Implementation Opass Authentication Protocol System for net Security

International Journal of Computer Trends and Technology (IJCTT)          
© - May Issue 2013 by IJCTT Journal
Volume-4 Issue-5                           
Year of Publication : 2013
Authors :P.Shanmukha kumar, Sri. k.Ishthaq Ahamed


P.Shanmukha kumar, Sri. k.Ishthaq Ahamed "Implementation Opass Authentication Protocol System for net Security"International Journal of Computer Trends and Technology (IJCTT),V4(5):1336-1340 May Issue 2013 .ISSN Published by Seventh Sense Research Group.

Abstract: - Safety may be a major focus of awareness for operators and users of the web site and its several applications, among the tough issues still inefficiently self-addressed is identity authentication for functions of associating specific user with particular services and authorizations. Asking may be thanks to classify users such shaping recommendation is tough for adversaries, whereas providing robust authentication of their chosen identifiers remains straightforward and convenient for users. Text based mostly word is that the most well liked style of user authentication on websites as a result of its convenience and ease. However, users’ passwords are at risk of be purloined and compromised beneath completely different threats and vulnerabilities. Firstly, users usually choose weak passwords and utilize similar passwords across completely different websites. Habitually reusing words causes a domino effect; once Associate in nursing resister compromises one password, she`s going to exploit it to realize access to additional websites. Second, typewriting words into untrusted computers suffers password outlaw threat. Associate in nursing resister will launch many word stealing attacks to grab passwords, like phishing, key loggers and malware. During this paper, we tend to style a user authentication protocol named oPass that leverages a user’s telephone and short message service to thwart word stealing and word utilize attacks. OPass solely needs every taking part web site possesses a novel signaling, and involves a telecommunication service supplier in registration and recovery phases. Through oPass, users solely ought to bear in mind a long word for login on all websites. Once evaluating the OPass example, we tend to believe OPass is economical and reasonable compared with the standard internet authentication mechanisms.


[1] B. Ives, K. R. Walsh, and H. Schneider, “The domino effect of password reuse,” Commun. ACM, vol. 47, no. 4, pp. 75–78, 2004.
[2] S. Gawand E. W. Felten, “Password management strategies for online accounts,” in SOUPS ’06: Proc. 2nd Symp. Usable Privacy . Security, New York, 2006, pp. 44–55, ACM.
[3] D. Florencio and C. Herley, “A large-scale study of web password habits,” in WWW ’07: Proc. 16th Int. Conf. World Wide Web., New York, 2007, pp. 657–666, ACM.
[4] S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, “Multiple password interference in text passwords and click-based graphical passwords,” in CCS ’09: Proc. 16th ACM Conf. Computer Communications Security, New York, 2009, pp. 500–511, ACM.
[5] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The design and analysis of graphical passwords,” in SSYM’99: Proc. 8th Conf. USENIX Security Symp., Berkeley, CA, 1999, pp. 1–1, USENIX Association.
[6] A. Perrig and D. Song, “Hash visualization: A new technique to improve real-world security,” in Proc. Int.Workshop Cryptographic Techniques E-Commerce, Citeseer, 1999, pp. 131–138.
[7] J. Thorpe and P. van Oorschot, “Towards secure design choices for implementing graphical passwords,” presented at the 20th. Annu. Computer Security Applicat. Conf., 2004.
[8] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design and longitudinal evaluation of a graphical password system,” Int. J. Human-Computer Studies, vol. 63, no. 1–2, pp. 102–127, 2005.
[9] S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget, “Design and evaluation of a shoulder-surfing resistant graphical password scheme,” in AVI ’06: Proc. Working Conf. Advanced Visual Interfaces, New York, 2006, pp. 177–184, ACM.

Keywords — Network security, parole use attack, parole stealing attack, user authentication, just the once parole, SMS.