Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Smt. Chaya P, Neha Kowshik V, Deepthi Dhananjaya, Reshma
DOI Link: https://doi.org/10.22214/ijraset.2022.44573
Certificate: View Certificate
It is important to integrate security as part of system and software development. A computer can be accessed by anyone. Cyber security acts against hackers. Security begins with authentication. Access to systems, networks, databases, websites, and services are regulated using authentication. The most fundamental category of verification is done with usernames and passwords. In our paper, we propose new approaches to each of these authentication mechanisms, which include hash code message authentication, the Entirely Automated Public Turing Test to Notify Computer systems and Human beings Apart (CAPTCHA), and one-time passwords
I. INTRODUCTION
Internet is within the reach of every person. Cyber security acts against hackers. Cyber-attacks target other computers or networks. There are two kinds of cyber-attacks: those with the goal of shutting down computer operations and those which try to access computer data with administrative privileges. As a result, security is considered as part of the system and software development process. Authentication is critical as a security entry point. Authentication controls access to the secured resources system, communications system, database, website, and services. The most fundamental form of authentication involves the use of a password and username. Authentication mechanisms are used to validate users. Weak authentication results in the leakage of vulnerable documents such as credit and debit card numbers and identity. Some authentication mechanisms are 2-factor, multifactor, OTP, biometrics, and more. This paper concentrates on 3 authentication mechanisms: text verification utilizing hash code, Fully Automated Public Turing test to inform Computers and Humans Apart (CAPTCHA), & One Time Passwords, & recommends new methodologies for all.
II. OBJECTIVES OF THE PROJECT
III. LITERATURE SURVEY
IV. COMPARISION TABLE
TITLE |
AUTHOR |
DESCRIPTION |
DATE |
Implementation of enhanced secure hash algorithm towards a secured web portal |
E. De Guzman |
Improved SH calculation-512 was used in word hashing for web applications. |
2019 |
Secure hash algorithm based on efficient chaotic neural network |
N. Abdoun, Khalil |
In comparison to Secured Hash Algorithm 2 & Chaos-based Hash functions, the investigation revealed the structure's proficiency When it comes to strong Collision Resistant & High Message Sensitivities. |
2016 |
New one way hash algorithm using non-invertible matrix |
M. Abutaha |
They converted the data into something like a matrix framework via combining all of the necessary transformations to create the first hash value. The first stage in creating a summary's output is used to construct a secure hash value. |
2013 |
Design and implementation of keccak hash function for cryptography |
M.A. Patil |
It was a 1-way encryption procedure, and the technique demonstrated parallelism. This has been implemented on an FPGA. The procedure for carrying out the execution was exceedingly rapid and effective. |
2015 |
A study on fingerprint hash code generation based on MD5 algorithm and freeman chain code |
K. Prasad |
The MATLAB investigation demonstrated why fingerprint hash code can detect a client quite well. |
2018 |
A simple secure hash function scheme using multiple chaotic maps |
M. Ahmad |
To construct efficient variable-sized hash functions, this research used a variety of chaotic maps. |
2017 |
Breaking text-based captchas and designing image-based captcha |
M. Tang |
CAPTCHA was created to distinguish between humans and computers as a result of developers ability to enter PC frameworks using PC assaulting robots and projects. |
2016 |
Gamification of internet security by next generation CAPTCHAs |
S. A. Kumar |
The experiment was a challenge-response test to guarantee that the answer was created entirely by people, rather than improved robots. |
2017 |
A CAPTCHA implementation based on 3D animation |
J. T. Mei |
The research revealed a method for creating a 3-dimensional liveliness confirmation code. This problem cannot be solved using a 2-Dimentional still image confirmation code. |
2009 |
Cyber security using arabic CAPTCHA scheme |
B. Khan |
The effort benefited a variety of online administrations, including email, internet buying, web journals, as well as other digital participation, among others. |
2013 |
Generation and use of handwritten CAPTCHAs |
A. Rusu |
The study on an automated recognition of unrestricted penmanship continues to be a demanding examination challenge. |
2010 |
Implement time based one time password and secure hash algorithm 1 for security of website login authentication |
H. Seta |
To prevent client password abuse, the researchers employed 2-factor authentication study with the Time-Based OTP & (SHA 1) algorithm. |
2019 |
A new secure onetime password algorithm for mobile applications |
H. S. Elganzoury |
Randomly varying inputs were used to feed the algorithm. The result was evaluated and found to be suitable for use in Internet - Of - things authentication services. |
2018 |
Random password generation of OTP system using changed location and angle of fingerprint features |
B. Cha |
The position and orientation of fingerprint features are used in the OTP approach. |
2008 |
Password generation of OTP system using fingerprint features |
C. Kim |
The project aided in the creation of a flexible password key for One Time Password. |
2008 |
V. METHODOLOGY
Figure 1 shows how the user interacts with the application represents the System Architecture of the entire application process. A user will interact with the web application with the front-end interface and will be login after providing valid credentials. The figure represents the front end and back end of the application. It represents the process of how hash code, CAPTCHA and OTP are generated.
