                                                             password in each interaction with a party that knows
one time password this is valid for a single login
                                                             it.[6]




                                                                                                                326
                                        All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                Volume 1, Issue 4, June 2012



                                                               The SPEKE required only two messages like




The keyexchange is generating a large and
randomlyselected prime p anditcomputes

         g = hash(s)2 mod p
                                                               OTP generation:
In this one ‘s’ is for ,displaying the short OTP in the
browser after registration Then the server computes,           The OTP is generated from a hash of a
                                                               concatenation of the challenge and the secret key
                  Ks = g a modp
                                                               OTP=hash(challenge||secretkey)
In the above equation ‘a’ stands for to generate
random number It sends servlet to MIDLET is p and
ks through the sms after receiving the sms from the
servlet server,the MIDLETgeneratesthe




                  Kc = gb modp



              g = hash(s)2 mod p

MIDLET generates the random number it sends to
servlet server kc to the AS and computes The secret
key is,

                  K = (Ks)b mod p.
                                                                         Fig:proceducre for OTP process
After receiving the secret key kc MIDLET computes
the                                                            IMPLIMENTATION:
                  K = (Kc)a mod p                                       For security purpose the proposed system is
                                                               consists are of three parts

                                                               (1)In the client’s mobile phone software is installed,
                                                               (2)Server software,
                                                               (3)The GSM modem is connected to the sever.


                                                                                                                  327
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                Volume 1, Issue 4, June 2012

Majorly,the system will have two modes of




operations like connection-less Authentication
system and SmS-Based System.



OUR APPROCH:

          Three recognized Authentication factors are
existing today:

        (i)What you know(e.g.,Password)

        (ii)What you have(e.g.,Token)

        (iii)Whatyouare(e.g.,biometrics)

         In this one,we are extended the Lamport’s            .       Fig: Mobile Registration
idea along with some modifications because to
produce forwardness and infiniteness. Why we
produce these two because to avoiding the use of
public key encryption.In this one,we integreate the           LOGIN REQUEST:
lamort’s idea using two different one way hash
                                                                        When the user enters into the website
functions,h1(.)--this is seed updating and h2(.)--this
                                                              through the username and the password.After
is for OTP generation
                                                              entering the knows password the server compares
        OTP(A,B)=h2^B(h1^A(initial password))                 this password and generates the one time password
                                                              that will be sent to the user’smobile device .The user
                                                              then     enters     the    OTPauthentication     code
                                                              fromthemobile devices and a 4 to 8 digit pin onto
MOBILE REGISTRATION:                                          the webpage that I waiting for user input to comlete
                                                              the transaction.[8]
         User wants Two different hash functions
h1(.) and h2(.) and initial seed ‘sint’ these three
factors are installed ontheir mobile phones the
service provider is shared this information.Theseed           OTP ALGORITHM:
is shared the unique parameters of the host and the
                                                                        To protecting the our smart cards, we are
uer,because it notifies that whatis the international
                                                              requested the server to generating the OTP.how its
mobile equipment identity and who is the
                                                              generates it should be hard for hacking and hard to
international mobile subscriber identity and
                                                              guess and retrieve for unauthorized persons. To
mention the registration date of the mobile phone
                                                              satisfy these factors the server generates the OTP.[9]
also username and pin.



                                                                                                               328
                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                Volume 1, Issue 4, June 2012

                                                               mobile phone and it will be stored in the server’s
                                                               database for each client.
IMEI NUMBER:

         IMEI stands for International Mobile
Equipment Identity    this is unique for every                 IMSI NUMBER:
individual customer. This is accessible for each


                                                               IMSI stands for International Mobile Subscriber
                                                               Identity this is single unique number associated With
                                                               all GSM and universal mobiletelecommunications
                                                               system       network       mobile    phone      users.


USERNAME:                                                                            Format         of       the
                                                                                     OTP(e.g..,name,number,nume
         The username is not needed because in the                                   ric,alpha)
IMEI NUMBER it gives all the details of the cutosmer
but why we are specifying that is the username is                                    CONCLUSION:
integrated with the pin this Is used for to protect the
details of the customer from unauthorized persons                        Now-a-days single factor authentication
when the authorized mobile is lost.                            e.g..,password are easy to guess and easy to hacking
                                                               for hackers because password are likenames,age are
PIN:                                                           easily discovered by automated password collecting
                                                               programs for this one, recently introduced the TWO
         The data of the username and password are
                                                               FACTOR AUTHENTICATION based on OTP. This is for
together so,there is no problem once the mobile
                                                               to meet the demand of organizations for providing
phone is lost because the OTP cannot be generated
                                                               stronger authentication options to its user.In The
correctly without knowing the user’s the PIN.
                                                               TWO FACTOR AUTHENTICATION for each and every
                                                               account of the customer they want hardware token.
MINUTE:
                                                               are carry their mobiles at all the times so,in the
       The OTP for each every minute it must                   mobile phone we can install all wanted tokens like
be unique this is valid for only one minute time.              software and hardware. This is helpful for both
                                                               client and organization.
FUNCTIONALITIES:

        CONFIGURATION OF OTP: Configure the
                                                                        This paper mainly focuses on discovering of
         OTP characteristics through the policy
                                                               TWO FACTOR AUTHENTICATION method using
         editor and attributes of this are,
                                                               mobile phones. This is somewhat easy solution
                      Length of the OTP
                                                               because there is no need to take extra hardware to
                      Restricted time
                                                               the mobile phones. In this one, does not require any
                      Outgoing message template
                                                               extra burden on the customer and organization
                      Delivery channel
                                                               also.This solution is mainly used for internet
                      Number of tries are restricted


                                                                                                                329
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                Volume 1, Issue 4, June 2012

providing services like E-Transactions,         online         [2]     S.HAllsteinsen, I.Jorsta, D-v.,Thanh,”Using The
applications, net banking ,Infranet etc..,                     mobilebphone as a security token for unified
                                                               authentication”, Sysyems and Networks Communication
The customers are more attracted for this TWO                  In:internationalconference on Systems and Networks
FACTOR AUTHENTICATION solution because this is                 Communications,2007,p.68-74
more securable. The OTP algorithm provides some
factorsbecause to secure the user profile
                                                               [3] S.M.Siddique,M.Amir,”GMSecurity Issues             and
                                                               ChallengesSoftwareEngineering”,Artificialintelligence,Net
                                                               working and Parallel/Ditributed Computing,2006. SNPD
In the proosed system we are implementing TWO
                                                               2006. 7th ACIS International Conference on digital Object
options these two are using a free and fast access
                                                               Identifier,pp.413-418.
i.e..,Connection-Less Authentication system and
SMS-BASED Authentication System in this one,
Connection-Less Authentication system are more
                                                               *4+ L.Lamport, “password Authentication With Insecure
expensive based on SMS-Based Authentication
                                                               Communication”,
system because           in the Connection-Less
                                                               In:comm.:ACM,vol.24,no.11,1981,pp.770-772.
Authentication system there is no connection
between client and the server.The server generates             [5] Jablon, D., Strong Password-only Authnticated Key
the OTP and it sends to the user’s mobile phone, but           Exchange.Computer Communication Review, ACM
SMS-Based Authentication System is somewhat less               SIGCOMM, 1996.vol.26 (no.5).
cost solution.

        In the future developments             includes
                                                               [6] Recorla,e., RFC 2631 Diffie-Hellman Key Agreement
another factor other than the factors i.e.., Somebody          method.1999.
You know, that is based on the notation vouching.


                                                               [7] Authntication ofignatures using public keybencryption
                                                               Kellogg S.Booth university of water 100,Canada.


REFERENCES:
                                                               [8]  AcceessMatrix TM UAS Future Proof Universal
                                                               Authntication Server.

[1] Mohamed Hamdy Eldefrawy, Khaled Alghathbar,
Muhammad Khurram khan “OTP-Based Two-Factor
Authentication Using Mobile Phones” In international           [9] Fadi Aloul,SyedZahidi Wassim El-Hajj “Two-Factor
conference on information technology”2011.                     Authentication      Using      Mobile       phones”.




                                                                                                                    330
                                          All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Techsylvania
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingSnehith
 
Computationally Efficient ID-Based Blind Signature Scheme in E-Voting
Computationally Efficient ID-Based Blind Signature Scheme in E-VotingComputationally Efficient ID-Based Blind Signature Scheme in E-Voting
Computationally Efficient ID-Based Blind Signature Scheme in E-Votingijsrd.com
 
Sansoft project titles 2021 2022
Sansoft project titles 2021 2022Sansoft project titles 2021 2022
Sansoft project titles 2021 2022jadhavpravin920
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...eSAT Journals
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Self-employed
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacementTELKOMNIKA JOURNAL
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)IAESIJEECS
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingIRJET Journal
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
OpenID Connect via WebIntents
OpenID Connect via WebIntentsOpenID Connect via WebIntents
OpenID Connect via WebIntentsNov Matake
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 
Transecq ITA
Transecq ITATransecq ITA
Transecq ITAtransecq
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 

Tendances (20)

Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
 
Computationally Efficient ID-Based Blind Signature Scheme in E-Voting
Computationally Efficient ID-Based Blind Signature Scheme in E-VotingComputationally Efficient ID-Based Blind Signature Scheme in E-Voting
Computationally Efficient ID-Based Blind Signature Scheme in E-Voting
 
It act
It actIt act
It act
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
Sansoft project titles 2021 2022
Sansoft project titles 2021 2022Sansoft project titles 2021 2022
Sansoft project titles 2021 2022
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
OpenID Connect via WebIntents
OpenID Connect via WebIntentsOpenID Connect via WebIntents
OpenID Connect via WebIntents
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Transecq ITA
Transecq ITATransecq ITA
Transecq ITA
 
Digital signature
Digital signatureDigital signature
Digital signature
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 

En vedette (8)

Integrating Help, Support, and Training Content
Integrating Help, Support, and Training ContentIntegrating Help, Support, and Training Content
Integrating Help, Support, and Training Content
 
159 163
159 163159 163
159 163
 
293 299
293 299293 299
293 299
 
552 556
552 556552 556
552 556
 
285 290
285 290285 290
285 290
 
280 284
280 284280 284
280 284
 
Aus Post Archiving
Aus Post ArchivingAus Post Archiving
Aus Post Archiving
 
Have Faith
Have FaithHave Faith
Have Faith
 

Similaire à 325 330

A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System AuthenticationIJERA Editor
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptxArpithaShoby
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 

Similaire à 325 330 (20)

A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
E0962833
E0962833E0962833
E0962833
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptx
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

