Differentiated Virtual Passwords, Secret Little Functions and Codebooks for Protecting Users from Password Theft

Shaik Imam Khasimbhi, Shaik Saidulu, R. P. Naraiah

Abstract


In this Digital world every authentication needs some sort of passwords and it is really a big problem for the users to remember all these passwords and also to secure these from hackers. Even though we have many advanced techniques like finger print, smart card but still they are not providing high level security. This project gives the solutions for all these problems. We propose differentiated virtual password mechanisms in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users’ passwords. The tradeoff is that the stronger the scheme, the more complex the scheme may be. Among the schemes, we have a default method (i.e., traditional password scheme), system recommended functions, user specified functions, user specified programs, and so on. A function/program is used to implement the virtual password concept with a tradeoff of security for complexity requiring a small amount of human computing. We further propose several functions to serve as system recommended functions and provide a security analysis. For user-specified functions, we adopt secret little functions in which security is enhanced by hiding secret functions/algorithms. Unlike the traditional methods to generate the OTP, we are using the real time robust algorithms by using the timers in the microcontroller and the Real Time Clock inside the controller. In this project we generate virtual password based on the user selectable character and functions .Each user has one fixed RFID, after authenticating these user has to select character and function .based on these selection the server will generate one password and send it as SMS to user this is one time password. Every time based on these selections user will be received a unique password which can be not be known by any other.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org