Password Authentication with Secured Login Interface at Application Layer

Agrawal, Vivek Kumar; Bharti, R. K.; Parihar, Bhawana
September 2014
International Journal of Computer Science & Network Security;Sep2014, Vol. 14 Issue 9, p82
Academic Journal
In this paper we present a innovative solution to the old problem of password security at application layer or input level. In our solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random single digit integer number and presented to the user through an Login input interface module. A valid user entered his password in the form of the sequence of code or numeric value from the login input interface module that describe his password code in place of his actual password characters. This approach does not require the input code to be hidden from anyone (shoulder surfing) or converted to placeholder characters for security reasons. Our solution engine every time regenerates new numeric value when user enters password for each character each time the carriage return key is struck so our approach is key logger attack protected, producing a toughened password that is convincingly more secure than an old and widely used password scheme is conventional password scheme. In which the system first authenticates the username and password at the login time from the user database and on the basis of authentication of the user, allows the user to access the system. However, such scheme is vulnerable to attacks like Shoulder Surfing, Key loggers, Phishing Attacks and Login Spoofing against both online and offline attackers. our approach is feasible in practice, ease of use, better security and performance.


Related Articles

  • Multiple Key Exchange Protocol with high efficiency. Tong YI; Xuebao Li; Hongchao CHEN; Shuling ZHENG // International Journal of Digital Content Technology & its Applic;Apr2013, Vol. 7 Issue 8, p496 

    This paper first analyses two existing password-authenticated key exchange protocols for three-party and points out they are both insecure. In order to solve the problem that most of existing verifier-based 3pake protocols can not resist server key disclosure attack, we present an efficient...

  • An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without using Bilinear Pairings. Ramesh, S.; Bhaskaran, V. Murali // International Journal of Engineering & Technology (0975-4024);Dec2013/Jan2014, Vol. 5 Issue 6, p5140 

    Login to the remote server over unreliable insecure network demands secured password a secured password authentication with less computational cost. We have proposed a remote user authentication scheme based on ECC that establish strong authentication with key agreement. As the password verifier...

  • Automatic Security Protocol Verification Algorithm Based on Improved Authentication Test. Qiang Bai; Yiwen Xu // International Journal of Digital Content Technology & its Applic;Sep2012, Vol. 6 Issue 17, p76 

    Automatic security protocol algorithms based on strand space model theory are analyzed in this paper, and the state space explosion problem in these algorithms is pointed out. To solve this problem, an automatic security protocol verification algorithm based on improved authentication test is...

  • Secure Mutual Authentication Protocol. Nakhate, Seema P.; Goudar, R. M. // International Journal of Computer Networks & Communications Secu;Apr2014, Vol. 2 Issue 4, p142 

    In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication...

  • Digital Door Lock on the Access Control System using OTP-based User Authentication. Seung-Soo Shin; Kun-Hee Han; Kwang-Yoon Jin // International Journal of Digital Content Technology & its Applic;Jul2013, Vol. 7 Issue 11, p436 

    The access control system based on OTP is proposed to complement the drawbacks of the user authentication mechanism such as a digital door-lock and mechanical door-lock based. The proposed method does not need administrator's help to access the facility if the user must know OTP and has a...

  • Research of network payment system based on multi-factor authentication. Jiang Yuyan; Li Changxun // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 7, p437 

    With the increasing popularity of e-commerce, its safety performance have also been extensive attention, along with a need for a safe and efficient authentication system. This paper analyzes the main currently used authentication method, According to the defects present a combination of USB Key,...

  • Method of Authentication on Based Password Generators. Verlan, A. F.; Karimov, M. M.; Tashev, K. A.; Imamaliev, A. T. // Proceedings of the International Conference on Application of In;2013, p773 

    In this article the method of use of generators of pseudorandom numbers is offered at process of the authentication of the turned subject for protection of resources against unauthorized access in information and communication systems

  • An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things. Ning YE; Yan Zhu; Ru-chuan WANG; Malekian, Reza; Lin Qiao-min // Applied Mathematics & Information Sciences;2014, Vol. 8 Issue 4, p1617 

    In this paper, we proposed an efficient authentication and access control method based on general view of the security issues for perception layer of Internet of Things (IoT). The advantage of the proposed method is establishing session key based on Elliptic Curve Cryptography (ECC). This...

  • USER AUTHENTICATION TO A WEB SITE USING FINGERPRINTS. PURA, Mihai Lica // Proceedings of the Scientific Conference AFASES;May2014, Vol. 1, p361 

    Nowadays, authenticated access to web sites becomes more and more important. Usernames and passwords are one of the easiest ways to accomplish it. But a more secure approach is to use biometrics. This article presents a very simple modality to use fingerprints to control the access to a web...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics