SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1643
MULTISHARING DATA USING OTP
Ashwini Sukre1, Saher Fakih2, Shradha Shende3, Rupali Tate4, Sneha Bendale5
1,2,3,4,5 Department of Computer Engineering, Terna Engineering College,Mumbai University,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Online and Enterprise resourcestypicallyrequired
authentication before user allow to access the sensitive
applications and information. Sensitive information generally
contains user personal information, transactions, confidential
data, etc. Traditional user authentication system used user
identifier, Password, Personal Identification Number (PIN),
Token code etc. These Systems can't fulfill the current
requirement of the user authentication. So that most of the
system used multilevel and multifactor authentication
mechanism to allow authorized user to get accessthesensitive
application and information. Recently such multilevel and
multifactor security is provided using Risk Based
Authentication (RBA) mechanism. The RBA provides access
based on Enforcement policy and access decision based on the
risk score. Due to which RBA mechanism provides a more
secure way to access the sensitive application andinformation
by the user. In this paper, we will propose RBA mechanism
based on User’s machine specific authentication information
generate OTP using algorithm i.e. sha256 and md5.In our
project during OTP generation no Network present that is
more secured than other system.
Key Words: Multisharing, OTP Generation,
Authentication, Android, SHA256, MD5
1. INTRODUCTION
Smartphones and tablets are quickly becoming the most
ubiquitous general purpose computers in the world.
Collaborative workers need to be able to share content and
applications from their mobile devices on large shared
displays. Need for securing the data over the internet is
increasing. Authentication is the heart of every security
model. Password based authentication is the most often
utilized and trusted authentication mechanism. User
authentication is often achieved by utilizingasingle-factoror
two-factor authentication technique basedonsomethingthe
user knows, i.e., a static password, and something the user
has, i.e., an OTP. The major advantage of involving a mobile
phone is that most users already have mobile phones, and
therefore no extra hardware token needs to be bought,
deployed, or supported. Hacking the web applicationservers
is also complicated as compared to getting accessto theuser
system in parliamentary procedure to steal data. Hence,
attacks normally happen at the user terminal.Themajorgoal
of net security is to prevent unauthorized access to data and
resources. Various cryptographic techniques are applied by
clients and servers to keep the confidentiality of data.
2. LITERATURE SURVEY
2.1 QR Code Based Secure OTP
OTP are used to provide higher layer of security over static
passwords that are prone to replay attacks. Distribution of
OTPs to concerned user is a major issue. Short message
service that is available for mobile phones is the most
common methodology for OTP distribution. Quick Response
code (QR code) is actually two dimensionalbarcodesandcan
store information in both length and breath. QR codes are
widely being used to convey short information such as
website address, mobile numbers etc. In this paper we are
presenting a new authentication scheme for secure OTP
distribution in net banking through QR codes and email. [2]
2.2 Authentication Using TLS And Offline OTP
The proposed framework will utilize a pre-shared phone
number and MAC address of the device along with the
current timestamp (PMT), requiredtogenerateTOTP(Time-
Based One time Password) in order to generate an offline
secret hash code using offline token generation mobile app.
The generated hash code is entered by the user on the
website and transferred to the server using TLS (Transport
Layer Security) connection established between server and
user system. It also does away with the usage of SMS based
OTP applications which are strung-outonthecellularnet.[1]
2.3 Two Factor Authentication Using Smartphone
The two factor authentication implemented using SMS OTP
or OTP generated by Smartphone- One Time Password to
secure user accounts. The proposed method guarantees
authenticating online banking features are secured also this
method can be useful for e-shopping & ATM machines. The
proposed system involves generating and delivering a One
Time Password to mobile phone. Smartphone can beusedas
token for creating OTP or OTP can be send to mobile phone
in form of SMS. The generated OTP is valid for only for short
period of time and it is generated and verified using Secured
Cryptographic Algorithm. [3]
2.4 Device Registration and Dynamic QR code based
OTP Generation
Traditional user authentication system used user identifier,
Password, Personal IdentificationNumber(PIN),Tokencode
etc. These Systems can't fulfill the currentrequirementofthe
user authentication. So that most of the system used
multilevel and multifactor authentication mechanism to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1644
allow authorized user to get access the sensitive application
and information. The RBA provides access based on
Enforcement policy and access decision based on the risk
score. Due to which RBA mechanism providesa moresecure
way to access the sensitive application and information by
the user. [6]
3. Existing System
Some works have proposed computation modelsfortrustby
incorporating the concept of risk. Like trust, reputation has
also been studied extensively. No work addresses the issue
of selecting trustworthy service provider in server
marketplace. Estimation of risk of outsourcing a business
onto third-party server has not been handled in reported
works. Models proposed in reported works lack
experimentation and analysis. In the Existing systemcannot
provide any password therefore not secure.
3.1 Disadvantages of Existing system
 By sharing storage and networks with many other
users/customers it is possible for other customers
to access your data
 Single point of failure can occur during logging into
websites.
 The authenticity is limited to known or managed
laptops/desktops.
 We need to monitor application upgrades and
changes.
 It has the lowest level of security.
 Unavailability of service due to low signal strength
and coverage area.
 Unavailability of device as user needs to have the
device physically present during the login process.
4. PROPOSED SYSTEM
All User registers on the website via mobile app. The
parameters during registration phase are username,
password, security question Using Android’spermission,the
mobile app reads and sendsthe IMEI and IMSInumbertothe
server. Server receives all the input data and creates an
account for the users. Server will display the above input
data on the mobile app which wasused to create an account.
Server will concatenate IMEI, IMSI to generate a seed. Users
will now request login into website using username and
password. Server will validate the input data and create a
secure SSL session. Server will randomly generate and
display 2 index variables (x, y) and send them to the client.
The server will use the same variables to generate a server
sided OTP from seed using nested hashing functions or a
hash chain. User will input the server generated 2 index
variables (x, y) in the mobile app’s OTP Section. The mobile
app will generate a client sided OTP using nested hashing
functions from the seed. User will now enter the client sided
OTP in the browser. Server will now compare its own
generated OTP and client sided OTP. If equal, then start the
downloading the file.
4.1 Advantages of Proposed system
 The data is less prone to snooping and Man-In-The-
Middle Attacks.
 The system makes use of nested hash chaining,
overcomes the problem of hashing collision.
 The mobile app is fully independent of SMS channel
and internet channel for OTP generation.
 The system can resist offline guessing because it
uses strong passwords and hash functions.
 This scheme uses forward hashing techniques,
which eliminatessmall challenge attackcompletely.
5. ALGORITHMS
5.1 SHA-256 Algorithm
(Figure 1.1)
Step 1: Append Padding Bits
Message is “padded” with a 1 and as many 0’s asnecessaryto
bring the message length to 512 bits fewer than an even
multiple of 512.
Step 2: Append Length
64 bits are appended to the end of the padded message.
These bits hold the binary format of 64 bits indicating the
length of the original message.
Step 3: Prepare Processing Functions
Each step t (0 ≤ t ≤ 63): Word expansion for Wt
If t < 16
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1645
Wt = tth 32-bit word of Mj
If 16 ≤ t ≤ 63
S0 = (Wt-15 rightrotate 7) (Wt-15 rightrotate 18) (Wt-15
rightshift 3)
S1 = (Wt-2 rightrotate 17) (Wt-2 rightrotate 19) (Wt-2
rightshift 10)
Wt = Wt-16 + S0 + Wt-7 + S1
Each step t (0 ≤ t ≤ 63):S0 = (A rightrotate 2) (A rightrotate
13) (A rightrotate 22)
maj = (A ^ B) (A ^ B) (B ^ C)
t2 = S0 + maj
S1 = (E rightrotate 6) (E rightrotate 11) (E rightrotate 25)
ch = (E ^ F) (( E) ^ G)
t1 = H + S1 + ch + Kt + Wt
(A, B, C, D, E, F, G, H) = (t1 + t2, A, B, C, D + t1, E, F, G)
Step 4: Prepare Processing Constants
SHA1 requires 64 processing constant words defined as:
K(t) = 0x5A827999
( 0 <= t <= 9)
K(t) = 0x6ED9EBA1 (20 <= t
<= 29)
K(t) = 0x8F1BBCDC (40 <= t
<= 49)
K(t) = 0xCA62C1D6 (60 <= t
<= 63)
Step 5: Initialize Buffers
Finally, when all 64 steps have been processed, set
H0 = H0 + A
H1 = H1 + B
H2 = H2 + C
H3 = H3 + D
H4 = H4 + E
H5 = H5 + F
H6 = H6 + G
H7 = H7 + H
Step 6: Processing Message in 512-bit blocks(Lblocksin
total message)
This is the main task of SHA1 algorithm which loopsthrough
the padded and appended message in 512-bit blocks. When
all Mj have been processed, the 256-bit hash of M isavailable
in H0, H1, H2, H3, H4, H5, H6, and H7.
Step 7: Pseudo Code
For loop on k = 1 to L
(W(0),W(1),...,W(15)) = M[k] /* DivideM[k]into16words*/
For t = 16 to 79 do:
W(t) = (W(t-3) XOR W(t-8) XOR W(t-14)XORW(t-16))<<<1
A = H0, B = H1, C = H2, D = H3, E = H4
For t = 0 to 63 do:
TEMP = A<<<5 + f(t;B,C,D) + E + W(t) + K(t) E = D, D = C,
C = B<<<30, B = A, A = TEMP
End of for loop
H0 = H0 + A, H1 = H1 + B, H2 = H2 + C, H3 = H3 + D, H4 = H4
+ E
End of for loop
End of for loop
Step 8: Output H0, H1, H2, H3, H4, H5, H6, and H7: Word
buffers with final message digest.
5.2 MD5 Algorithm
(Figure 1.2)
Step 1 : Append padded bits:
- The message is padded so that its length is congruent to
448, modulo 512.
- Means extended to just 64 bitsshy of being of 512 bitslong.
– A single “1” bit is appended to the message, and then “0”
bits are appended so that the length in bits equals 448
modulo 512.
Step 2 : Append length:
– A 64 bit representation of b is appended to the result ofthe
previous step.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1646
– The resulting message hasa length that is anexactmultiple
of 512 bits.
Step 3 : Initialize MD Buffer
- A four-word buffer (A,B,C,D) is used to compute the
message digest.
– Here each of A,B,C,D, is a 32 bit register
- These registers are initialized to the following values in
hexadecimal:
word A: 01 23 45 67
word B: 89 ab cd ef
word C: fe dc ba 98
word D: 76 54 32 10
Step 4 : Process message in 16-word blocks.
– Four auxiliary functions that take as input three 32-bit
words and produce as output one 32-bit word.
F(X,Y,Z) = XY v not(X) Z
G(X,Y,Z) = XZ v Y not(Z)
H(X,Y,Z) = X xor Y xor Z
I(X,Y,Z) = Y xor (X v not(Z))
- if the bits of X, Y, and Z are independent and unbiased, the
each bit of F(X,Y,Z), G(X,Y,Z), H(X,Y,Z), and I(X,Y,Z) will be
independent and unbiased.
Step 5 : Output
– The message digest produced as output is A, B, C, D.
– That is, output beginswith the low-order byteofA,andend
with the high-order byte of D.
6. IMPLEMENTION
Figure 1.3: Registration And Login Page
Figure 1.4: Authentication Page
Figure 1.5: Home Page
Figure 1.6: File Sharing Page
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1647
7. CONCLUSIONS
Data sharing opportunities must be carefully considered in
the design of many-core chips targeting multi-threaded
workloads. Generate a hash known as the one-time identity
token to successfully authenticate the user attempting to
access the services offered by the network host. Unlike SMS
and location based the OTP for authenticating the user.
It never transmits the pre-shared number and theaddressof
the device during the token generation process. server is
only shared once through the channel at the time of
application registration on token server, thus making the
intruder difficult to guess and the number can also be
modified by the user. The technique can easily be
implemented in a vast number of applications involving
multi-sharing authentication security. In future, the factor
required to identify and authenticate the deviceandusercan
be improved to enhance the security level.
REFERENCES
[1] Vishal Gangwar, Ravishankar, Dr Ashish kr. Luhach,”
Mobile based Secure Authentication Using TLS and
offline otp.” IJCTA, International Science Press pp.5253-
5262
[2] Abhas Tandon, Rahul Sharma, Sankalp Sodhiya, P.M.
Durai Raj Vincent,”QR code based Secure OTP
distribution scheme for AuthenticationinNet-banking.”
IJET, International Journal of Engineering and
Technology.
[3] Sagar Acharya, Apoorva Polawar, P.Y.par,”Two Factor
Authentication Using Smartphone.” IOSR Journal of
Computer Engineering(IOSR-JCE), e-ISSN:2278-0661,p-
ISSN:2278-8727
[4] B. Ross, C. Jackson, N. Miyake, D. Boneh, J.C. Mitchell,
"Stronger password authentication using browser
extensions." Proceedings of the 14th Usenix Security
Symposium. 2005.
[5] Bauckman, Dena, Terry, Nigel, Paul, Johnson, David,
Joseph, Robertson, “Multi-Factor Authentication.” U.S.
Patent No. 20,130,055,368. 28 Feb. 2013.
[6] Deepak R. Thorat1 , Sheetal S. Sonawane2 “Risk Based
Multilevel and Multifactor Authentication using Device
Registration and Dynamic QR code based OTP
Generation.” InternationalJournalofAdvancedResearch
in Computer and Communication Engineering Vol. 3,
Issue 10, October 2014
[7] Weber, Frank, “Multi-factor authentication.” U.S. Patent
No.7, 770, 002, 3 Aug. 2010.
[8] S. Patil, K. Bhagat, S. Bhosale, M. Deshmukh,
“Intensification of security in 2-factor biometric
authentication system.” Pervasive Computing (ICPC),
International Conference, pp. 1-4, IEEE. 2015.
[9] A.P. Sabzevar, A. Stavrou, "Universal multi-factor
authentication using graphicalpasswords,"SignalImage
Technology and Internet Based Systems. SITIS'08. IEEE
International Conference, pp. 625-632, IEEE. 2008.
[10] S. Indu, T.N. Sathya, V.S. Kumar, “A stand-aloneandSMS-
based approach for authentication using mobilephone.”
In Information Communication and Embedded Systems
(ICICES), International Conference, pp. 140-145, IEEE.
2013.
[11] W.B. Hsieh., J.S. Leu, “Design of a time and locationbased
One-Time Password authenticationscheme.”InWireless
Communications and Mobile Computing Conference
(IWCMC), 7th International, pp. 201-206, IEEE. 2011.

Mais conteúdo relacionado

Mais procurados

Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCIRJET Journal
 
IRJET- Stability Analysis and Controlling MITM Attack in Dynamic Network
IRJET- Stability Analysis and Controlling MITM Attack in Dynamic NetworkIRJET- Stability Analysis and Controlling MITM Attack in Dynamic Network
IRJET- Stability Analysis and Controlling MITM Attack in Dynamic NetworkIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure loginIRJET Journal
 
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 

Mais procurados (20)

Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
I44084954
I44084954I44084954
I44084954
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET- Stability Analysis and Controlling MITM Attack in Dynamic Network
IRJET- Stability Analysis and Controlling MITM Attack in Dynamic NetworkIRJET- Stability Analysis and Controlling MITM Attack in Dynamic Network
IRJET- Stability Analysis and Controlling MITM Attack in Dynamic Network
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with Dealership
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 

Semelhante a IRJET- Multi sharing Data using OTP

IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe RegionIRJET Journal
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 

Semelhante a IRJET- Multi sharing Data using OTP (20)

IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 

Último (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

IRJET- Multi sharing Data using OTP

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1643 MULTISHARING DATA USING OTP Ashwini Sukre1, Saher Fakih2, Shradha Shende3, Rupali Tate4, Sneha Bendale5 1,2,3,4,5 Department of Computer Engineering, Terna Engineering College,Mumbai University,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Online and Enterprise resourcestypicallyrequired authentication before user allow to access the sensitive applications and information. Sensitive information generally contains user personal information, transactions, confidential data, etc. Traditional user authentication system used user identifier, Password, Personal Identification Number (PIN), Token code etc. These Systems can't fulfill the current requirement of the user authentication. So that most of the system used multilevel and multifactor authentication mechanism to allow authorized user to get accessthesensitive application and information. Recently such multilevel and multifactor security is provided using Risk Based Authentication (RBA) mechanism. The RBA provides access based on Enforcement policy and access decision based on the risk score. Due to which RBA mechanism provides a more secure way to access the sensitive application andinformation by the user. In this paper, we will propose RBA mechanism based on User’s machine specific authentication information generate OTP using algorithm i.e. sha256 and md5.In our project during OTP generation no Network present that is more secured than other system. Key Words: Multisharing, OTP Generation, Authentication, Android, SHA256, MD5 1. INTRODUCTION Smartphones and tablets are quickly becoming the most ubiquitous general purpose computers in the world. Collaborative workers need to be able to share content and applications from their mobile devices on large shared displays. Need for securing the data over the internet is increasing. Authentication is the heart of every security model. Password based authentication is the most often utilized and trusted authentication mechanism. User authentication is often achieved by utilizingasingle-factoror two-factor authentication technique basedonsomethingthe user knows, i.e., a static password, and something the user has, i.e., an OTP. The major advantage of involving a mobile phone is that most users already have mobile phones, and therefore no extra hardware token needs to be bought, deployed, or supported. Hacking the web applicationservers is also complicated as compared to getting accessto theuser system in parliamentary procedure to steal data. Hence, attacks normally happen at the user terminal.Themajorgoal of net security is to prevent unauthorized access to data and resources. Various cryptographic techniques are applied by clients and servers to keep the confidentiality of data. 2. LITERATURE SURVEY 2.1 QR Code Based Secure OTP OTP are used to provide higher layer of security over static passwords that are prone to replay attacks. Distribution of OTPs to concerned user is a major issue. Short message service that is available for mobile phones is the most common methodology for OTP distribution. Quick Response code (QR code) is actually two dimensionalbarcodesandcan store information in both length and breath. QR codes are widely being used to convey short information such as website address, mobile numbers etc. In this paper we are presenting a new authentication scheme for secure OTP distribution in net banking through QR codes and email. [2] 2.2 Authentication Using TLS And Offline OTP The proposed framework will utilize a pre-shared phone number and MAC address of the device along with the current timestamp (PMT), requiredtogenerateTOTP(Time- Based One time Password) in order to generate an offline secret hash code using offline token generation mobile app. The generated hash code is entered by the user on the website and transferred to the server using TLS (Transport Layer Security) connection established between server and user system. It also does away with the usage of SMS based OTP applications which are strung-outonthecellularnet.[1] 2.3 Two Factor Authentication Using Smartphone The two factor authentication implemented using SMS OTP or OTP generated by Smartphone- One Time Password to secure user accounts. The proposed method guarantees authenticating online banking features are secured also this method can be useful for e-shopping & ATM machines. The proposed system involves generating and delivering a One Time Password to mobile phone. Smartphone can beusedas token for creating OTP or OTP can be send to mobile phone in form of SMS. The generated OTP is valid for only for short period of time and it is generated and verified using Secured Cryptographic Algorithm. [3] 2.4 Device Registration and Dynamic QR code based OTP Generation Traditional user authentication system used user identifier, Password, Personal IdentificationNumber(PIN),Tokencode etc. These Systems can't fulfill the currentrequirementofthe user authentication. So that most of the system used multilevel and multifactor authentication mechanism to
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1644 allow authorized user to get access the sensitive application and information. The RBA provides access based on Enforcement policy and access decision based on the risk score. Due to which RBA mechanism providesa moresecure way to access the sensitive application and information by the user. [6] 3. Existing System Some works have proposed computation modelsfortrustby incorporating the concept of risk. Like trust, reputation has also been studied extensively. No work addresses the issue of selecting trustworthy service provider in server marketplace. Estimation of risk of outsourcing a business onto third-party server has not been handled in reported works. Models proposed in reported works lack experimentation and analysis. In the Existing systemcannot provide any password therefore not secure. 3.1 Disadvantages of Existing system  By sharing storage and networks with many other users/customers it is possible for other customers to access your data  Single point of failure can occur during logging into websites.  The authenticity is limited to known or managed laptops/desktops.  We need to monitor application upgrades and changes.  It has the lowest level of security.  Unavailability of service due to low signal strength and coverage area.  Unavailability of device as user needs to have the device physically present during the login process. 4. PROPOSED SYSTEM All User registers on the website via mobile app. The parameters during registration phase are username, password, security question Using Android’spermission,the mobile app reads and sendsthe IMEI and IMSInumbertothe server. Server receives all the input data and creates an account for the users. Server will display the above input data on the mobile app which wasused to create an account. Server will concatenate IMEI, IMSI to generate a seed. Users will now request login into website using username and password. Server will validate the input data and create a secure SSL session. Server will randomly generate and display 2 index variables (x, y) and send them to the client. The server will use the same variables to generate a server sided OTP from seed using nested hashing functions or a hash chain. User will input the server generated 2 index variables (x, y) in the mobile app’s OTP Section. The mobile app will generate a client sided OTP using nested hashing functions from the seed. User will now enter the client sided OTP in the browser. Server will now compare its own generated OTP and client sided OTP. If equal, then start the downloading the file. 4.1 Advantages of Proposed system  The data is less prone to snooping and Man-In-The- Middle Attacks.  The system makes use of nested hash chaining, overcomes the problem of hashing collision.  The mobile app is fully independent of SMS channel and internet channel for OTP generation.  The system can resist offline guessing because it uses strong passwords and hash functions.  This scheme uses forward hashing techniques, which eliminatessmall challenge attackcompletely. 5. ALGORITHMS 5.1 SHA-256 Algorithm (Figure 1.1) Step 1: Append Padding Bits Message is “padded” with a 1 and as many 0’s asnecessaryto bring the message length to 512 bits fewer than an even multiple of 512. Step 2: Append Length 64 bits are appended to the end of the padded message. These bits hold the binary format of 64 bits indicating the length of the original message. Step 3: Prepare Processing Functions Each step t (0 ≤ t ≤ 63): Word expansion for Wt If t < 16
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1645 Wt = tth 32-bit word of Mj If 16 ≤ t ≤ 63 S0 = (Wt-15 rightrotate 7) (Wt-15 rightrotate 18) (Wt-15 rightshift 3) S1 = (Wt-2 rightrotate 17) (Wt-2 rightrotate 19) (Wt-2 rightshift 10) Wt = Wt-16 + S0 + Wt-7 + S1 Each step t (0 ≤ t ≤ 63):S0 = (A rightrotate 2) (A rightrotate 13) (A rightrotate 22) maj = (A ^ B) (A ^ B) (B ^ C) t2 = S0 + maj S1 = (E rightrotate 6) (E rightrotate 11) (E rightrotate 25) ch = (E ^ F) (( E) ^ G) t1 = H + S1 + ch + Kt + Wt (A, B, C, D, E, F, G, H) = (t1 + t2, A, B, C, D + t1, E, F, G) Step 4: Prepare Processing Constants SHA1 requires 64 processing constant words defined as: K(t) = 0x5A827999 ( 0 <= t <= 9) K(t) = 0x6ED9EBA1 (20 <= t <= 29) K(t) = 0x8F1BBCDC (40 <= t <= 49) K(t) = 0xCA62C1D6 (60 <= t <= 63) Step 5: Initialize Buffers Finally, when all 64 steps have been processed, set H0 = H0 + A H1 = H1 + B H2 = H2 + C H3 = H3 + D H4 = H4 + E H5 = H5 + F H6 = H6 + G H7 = H7 + H Step 6: Processing Message in 512-bit blocks(Lblocksin total message) This is the main task of SHA1 algorithm which loopsthrough the padded and appended message in 512-bit blocks. When all Mj have been processed, the 256-bit hash of M isavailable in H0, H1, H2, H3, H4, H5, H6, and H7. Step 7: Pseudo Code For loop on k = 1 to L (W(0),W(1),...,W(15)) = M[k] /* DivideM[k]into16words*/ For t = 16 to 79 do: W(t) = (W(t-3) XOR W(t-8) XOR W(t-14)XORW(t-16))<<<1 A = H0, B = H1, C = H2, D = H3, E = H4 For t = 0 to 63 do: TEMP = A<<<5 + f(t;B,C,D) + E + W(t) + K(t) E = D, D = C, C = B<<<30, B = A, A = TEMP End of for loop H0 = H0 + A, H1 = H1 + B, H2 = H2 + C, H3 = H3 + D, H4 = H4 + E End of for loop End of for loop Step 8: Output H0, H1, H2, H3, H4, H5, H6, and H7: Word buffers with final message digest. 5.2 MD5 Algorithm (Figure 1.2) Step 1 : Append padded bits: - The message is padded so that its length is congruent to 448, modulo 512. - Means extended to just 64 bitsshy of being of 512 bitslong. – A single “1” bit is appended to the message, and then “0” bits are appended so that the length in bits equals 448 modulo 512. Step 2 : Append length: – A 64 bit representation of b is appended to the result ofthe previous step.