25-08-2017, 09:32 PM
SECURITY ANALYSIS AND IMPLEMENTATION OF 3-LEVEL SECURITY SYSTEM USING IMAGE BASED AUTHENTICATION
SECURITY ANALYSIS.docx (Size: 23.68 KB / Downloads: 26)
OBJECTIVE:
The project entitled as “security analysis and implementation of 3-level security system using image basedauthentication“. In the scheme the remote user does not need to use smart cards. It is convenient for the users to use a common storage device such as a universal serial bus memory. The scheme is easy to implement. However, this authentication scheme is vulnerable to impersonation attacks and middle man attacks. An attacker could impersonate legitimate users to login and access the remote server.
ABSTRACT:
Much work has been done in recent years on mechanisms for authenticated key ex-change. Many solutions rely on cryptographically secure keys and therefore haveto deal with issues like key management, public-key infrastructure, or secure hardware. Recently password authenticated key exchange protocols have been proposed which enable mutual authentication and key exchange based solely on passwords, requiring no other public or private participant-speci¯c information to be stored.The password could be a short string of characters or just a 4-digit PIN number. In this dissertation we would analyze these protocols and explain how to bootstrap a short secret into a secure strong secret.Therefore, we have tried to increase the security by involving a 3-level security approach, involving text based password at Level 1, Image Based Authentication at Level 2, andautomated generated one-time password (received through an automated email to the authentic user) at Level 3.And an assiduous effort has been done for thwarting Shoulder attack, Tempest attack, and Brute-force attack at client side , through the use of unique image set in the IBA System.
EXISTING SYSTEM:
Captcha Based Login System
Cryptographybased Login system.
Biometric Based Login System
Protocol Based Login System
DISADVANTAGE:
Forget The Password So the user didn’t Login any one Website and he/she can’t access any information from that’s website.
Reusing passwords causes a domino effect, when an adversary compromises one password, she will exploit it to gain access to more websites
Hacker Applying Random-Key Function/Method for Hacking the user password
PROPOSED SYSTEM:
The main Objective of of 3-Level Security system is a unique and an esoteric study of using images as password and implementation of an extremely secured system, employing 3 levels of security-(Text Password, Image Password, and One-Time automated generated password). This unique user-friendly System named as 3 Level Security that can be employed in any organization for storing crucial and confidential documents, and ensures the security through itsthreelevels.