SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Scientific Journal of Impact Factor (SJIF) : 3.134
International Journal of Advance Engineering and Research
Development
@IJAERD-2014, All rights Reserved 150
ISSN (Print) : 2348-6406
ISSN (Online): 2348-4470
One Time Password Generation Using Mathematical Random Function In Sphere
Space For Mid-Sized Applications
1
Ishupreet Kaur, 2
Gargi Narula
1
Computer Science & Engineering Department, SVIET, Patiala, Punjab, 140601, India,kaurishupreet1@gmail.com
2
Computer Science & Engineering Department, SVIET, Patiala, Punjab, 140601, India,garginarula@gmail.com
Abstract--The proposed vOTP scheme is designed by keeping the mid-sized online application requires the OTP scheme. The
proposed one time password scheme is used to generate the one time password from the spherical space using random
function from a larger spherical number space. This technique is useful to generate thousands of unique and unrepeatable
OTPs at one point of time. The results have shown that the system can serve a large number of users every minute. The
system is capable of serving one user in fraction of seconds, 100 users in 28 seconds and 1000 users in less than 10 minutes.
Keywords—one time password, random function, sphere space, phishing attack , multiple ID generation attack.
I. INTRODUCTION
The One Time password is unique value which can be used for one transaction only. Once it is used it becomes outdated. One
Time Password can be generated Time Based and Event Based. It is used to prevent our systemfrom unauthorized access and
harmful attacks. Similarly, One Time Password can also be used to prevent against botnet attacks. Botnet attacks are the
attacks in which the bot programs are installed on users system without its prior knowledge. This bot attack can be a
snooping attack or a key logger attack.
Now, whenever a OTP is used for authentication purpose, it can be a text or graphic based. Because we are using OTP
against Botnet/Autobot, we will be using graphics based OTP. As bot programs which are available can detect the text-based
passwords but they cannot recognize graphics. A text based OTP is generated using a random generator function which is
later converted to graphics based password. One Time Password can be delivered to the user using many ways like mobile
phone, e-mail, etc.
The Basic Idea of this scheme is to generate a One Time Password for authentication purpose and each time the one time
password generated should be unique. The one time password adds another layer of security to login process used widely
over internet for authentication. One time password can be generated using spherical random function which has a large
amount of number and can produce unique combinations. Spherical random function is capable of generating more unique
combinations of integers than any other mathematical random function. Then the random is uniquely selected among the
sphere matrix, which creates more unique passwords. Then the integer based password is converted into image hardens the
security layer of the mobile/SMS based authentication environments. The visual form of OTP increase the security of the
authentication process and protect passwords against interception attacks, the concept of one-time visual passwords (OTVP)
is proposed. The OTVP concept takes advantage of the differences between computer encoding of data and the human visual
perception of images.
Here, we have taken a Client and Server based architecture. In this, a authentication request is made by client to server. And
server will send a text based password to client. Further, the text based password is converted to graphic based password. If
the recipient is actually a human being, then a human can recognize the graphic and get authenticated. But if it is a Autobot or
botnet, then it cannot recognize the password received and authentication is failed. The graphics based password can be
delivered to client using MMS, watsapp or email. Therefore, the given mechanism can be used for authentication purpose in
online portals where Autobot are using users identification for login purpose without their consent. Then the bots can steal
important information or can have financial gains. So it is better to use graphics based one time password to prevent from
autobots or botnet problems.
II. LITERATURE REVIEW
R.R.Karthiga and associates have proposed an OTP generation technique to minimize the damage by phishing and spyware
attacks. The OTP is used to authenticate the clients to protect the server from unauthorized access using the long-termpublic
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2014, All rights Reserved 151
keys and digital certificates. Ahmad Alamgir Khan et al. have discussed the phishing attack used by cyber criminals to steal
the user’s personal information, credit card or debit card information in detail. The authors have also proposed the security
mechanism against phishing attacks. The proposed approach is based on the OTP retrieval using SMS or email systems.,
which are submitted by the users to the server and server reverts the decision logic after inspection. The OTP is used an
encrypted token in very smart way to tackle the phishing attack problem. Andrew Y. Lindell et al have performed the
comparison of two approaches of the OTP: time-based OTP and event-based OTP. They have provided the usability and
security comparison of both of these one time password techniques. Both of the techniques compared under this comparison
uses cryptographic mechanism. Mihai Ordean and his research associates have conducted the performance analysis of
security and usability of authentication systems based on components. They have introduced the one-time visual
authentication (OTVP) concept which in real is representing a novel approach to the security of authentication interfaces that
combines one-time passwords (OTPs) with visual authentication interfaces
III. EXPERIMENTAL DESIGN
The major task of the proposed system is to create the one time password based on the random sphere value space to
authenticate the users to avoid various cyber attacks like phishing attack. The one time password generation scheme must be
able to produce a larger space of unique passwords so that it can be used to authenticate multiple users at one time without
any duplicity.
The OTP adds an extra security layer to protect the user login. The OTPs are widely used over internet for
authentication.OTP generation is using values in the sphere space based random number generation system for large density
users at once. Cubic random function provides the capability of larger number of random number combinations. The OTP
generation initially generates the matrix of million values. The different numbers of values are randomly selected among the
million values generated earlier and concatenates them to make an OTP. Then the complex number is converted into integer
based password is converted into image using visual encoding makes it more secure and send it via mobile/SMS based
authentication environments.
Algorithm: OTP Generation Algorithm
Step 1: Sphere Random Function to generate random number
A. Initialization of the random number generator and calculate the angle of elevation in the sphere. Sphere contains
values in open interval, , but not uniformly distributed.
B. Creation of the angle of azimuth for each sphere point on the basis of uniformly distributed in the open
interval,
C. Compute radius value for each point based on open interval, not uniformly distributed.
D. Rearrange and concatenate the random matrix values and return OTP.
Step 2: Visual encoding
A. Break OTP into list of characters
B. Convert each character to ASCII value
C. Fetch the visual code/encode for ASCII value for each character in the list
D. Concatenate the visual encoding of all characters to form an image and Return vOTP
Step 3: Client/Server Communication
A. Server send the vOTP to client system using SMS or MMS or Other-App.
B. Client submits the OTP to server on web portal
C. Server verifies the replied OTP and return the decision logic
IV. RESULT ANALYSIS
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2014, All rights Reserved 152
The experimental design has been developed using MATLAB simulator and the results have been observed and analyzed
deeply. The OTP generation procedure is using multi-level random value generation from the sphere, and further
concatenated in uneven fashion to produce the unique one time password every-time. One time password generation process
is flexible and unique to produce the unique one time passwords at one point of time to reduce the possibility of two users
receiving the same password at one point of time. This random one time password generation framework can used with
medium or smaller sized web or utility based portals. This sequence will be able to handle thousands to tens of thousands of
users at one point of time. The uniqueness calculation has shown that this OTP framework is capable of handing flexible
number of unique OTP at one point of time with minor changes in the program sequence. The framework simulation is
designed to generate the one time password which is followed by visual encoding to produce one time image password
(OTIP). OTIP is then forwarded to the client side, where client enters the password the OTP input box and submit the
information to the server side. The server then verifies the original OTP with the generated OTP and returns the decision
logic, which is further used to take the programmed action in the software architecture according to the decision logic. The
OTP send by the Client to Server is compared with the OTP generated and saved at the Server. If the both the OTPs are same,
then the OTP is verified and the access is granted.
Rotation Size Time in Seconds
1 0.23
10 2.63
50 12.69
100 28.71
200 61.14
500 190.53
1000 505.43
Table 1: The Time (in seconds) to Rotations size comparison table
Figure 1- The Server Graphical Interface
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2014, All rights Reserved 153
Figure 2- Generate One Time Password
Figure 3- Convert Integers into Image Based Password and forward to client
Figure 4- The user retrieve the vOTP and submit the OTP to the server.
Figure 8- The OTP Verification
The OTP send by the Client to Server is compared with the OTP generated and saved at the Server. If the both the OTPs are
same, then the OTP is verified and the access is granted.
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2014, All rights Reserved 154
V. CONCLUSION AND FUTURE WORK
The proposed vOTP scheme is a scheme is capable of producing a large number of unique word in one time space to
facilitate its implementation with mid-sized user authentication applications. The proposed OTP scheme generates the
password from the cubic value space using random number selection function from a larger possible numbers in the space.
This technique is useful to produce thousands of unique OTPs at one point of time. The results have shown that the system
can serve a large number of users every minute. The systemis capable of serving one user in fraction of seconds, 100 users in
28 seconds and 1000 users in less than 10 minutes. In future this scheme can be enhanced using the dizzy images scheme,
which also protect against the botnets/autobots with image processing or optical character recognition capability. Also this
scheme can be enhanced to produce alphanumeric passwords and can be used with existing or improved v isual encoding
scheme.
REFERENCES
[1] R.R.Karthiga, 2013.“One-time Password: A Survey”, International Journal of Emerging Trends in Engineering and
Development Issue 3, Vol.1, pp. 613-623.
[2] Ahmad Alamgir Khan, 2013. “Preventing Phishing Attacks using One Time Password and User Machine Identification”,
International Journal of Computer Applications (0975 – 8887) Volume 68– No.3.
[3] Indu S., Sathya T.N., Saravana Kumar V., 2013“ A Stsnd-alone and SMS-Based approach for Authentication using
Mobile Phone”, IEEE-International Conference on Information Communication and Embedded.
[4] Andrew Y. Lindell, 2007.“Time versus Event Based One-Time Passwords”, Aladdin Knowledge Systems.
[5] Soonduck Yoo1 , Seung-jung Shin1, Dae-hyun Ryu1, 2013. “An effective Two Factor Authentication Method using QR
code”, ISA 2013, ASTL Vol. 21, pp. 106- 109, © SERSC 2013.
[6] www.ietf.org
[7] Bin Li, Shaohai Hu, Yunyan Liu, 2006.“A Practical One-Time Password Authentication Implement on Internet”,
ICWMMN Proceedings.
[8] Ping Wang, Lei Wu, Baber Aslam and Cliff C. Zou, 2009. “ A Systematic Study on Peer-To-Botnets”, International
Conference on Computer Communications and Networks, 2009. ICCCN 2009. San Francisco, CA, IEEE.
[9] Yu tao, Fan, Gui ping, Su, 2009.“Design of Two-Way One-Time-Password Authentication Scheme Based On True
Random Numbers”, Second International Workshop on Computer Science and Engineering, pp. 611-614.
[10] Jivika Govil, 2007. “Examining the Criminology of Bot Zoo”, IEEE.
[11] Mihai Ordean, 2012. “Secure Authentication Using One Time Visual Password”, Ph.D. Dissertation, The technical
university of Cluj-Napoca.
[12] Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng, and Jingyuan Zhang, 2009.” Botnet: Classification, Attacks,
Detection, Tracing, and Preventive Measures”, Hindawi Publishing Corporation EURASIP Journal on Wireless
Communications and Networking Volume 2009,11 pages doi:10.1155/2009/692654
[13] Julian B. Grizzard, Vikram Sharma, Chris Nunnery,and Brent Byung Hoon Kang, David Dagon, 2007, “Peer-To-Peer
Botnets: Overview and Case Study”. HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in
Understanding Botnets. USENIX Association Berkeley, CA, USA.
[14] Abebe Tesfahun and D.Lalitha Bhaskari, 2013. “Botnet Detection and Countermeasures - A Survey”, International
Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 4, ISSN 2278-6856.
[15] Takasuke TSUJI, 2003. “A One-Time Password Authentication Method”, Kochi University of Technology.
[16] Márk Jelasity, Vilmos Bilicki, 2009. “Towards Automated Detection of Peer-To-Peer Botnets: On the Limits of Local
Approach”, Hungary, www.usenix.org
[17] S. Behal, A. S. Brar, and K. Kumar, “Signature based Botnet Detection and Prevention”, ISCET, pp. 122-127, 2010.

Mais conteúdo relacionado

Mais procurados

TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDECTM360
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyNick Malcolm
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 
License Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationLicense Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationIRJET Journal
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?Fortytwo
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPIRJET Journal
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor AuthenticationFortytwo
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...IRJET Journal
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and YouChris Stone
 
Better watch your apps - MJ Keith
Better watch your apps - MJ KeithBetter watch your apps - MJ Keith
Better watch your apps - MJ Keithm j
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tPriyanka Aash
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodIJCERT
 

Mais procurados (20)

Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Cw4201656660
Cw4201656660Cw4201656660
Cw4201656660
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
 
otp crid cards
otp crid cardsotp crid cards
otp crid cards
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
License Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationLicense Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial Application
 
7317ijcis01
7317ijcis017317ijcis01
7317ijcis01
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and You
 
Better watch your apps - MJ Keith
Better watch your apps - MJ KeithBetter watch your apps - MJ Keith
Better watch your apps - MJ Keith
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 

Semelhante a One time password generation using mathematical random function in sphere space for mid sized applications

Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET Journal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
A new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accessA new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accesseSAT Journals
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
A new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromA new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromeSAT Publishing House
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protectionMigrant Systems
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
 

Semelhante a One time password generation using mathematical random function in sphere space for mid sized applications (20)

Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
C0210014017
C0210014017C0210014017
C0210014017
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
E0962833
E0962833E0962833
E0962833
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
A new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accessA new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script access
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
A new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromA new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages from
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 

Mais de EditorIJAERD

Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...EditorIJAERD
 
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...EditorIJAERD
 
The sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regressionThe sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regressionEditorIJAERD
 
Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...EditorIJAERD
 
Runoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershedRunoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershedEditorIJAERD
 
Performance improvement of ofdm
Performance improvement of ofdmPerformance improvement of ofdm
Performance improvement of ofdmEditorIJAERD
 
Soil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learningSoil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learningEditorIJAERD
 
Ik analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulatorIk analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulatorEditorIJAERD
 
Trading outlier detection machine learning approach
Trading outlier detection  machine learning approachTrading outlier detection  machine learning approach
Trading outlier detection machine learning approachEditorIJAERD
 
Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...EditorIJAERD
 
Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...EditorIJAERD
 
Capacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment meshCapacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment meshEditorIJAERD
 
Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...EditorIJAERD
 
Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...EditorIJAERD
 
Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...EditorIJAERD
 
Pneumatic Gear System
Pneumatic Gear SystemPneumatic Gear System
Pneumatic Gear SystemEditorIJAERD
 
An Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic ApplicatonsAn Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic ApplicatonsEditorIJAERD
 
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...EditorIJAERD
 
Heart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of thingsHeart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of thingsEditorIJAERD
 

Mais de EditorIJAERD (20)

Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
 
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
 
The sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regressionThe sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regression
 
Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...
 
Runoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershedRunoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershed
 
Performance improvement of ofdm
Performance improvement of ofdmPerformance improvement of ofdm
Performance improvement of ofdm
 
Soil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learningSoil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learning
 
Ik analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulatorIk analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulator
 
Trading outlier detection machine learning approach
Trading outlier detection  machine learning approachTrading outlier detection  machine learning approach
Trading outlier detection machine learning approach
 
Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...
 
Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...
 
Capacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment meshCapacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment mesh
 
Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...
 
Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...
 
Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...
 
Pneumatic Gear System
Pneumatic Gear SystemPneumatic Gear System
Pneumatic Gear System
 
An Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic ApplicatonsAn Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic Applicatons
 
Digital bus pass
Digital bus passDigital bus pass
Digital bus pass
 
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
 
Heart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of thingsHeart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of things
 

Último

List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 

Último (20)

List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 

One time password generation using mathematical random function in sphere space for mid sized applications

  • 1. Scientific Journal of Impact Factor (SJIF) : 3.134 International Journal of Advance Engineering and Research Development @IJAERD-2014, All rights Reserved 150 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 One Time Password Generation Using Mathematical Random Function In Sphere Space For Mid-Sized Applications 1 Ishupreet Kaur, 2 Gargi Narula 1 Computer Science & Engineering Department, SVIET, Patiala, Punjab, 140601, India,kaurishupreet1@gmail.com 2 Computer Science & Engineering Department, SVIET, Patiala, Punjab, 140601, India,garginarula@gmail.com Abstract--The proposed vOTP scheme is designed by keeping the mid-sized online application requires the OTP scheme. The proposed one time password scheme is used to generate the one time password from the spherical space using random function from a larger spherical number space. This technique is useful to generate thousands of unique and unrepeatable OTPs at one point of time. The results have shown that the system can serve a large number of users every minute. The system is capable of serving one user in fraction of seconds, 100 users in 28 seconds and 1000 users in less than 10 minutes. Keywords—one time password, random function, sphere space, phishing attack , multiple ID generation attack. I. INTRODUCTION The One Time password is unique value which can be used for one transaction only. Once it is used it becomes outdated. One Time Password can be generated Time Based and Event Based. It is used to prevent our systemfrom unauthorized access and harmful attacks. Similarly, One Time Password can also be used to prevent against botnet attacks. Botnet attacks are the attacks in which the bot programs are installed on users system without its prior knowledge. This bot attack can be a snooping attack or a key logger attack. Now, whenever a OTP is used for authentication purpose, it can be a text or graphic based. Because we are using OTP against Botnet/Autobot, we will be using graphics based OTP. As bot programs which are available can detect the text-based passwords but they cannot recognize graphics. A text based OTP is generated using a random generator function which is later converted to graphics based password. One Time Password can be delivered to the user using many ways like mobile phone, e-mail, etc. The Basic Idea of this scheme is to generate a One Time Password for authentication purpose and each time the one time password generated should be unique. The one time password adds another layer of security to login process used widely over internet for authentication. One time password can be generated using spherical random function which has a large amount of number and can produce unique combinations. Spherical random function is capable of generating more unique combinations of integers than any other mathematical random function. Then the random is uniquely selected among the sphere matrix, which creates more unique passwords. Then the integer based password is converted into image hardens the security layer of the mobile/SMS based authentication environments. The visual form of OTP increase the security of the authentication process and protect passwords against interception attacks, the concept of one-time visual passwords (OTVP) is proposed. The OTVP concept takes advantage of the differences between computer encoding of data and the human visual perception of images. Here, we have taken a Client and Server based architecture. In this, a authentication request is made by client to server. And server will send a text based password to client. Further, the text based password is converted to graphic based password. If the recipient is actually a human being, then a human can recognize the graphic and get authenticated. But if it is a Autobot or botnet, then it cannot recognize the password received and authentication is failed. The graphics based password can be delivered to client using MMS, watsapp or email. Therefore, the given mechanism can be used for authentication purpose in online portals where Autobot are using users identification for login purpose without their consent. Then the bots can steal important information or can have financial gains. So it is better to use graphics based one time password to prevent from autobots or botnet problems. II. LITERATURE REVIEW R.R.Karthiga and associates have proposed an OTP generation technique to minimize the damage by phishing and spyware attacks. The OTP is used to authenticate the clients to protect the server from unauthorized access using the long-termpublic
