Three level password authentication schemes

      

ABSTARCT :

Textual passwords are more commonly used in day to day life. They tend to be more vulnerable as far as security is concerned. Users tend to pick short password that are easy to remember which makes the password vulnerable for attackers to break. Furthermore, textual password is vulnerable to hidden camera, shoulder surfing, key loggers, spyware and brute force attack. Graphical password schemes have been proposed as a possible alternative to text-based scheme. However, they are mostly vulnerable to shoulder surfing and key loggers.

EXISTING SYSTEM :

? It can replace or coexist with conventional textual password systems without changing existing user password profiles. ? Hackers are mostly hacking our bank details, office details and personal mail. Now many security methods are used, but most of all failure process, because all the applications have some easy way to hack. ? Our username identifies us and the password validates us. But passwords have some weaknesses: more than one person can possess its knowledge at one time. ? Moreover, there is a constant threat of losing your password to someone else with venomous intent.

DISADVANTAGE :

? Someone standing behind or besides you can intentionally see the credentials (The Shoulder Surfing Problem). ? There is a need for solving the above stated problem. In this paper, we propose a Three Phase Textual-Graphical Password Authentication scheme. ? This technique seamlessly integrates both graphical and textual password schemes and provides nearly perfect resistant to shoulder-surfing, hidden-camera, spyware attacks, key loggers and brute force attack. ? When increasing security is an issue text based passwords are not enough to counter such problems.

PROPOSED SYSTEM :

• Graphical password schemes have been proposed as a possible alternative to text-based scheme. • The proposed scheme has an extremely wide scope as it can be used for banking application, ATM services and other such application where user interaction with private data is controlled by means of password authentication. • This scheme proposes that, instead of clicking on the characters of session password, user will remember those characters, and at the end the user has to enter the session password which will lead to its authentication. • According to the system requirement, desired level of security can be achieved by using three proposed levels of authentication.

ADVANTAGE :

? This system use only security purpose, it uses to all security place. ? Hackers are not very easily to hack the security, because three levels are more useful this concept. ? Any hacker if in the extreme case, suppose (although difficult) will cross through the above two mentioned security levels, will definitely not be able to cross the third security level, unless he has access to the original user’s email id. ? We also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp