Abstract

As a high-speed internet foundation is being developed and people are informationized, most of the tasks are engaged in internet field so there is a risk that any private data like personal information or applications for managing money can be wiretapped or eavesdropped. The consolidation of One Time Passwords (OTPs) and Hash encryption algorithms are used to evolve a more secured password-protected web sites and data storage systems. The new outlined scheme had higher security, small system overhead and is easy to implement.

Highlights

  • Authentication based on cryptographic techniques is a great challenge research area in clientserver system

  • Dynamic passwords or one-time passwords play an important role in authentication

  • The impersonators may pretend like the authorized users to get the services. This ticket-based onetime password authentication system is more secure than the existing authentication schemes by preventing from guessing attack and replay attack

Read more

Summary

INTRODUCTION

Authentication based on cryptographic techniques is a great challenge research area in clientserver system. As the existing one-time password schemes use only encryption algorithm and hash function in registration process, the password is still vulnerable. The impersonators may pretend like the authorized users to get the services This ticket-based onetime password authentication system is more secure than the existing authentication schemes by preventing from guessing attack and replay attack. The ticket supports the server to authenticate the user and the signature response of server supports the user to authenticate the server A password is a secret word or string of characters that is used for user authentication This is the most commonly used mechanism of authentication. Users may biometrically authenticate via their fingerprint, voiceprint, or iris scan using provided hardware and enter a PIN or password in order to open the credential vault

CRYPTOGRAPHY
SECURITY ISSUES IN CLOUD COMPUTING
Conventional Security Issues
Availability issues
Third Party Data Control
RELATED WORK
PASSWORD PROTECTION USING MULTIPLE ENCRYPTION
DOS ATTACK AND BRUTE FORCE ATTACK PREVENTION
PREVENT PHISHING ATTACKS USING IMAGE VERIFICATION
IMPLEMENTING SMS BASED OTP APPROACH
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.