The CAPTCHA code is generated using the site key and the action is based on score. The Hash code generated will be based on the time the user logs in and registers a complaint and that will unique for every person. The One-time password is generated after CAPTCHA code is entered. All the user’s information is stored in MYSQL database. The OTP generated will be sent to mobile application and the user must type the sum of the digits in the text box which provides multiple security and safeguards the application.
C. OTP Generation
Present OTP Generations are just 4-digit and 6-digit OTPs which takes a few milliseconds to hack. The proposed technique involves 4-digit OTP which is being generated. When a user request for OTP, A 4-digit OTP will be generated and sent to the users registered device. This OTP is time-based OTP and will be valid only for that particular session. Once the OTP is generated a new technique is being introduced. Instead of just typing the received OTP in the text box, we implement a method as shown below.
This study provides a revolutionary hash code, CAPTCHA, & One Time Password authentication mechanism that compresses cybersecurity authentication mechanisms. The suggested hash code approach includes a time factor in order to build a message hash code that is difficult to crack. To prevent robots from obtaining access to web resources, the suggested CAPTCHA approach employs simple yet effective aesthetic elements. To make it difficult to crack, the suggested OTP creation process employs unusual characters and a larger number of digits. The presented solutions are basic but effective cybersecurity authentication technologies. For all of these suggested authentication systems, further critical mathematical techniques can be employed in the future. Also, an overview of the literature on objects in real-time and non-real-time environments using a diversification of methodologies. The major goal of this research is to discover the right technology in use and to determine which technique is ideal for obtaining a final outcome.
[1] F. E. De Guzman : \"Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal,\" 2019 [2] N. Abdoun : \"Secure Hash Algorithm based on Efficient Chaotic Neural Network,\" 2016 International Conference on Communications [3] M. Abutaha : \"New one way hash algorithm using non-invertible matrix,\" 2013 International Conference [4] M. A. Patil : \"Design and implementation of keccak hash function for cryptography,\" 2015 International Conference [5] Aithal, Sreeramana : “A Study on Fingerprint Hash Code Generation Based on MD5 Algorithm and Freeman Chain code”. [6] Ahmad, M : “ Simple Secure Hash Function Scheme Using Multiple Chaotic Maps”. [7] M. Tang, H. Gao : \"Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha,\" [8] S. A. Kumar : \"Gamification of internet security by next generation CAPTCHAs,\" 2017 International Conference [9] J. Cui, J. Mei : \"A CAPTCHA Implementation Based on 3D Animation,\" 2009 International Conference [10] Bilal Khan “Cyber Security Using Arabic CAPTCHA Scheme Center of Excellence” in Information Assurance [11] Rusu, A : “Generation and use of handwritten CAPTCHAs.” [12] H. Seta : \"Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication,\" 2019 International Conference. [13] H. S. Elganzoury: \"A new secure one-time password algorithm for mobile applications,\" 2018 35th National Radio Science Conference [14] ByungRae Cha : \"Random password generation of OTP system using changed location and angle of fingerprint features,\" 2008 8th IEEE International Conference [15] B. Cha : \"Password Generation of OTP System using Fingerprint Features,\" 2008 International Conference
Copyright © 2022 Smt. Chaya P, Neha Kowshik V, Deepthi Dhananjaya, Reshma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET44573
Publish Date : 2022-06-19
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here