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1646 – The resulting message hasa length that is anexactmultiple of 512 bits. Step 3 : Initialize MD Buffer - A four-word buffer (A,B,C,D) is used to compute the message digest. – Here each of A,B,C,D, is a 32 bit register - These registers are initialized to the following values in hexadecimal: word A: 01 23 45 67 word B: 89 ab cd ef word C: fe dc ba 98 word D: 76 54 32 10 Step 4 : Process message in 16-word blocks. – Four auxiliary functions that take as input three 32-bit words and produce as output one 32-bit word. F(X,Y,Z) = XY v not(X) Z G(X,Y,Z) = XZ v Y not(Z) H(X,Y,Z) = X xor Y xor Z I(X,Y,Z) = Y xor (X v not(Z)) - if the bits of X, Y, and Z are independent and unbiased, the each bit of F(X,Y,Z), G(X,Y,Z), H(X,Y,Z), and I(X,Y,Z) will be independent and unbiased. Step 5 : Output – The message digest produced as output is A, B, C, D. – That is, output beginswith the low-order byteofA,andend with the high-order byte of D. 6. IMPLEMENTION Figure 1.3: Registration And Login Page Figure 1.4: Authentication Page Figure 1.5: Home Page Figure 1.6: File Sharing Page
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1647 7. CONCLUSIONS Data sharing opportunities must be carefully considered in the design of many-core chips targeting multi-threaded workloads. Generate a hash known as the one-time identity token to successfully authenticate the user attempting to access the services offered by the network host. Unlike SMS and location based the OTP for authenticating the user. It never transmits the pre-shared number and theaddressof the device during the token generation process. server is only shared once through the channel at the time of application registration on token server, thus making the intruder difficult to guess and the number can also be modified by the user. The technique can easily be implemented in a vast number of applications involving multi-sharing authentication security. In future, the factor required to identify and authenticate the deviceandusercan be improved to enhance the security level. REFERENCES [1] Vishal Gangwar, Ravishankar, Dr Ashish kr. Luhach,” Mobile based Secure Authentication Using TLS and offline otp.” IJCTA, International Science Press pp.5253- 5262 [2] Abhas Tandon, Rahul Sharma, Sankalp Sodhiya, P.M. Durai Raj Vincent,”QR code based Secure OTP distribution scheme for AuthenticationinNet-banking.” IJET, International Journal of Engineering and Technology. [3] Sagar Acharya, Apoorva Polawar, P.Y.par,”Two Factor Authentication Using Smartphone.” IOSR Journal of Computer Engineering(IOSR-JCE), e-ISSN:2278-0661,p- ISSN:2278-8727 [4] B. Ross, C. Jackson, N. Miyake, D. Boneh, J.C. Mitchell, "Stronger password authentication using browser extensions." Proceedings of the 14th Usenix Security Symposium. 2005. [5] Bauckman, Dena, Terry, Nigel, Paul, Johnson, David, Joseph, Robertson, “Multi-Factor Authentication.” U.S. Patent No. 20,130,055,368. 28 Feb. 2013. [6] Deepak R. Thorat1 , Sheetal S. Sonawane2 “Risk Based Multilevel and Multifactor Authentication using Device Registration and Dynamic QR code based OTP Generation.” InternationalJournalofAdvancedResearch in Computer and Communication Engineering Vol. 3, Issue 10, October 2014 [7] Weber, Frank, “Multi-factor authentication.” U.S. Patent No.7, 770, 002, 3 Aug. 2010. [8] S. Patil, K. Bhagat, S. Bhosale, M. Deshmukh, “Intensification of security in 2-factor biometric authentication system.” Pervasive Computing (ICPC), International Conference, pp. 1-4, IEEE. 2015. [9] A.P. Sabzevar, A. Stavrou, "Universal multi-factor authentication using graphicalpasswords,"SignalImage Technology and Internet Based Systems. SITIS'08. IEEE International Conference, pp. 625-632, IEEE. 2008. [10] S. Indu, T.N. Sathya, V.S. Kumar, “A stand-aloneandSMS- based approach for authentication using mobilephone.” In Information Communication and Embedded Systems (ICICES), International Conference, pp. 140-145, IEEE. 2013. [11] W.B. Hsieh., J.S. Leu, “Design of a time and locationbased One-Time Password authenticationscheme.”InWireless Communications and Mobile Computing Conference (IWCMC), 7th International, pp. 201-206, IEEE. 2011.