325 330

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Security Built On Dynamic Reusable Passwords On Online Purchase Rajeswari.P C.Rajendra M.tech(CS) Head Of Tha Department Raji.0534@gmail.com Audishankara College of Engineering Audishankara College of Engineering and Technology. and Technology. . Abstract:Internet is providing different types of applications to the user. Based on the user requirement internet is growing longer in the day-to-day life for the E- Introduction: transaction process internet is the main source for all Now a days most of the people using the applications when increasing of the E-transaction usage internet because internet providing the more in the internet as well as fraud is also increasing, for the services to the customer for e.g., Net Banking, E- E-transaction mostly we are using smart cards only. To Transaction, Online applications etc.., Authentication is more required for internet protect our bank details and to avoid unauthorized providing services because there is no person usage we can use TWO FACTOR AUTHENTICATION authentication at that time unauthorized persons is mechanism. one is USER KNOWS and another one is THEY also easy to access the authorized persons profile HAVE TO KNOW almost all banking systems are satisfied for this one authentication is required for internet with this system because based on the initial providing services The internet providing the password(SEED) we can get number of multiple one time username,password options these are unique one.Based on these username and password easy to passwords(OTP) to the mobile phone. through the login and transaction that particular website process of OTP generation mobile phone is working as a through our smart cards. In this process we are software token the different number of multiple OTPs facing one problem that is.., are coming through by the SMS to the mobile phone.IN PREOBLM: the paper we can mainly focus on decrease the usage of fraud in the internet by using the otp through TWO An unauthorized person that to who knows our FACTOR AUTHENTICATION mechanism details like username and password also they are having our smart card at that time they can easily login to that website and easy to purchase through Key Words: Public key Encryption ,Hashing Technique, that our smart card to over come this problem ,In OTP Configuration, One Way Functions ,Psuedo random the proposed one,we are describing the TWO output. FACTOR AUTHENTICATION mechanism.[1 325 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 SOLUTION: Two factor authentication gives a session or transaction.Otp is emphasizes that each protection for E_Transaction process by the name time the user tries to log on, the algorithm produces itself it describes that TWO FACTOR pseudorandom output generator thus improving the AUTHENTICATION that is,for authentication it security. provides two factors,one is,already the USER KNOWS,another one is,They HAVE TO KNOW. PUBLIC KEY ENCRYPTION: Needham and Schroeder[5]described a means for authenticating signatures using public key The first password is getting from the banking encryption First A’s is a secret key and B’s is a public system.where we get the second one,that is also key provided by the banking system only.how to get the second one is,number of second multiple passwords Notation: AB:{{PASSWORD}ASK}BPK. are coming from the initial sedd [2]to the mobile phone through the sms.the use of the sms systems the user knows password is a static password. The sending message is USER A to USER B,which has been doubly encrypted.The receiver B is read the message by applying the A’s secret key then WHY WE NEED MOBILE PHONE: decrypting the encrypted text.In a world of permanent and uncompromised keys this technique provides a fool proof authentication mechanism.[7] An authentication scheme using the mobile phone as an aurhentication token because in this one, GSM method is used already the people had HASHING: learned that how to use the GMS method in the mobile phone and also In the proposed solution The OTP generation is more secure. A secret key is does not require any extra hardware device installed used together with the challenge.The secret key is in the mobile phone at the user side.Parallely, the shared between the server and the client. The mobile phone is working as a hardware token simple password exponential key exchange protocol device,to the E-transaction process.[3] is used for exchange the key.To exchange the keys we are using the simple password exponential key exchange protocol this is more securable.[5] this is also used for an hacker that means who is able to LITERATURE SURVEY: read and modify all the messages between the client and server that person cannot learn the shared key The idea of an OTP was first suggested by and cannot make more than one guess for the leslie lamport*4+ in the early 1980’s. otp means that password in each interaction with a party that knows one time password this is valid for a single login it.[6] 326 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 The SPEKE required only two messages like The keyexchange is generating a large and randomlyselected prime p anditcomputes g = hash(s)2 mod p OTP generation: In this one ‘s’ is for ,displaying the short OTP in the browser after registration Then the server computes, The OTP is generated from a hash of a concatenation of the challenge and the secret key Ks = g a modp OTP=hash(challenge||secretkey) In the above equation ‘a’ stands for to generate random number It sends servlet to MIDLET is p and ks through the sms after receiving the sms from the servlet server,the MIDLETgeneratesthe Kc = gb modp g = hash(s)2 mod p MIDLET generates the random number it sends to servlet server kc to the AS and computes The secret key is, K = (Ks)b mod p. Fig:proceducre for OTP process After receiving the secret key kc MIDLET computes the IMPLIMENTATION: K = (Kc)a mod p For security purpose the proposed system is consists are of three parts (1)In the client’s mobile phone software is installed, (2)Server software, (3)The GSM modem is connected to the sever. 327 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Majorly,the system will have two modes of operations like connection-less Authentication system and SmS-Based System. OUR APPROCH: Three recognized Authentication factors are existing today: (i)What you know(e.g.,Password) (ii)What you have(e.g.,Token) (iii)Whatyouare(e.g.,biometrics) In this one,we are extended the Lamport’s . Fig: Mobile Registration idea along with some modifications because to produce forwardness and infiniteness. Why we produce these two because to avoiding the use of public key encryption.In this one,we integreate the LOGIN REQUEST: lamort’s idea using two different one way hash When the user enters into the website functions,h1(.)--this is seed updating and h2(.)--this through the username and the password.After is for OTP generation entering the knows password the server compares OTP(A,B)=h2^B(h1^A(initial password)) this password and generates the one time password that will be sent to the user’smobile device .The user then enters the OTPauthentication code fromthemobile devices and a 4 to 8 digit pin onto MOBILE REGISTRATION: the webpage that I waiting for user input to comlete the transaction.[8] User wants Two different hash functions h1(.) and h2(.) and initial seed ‘sint’ these three factors are installed ontheir mobile phones the service provider is shared this information.Theseed OTP ALGORITHM: is shared the unique parameters of the host and the To protecting the our smart cards, we are uer,because it notifies that whatis the international requested the server to generating the OTP.how its mobile equipment identity and who is the generates it should be hard for hacking and hard to international mobile subscriber identity and guess and retrieve for unauthorized persons. To mention the registration date of the mobile phone satisfy these factors the server generates the OTP.[9] also username and pin. 328 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 mobile phone and it will be stored in the server’s database for each client. IMEI NUMBER: IMEI stands for International Mobile Equipment Identity this is unique for every IMSI NUMBER: individual customer. This is accessible for each IMSI stands for International Mobile Subscriber Identity this is single unique number associated With all GSM and universal mobiletelecommunications system network mobile phone users. USERNAME: Format of the OTP(e.g..,name,number,nume The username is not needed because in the ric,alpha) IMEI NUMBER it gives all the details of the cutosmer but why we are specifying that is the username is CONCLUSION: integrated with the pin this Is used for to protect the details of the customer from unauthorized persons Now-a-days single factor authentication when the authorized mobile is lost. e.g..,password are easy to guess and easy to hacking for hackers because password are likenames,age are PIN: easily discovered by automated password collecting programs for this one, recently introduced the TWO The data of the username and password are FACTOR AUTHENTICATION based on OTP. This is for together so,there is no problem once the mobile to meet the demand of organizations for providing phone is lost because the OTP cannot be generated stronger authentication options to its user.In The correctly without knowing the user’s the PIN. TWO FACTOR AUTHENTICATION for each and every account of the customer they want hardware token. MINUTE: are carry their mobiles at all the times so,in the The OTP for each every minute it must mobile phone we can install all wanted tokens like be unique this is valid for only one minute time. software and hardware. This is helpful for both client and organization. FUNCTIONALITIES:  CONFIGURATION OF OTP: Configure the This paper mainly focuses on discovering of OTP characteristics through the policy TWO FACTOR AUTHENTICATION method using editor and attributes of this are, mobile phones. This is somewhat easy solution Length of the OTP because there is no need to take extra hardware to Restricted time the mobile phones. In this one, does not require any Outgoing message template extra burden on the customer and organization Delivery channel also.This solution is mainly used for internet Number of tries are restricted 329 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 providing services like E-Transactions, online [2] S.HAllsteinsen, I.Jorsta, D-v.,Thanh,”Using The applications, net banking ,Infranet etc.., mobilebphone as a security token for unified authentication”, Sysyems and Networks Communication The customers are more attracted for this TWO In:internationalconference on Systems and Networks FACTOR AUTHENTICATION solution because this is Communications,2007,p.68-74 more securable. The OTP algorithm provides some factorsbecause to secure the user profile [3] S.M.Siddique,M.Amir,”GMSecurity Issues and ChallengesSoftwareEngineering”,Artificialintelligence,Net working and Parallel/Ditributed Computing,2006. SNPD In the proosed system we are implementing TWO 2006. 7th ACIS International Conference on digital Object options these two are using a free and fast access Identifier,pp.413-418. i.e..,Connection-Less Authentication system and SMS-BASED Authentication System in this one, Connection-Less Authentication system are more *4+ L.Lamport, “password Authentication With Insecure expensive based on SMS-Based Authentication Communication”, system because in the Connection-Less In:comm.:ACM,vol.24,no.11,1981,pp.770-772. Authentication system there is no connection between client and the server.The server generates [5] Jablon, D., Strong Password-only Authnticated Key the OTP and it sends to the user’s mobile phone, but Exchange.Computer Communication Review, ACM SMS-Based Authentication System is somewhat less SIGCOMM, 1996.vol.26 (no.5). cost solution. In the future developments includes [6] Recorla,e., RFC 2631 Diffie-Hellman Key Agreement another factor other than the factors i.e.., Somebody method.1999. You know, that is based on the notation vouching. [7] Authntication ofignatures using public keybencryption Kellogg S.Booth university of water 100,Canada. REFERENCES: [8] AcceessMatrix TM UAS Future Proof Universal Authntication Server. [1] Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram khan “OTP-Based Two-Factor Authentication Using Mobile Phones” In international [9] Fadi Aloul,SyedZahidi Wassim El-Hajj “Two-Factor conference on information technology”2011. Authentication Using Mobile phones”. 330 All Rights Reserved © 2012 IJARCET