  • 2. International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2014, All rights Reserved 151 keys and digital certificates. Ahmad Alamgir Khan et al. have discussed the phishing attack used by cyber criminals to steal the user’s personal information, credit card or debit card information in detail. The authors have also proposed the security mechanism against phishing attacks. The proposed approach is based on the OTP retrieval using SMS or email systems., which are submitted by the users to the server and server reverts the decision logic after inspection. The OTP is used an encrypted token in very smart way to tackle the phishing attack problem. Andrew Y. Lindell et al have performed the comparison of two approaches of the OTP: time-based OTP and event-based OTP. They have provided the usability and security comparison of both of these one time password techniques. Both of the techniques compared under this comparison uses cryptographic mechanism. Mihai Ordean and his research associates have conducted the performance analysis of security and usability of authentication systems based on components. They have introduced the one-time visual authentication (OTVP) concept which in real is representing a novel approach to the security of authentication interfaces that combines one-time passwords (OTPs) with visual authentication interfaces III. EXPERIMENTAL DESIGN The major task of the proposed system is to create the one time password based on the random sphere value space to authenticate the users to avoid various cyber attacks like phishing attack. The one time password generation scheme must be able to produce a larger space of unique passwords so that it can be used to authenticate multiple users at one time without any duplicity. The OTP adds an extra security layer to protect the user login. The OTPs are widely used over internet for authentication.OTP generation is using values in the sphere space based random number generation system for large density users at once. Cubic random function provides the capability of larger number of random number combinations. The OTP generation initially generates the matrix of million values. The different numbers of values are randomly selected among the million values generated earlier and concatenates them to make an OTP. Then the complex number is converted into integer based password is converted into image using visual encoding makes it more secure and send it via mobile/SMS based authentication environments. Algorithm: OTP Generation Algorithm Step 1: Sphere Random Function to generate random number A. Initialization of the random number generator and calculate the angle of elevation in the sphere. Sphere contains values in open interval, , but not uniformly distributed. B. Creation of the angle of azimuth for each sphere point on the basis of uniformly distributed in the open interval, C. Compute radius value for each point based on open interval, not uniformly distributed. D. Rearrange and concatenate the random matrix values and return OTP. Step 2: Visual encoding A. Break OTP into list of characters B. Convert each character to ASCII value C. Fetch the visual code/encode for ASCII value for each character in the list D. Concatenate the visual encoding of all characters to form an image and Return vOTP Step 3: Client/Server Communication A. Server send the vOTP to client system using SMS or MMS or Other-App. B. Client submits the OTP to server on web portal C. Server verifies the replied OTP and return the decision logic IV. RESULT ANALYSIS
  • 3. International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2014, All rights Reserved 152 The experimental design has been developed using MATLAB simulator and the results have been observed and analyzed deeply. The OTP generation procedure is using multi-level random value generation from the sphere, and further concatenated in uneven fashion to produce the unique one time password every-time. One time password generation process is flexible and unique to produce the unique one time passwords at one point of time to reduce the possibility of two users receiving the same password at one point of time. This random one time password generation framework can used with medium or smaller sized web or utility based portals. This sequence will be able to handle thousands to tens of thousands of users at one point of time. The uniqueness calculation has shown that this OTP framework is capable of handing flexible number of unique OTP at one point of time with minor changes in the program sequence. The framework simulation is designed to generate the one time password which is followed by visual encoding to produce one time image password (OTIP). OTIP is then forwarded to the client side, where client enters the password the OTP input box and submit the information to the server side. The server then verifies the original OTP with the generated OTP and returns the decision logic, which is further used to take the programmed action in the software architecture according to the decision logic. The OTP send by the Client to Server is compared with the OTP generated and saved at the Server. If the both the OTPs are same, then the OTP is verified and the access is granted. Rotation Size Time in Seconds 1 0.23 10 2.63 50 12.69 100 28.71 200 61.14 500 190.53 1000 505.43 Table 1: The Time (in seconds) to Rotations size comparison table Figure 1- The Server Graphical Interface
  • 4. International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2014, All rights Reserved 153 Figure 2- Generate One Time Password Figure 3- Convert Integers into Image Based Password and forward to client Figure 4- The user retrieve the vOTP and submit the OTP to the server. Figure 8- The OTP Verification The OTP send by the Client to Server is compared with the OTP generated and saved at the Server. If the both the OTPs are same, then the OTP is verified and the access is granted.
  • 5. International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 8, August -2014, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2014, All rights Reserved 154 V. CONCLUSION AND FUTURE WORK The proposed vOTP scheme is a scheme is capable of producing a large number of unique word in one time space to facilitate its implementation with mid-sized user authentication applications. The proposed OTP scheme generates the password from the cubic value space using random number selection function from a larger possible numbers in the space. This technique is useful to produce thousands of unique OTPs at one point of time. The results have shown that the system can serve a large number of users every minute. The systemis capable of serving one user in fraction of seconds, 100 users in 28 seconds and 1000 users in less than 10 minutes. In future this scheme can be enhanced using the dizzy images scheme, which also protect against the botnets/autobots with image processing or optical character recognition capability. Also this scheme can be enhanced to produce alphanumeric passwords and can be used with existing or improved v isual encoding scheme. REFERENCES [1] R.R.Karthiga, 2013.“One-time Password: A Survey”, International Journal of Emerging Trends in Engineering and Development Issue 3, Vol.1, pp. 613-623. [2] Ahmad Alamgir Khan, 2013. “Preventing Phishing Attacks using One Time Password and User Machine Identification”, International Journal of Computer Applications (0975 – 8887) Volume 68– No.3. [3] Indu S., Sathya T.N., Saravana Kumar V., 2013“ A Stsnd-alone and SMS-Based approach for Authentication using Mobile Phone”, IEEE-International Conference on Information Communication and Embedded. [4] Andrew Y. Lindell, 2007.“Time versus Event Based One-Time Passwords”, Aladdin Knowledge Systems. [5] Soonduck Yoo1 , Seung-jung Shin1, Dae-hyun Ryu1, 2013. “An effective Two Factor Authentication Method using QR code”, ISA 2013, ASTL Vol. 21, pp. 106- 109, © SERSC 2013. [6] www.ietf.org [7] Bin Li, Shaohai Hu, Yunyan Liu, 2006.“A Practical One-Time Password Authentication Implement on Internet”, ICWMMN Proceedings. [8] Ping Wang, Lei Wu, Baber Aslam and Cliff C. Zou, 2009. “ A Systematic Study on Peer-To-Botnets”, International Conference on Computer Communications and Networks, 2009. ICCCN 2009. San Francisco, CA, IEEE. [9] Yu tao, Fan, Gui ping, Su, 2009.“Design of Two-Way One-Time-Password Authentication Scheme Based On True Random Numbers”, Second International Workshop on Computer Science and Engineering, pp. 611-614. [10] Jivika Govil, 2007. “Examining the Criminology of Bot Zoo”, IEEE. [11] Mihai Ordean, 2012. “Secure Authentication Using One Time Visual Password”, Ph.D. Dissertation, The technical university of Cluj-Napoca. [12] Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng, and Jingyuan Zhang, 2009.” Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures”, Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2009,11 pages doi:10.1155/2009/692654 [13] Julian B. Grizzard, Vikram Sharma, Chris Nunnery,and Brent Byung Hoon Kang, David Dagon, 2007, “Peer-To-Peer Botnets: Overview and Case Study”. HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association Berkeley, CA, USA. [14] Abebe Tesfahun and D.Lalitha Bhaskari, 2013. “Botnet Detection and Countermeasures - A Survey”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 4, ISSN 2278-6856. [15] Takasuke TSUJI, 2003. “A One-Time Password Authentication Method”, Kochi University of Technology. [16] Márk Jelasity, Vilmos Bilicki, 2009. “Towards Automated Detection of Peer-To-Peer Botnets: On the Limits of Local Approach”, Hungary, www.usenix.org [17] S. Behal, A. S. Brar, and K. Kumar, “Signature based Botnet Detection and Prevention”, ISCET, pp. 122-127, 2010.