際際滷

際際滷Share a Scribd company logo
SECURITY USING FOUR FACTOR PASSWORD AUTHENTICATION



OBJECTIVE:

             The main role of this system is providing more security while accessing the
card. Another one role is to avoid the hackers.



PROBLEM DIFINITION:

             The main problem statement of our existing system is security. The security
level is relatively very low. Another problem found in our existing system is frauds. That
is detection and avidness of hackers is comprehensible. To rectify those problems, we
use four types of security in our proposed system.



ABSTRACT:

      The project entitled as Security Using Four Factor Password Authentication.
In the scheme the remote user does not need to use smart cards. It is convenient for the
users to use a common storage device such as a universal serial bus memory. The scheme
is easy to implement. However, this authentication scheme is vulnerable to impersonation
attacks and middle man attacks. An attacker could impersonate legitimate users to login
and access the remote server. In addition, we analyze the security of Fan-Chan-Zhangs
scheme. The scheme suffers from replay attacks and impersonation attacks.
A password authentication scheme to provide authentication between the users and
the remote server. Since then, many password-based remote user authentication schemes
have been proposed. In a smartcard based password authentication scheme, the smart
card takes the password and Finger print from the users as input, computes the login
message and sends the login message to the server. The server checks the validity of the
users login message. In the mutual authentication situation, not only the server can
verify the user but also a user can verify the server.

The adversary is modeled as follows:

   (a) The adversary can tap the communication channel between the users and the server
      during the login and authentication phase.
   (b) The adversary either can extract the information by obtaining the smart card or can
      get a users password and Finger print. The adversary cannot do both, or the
      adversary can login the server as a legitimate user.



EXISTING SYSTEM

    At present We Are Using Single Card or the Individual Card for the Different
      Banks Like ICICI, AXIS, HDFC, Etc.,
    The Pin Number in the Negative Behind the Card
    There will be a only one PIN Number
DISADVANTAGES:


        Less Security
        Low Performance


PROPOSED SYSTEM

  All The Bank Must Be in the Single Card
  The Pin No is not present in the Negative
  There Will be Three Passwords
  PIN No and Authentication Password, Finger print and USIM card authentication


ADVANTAGES:
        Four Types of Security prediction

        High performance

        Avoid Fraud Authentication

        Secure Transaction

ALGORITHM USED:

          1. Triple DES (Data Encryption Standard)

          2. PCA (Principle Component Analysis)
ARCHITECTURE DIAGRAM:




                        RFID Authentication



                            PIN Code
         USER             Authentication      Process

                            USIM Card
                          Authentication

                           Fingerprint
                          Authentication




SYSTEM REQUIREMENTS:

      Hardware Requirements:

         Intel Pentium IV
         256/512 MB RAM
         1 GB Free disk space or greater
         1 GB on Boot Drive
         1 Network Interface Card (NIC)
Software Requirements:

         MS Windows XP/2000
         MS IE Browser 6.0/later
         MS Dot Net Framework 2.0
         MS Visual Studio.NET 2005
         MS SQL Server 2000
         Language :ASP.Net(VB.NET)



APPLICATIONS:

        1.   Bank

        2.   Military

        3.   Detective Agencies

        4.   Administrative Offices

More Related Content

Psdot 19 four factor password authentication

  • 1. SECURITY USING FOUR FACTOR PASSWORD AUTHENTICATION OBJECTIVE: The main role of this system is providing more security while accessing the card. Another one role is to avoid the hackers. PROBLEM DIFINITION: The main problem statement of our existing system is security. The security level is relatively very low. Another problem found in our existing system is frauds. That is detection and avidness of hackers is comprehensible. To rectify those problems, we use four types of security in our proposed system. ABSTRACT: The project entitled as Security Using Four Factor Password Authentication. In the scheme the remote user does not need to use smart cards. It is convenient for the users to use a common storage device such as a universal serial bus memory. The scheme is easy to implement. However, this authentication scheme is vulnerable to impersonation attacks and middle man attacks. An attacker could impersonate legitimate users to login and access the remote server. In addition, we analyze the security of Fan-Chan-Zhangs scheme. The scheme suffers from replay attacks and impersonation attacks.
  • 2. A password authentication scheme to provide authentication between the users and the remote server. Since then, many password-based remote user authentication schemes have been proposed. In a smartcard based password authentication scheme, the smart card takes the password and Finger print from the users as input, computes the login message and sends the login message to the server. The server checks the validity of the users login message. In the mutual authentication situation, not only the server can verify the user but also a user can verify the server. The adversary is modeled as follows: (a) The adversary can tap the communication channel between the users and the server during the login and authentication phase. (b) The adversary either can extract the information by obtaining the smart card or can get a users password and Finger print. The adversary cannot do both, or the adversary can login the server as a legitimate user. EXISTING SYSTEM At present We Are Using Single Card or the Individual Card for the Different Banks Like ICICI, AXIS, HDFC, Etc., The Pin Number in the Negative Behind the Card There will be a only one PIN Number
  • 3. DISADVANTAGES: Less Security Low Performance PROPOSED SYSTEM All The Bank Must Be in the Single Card The Pin No is not present in the Negative There Will be Three Passwords PIN No and Authentication Password, Finger print and USIM card authentication ADVANTAGES: Four Types of Security prediction High performance Avoid Fraud Authentication Secure Transaction ALGORITHM USED: 1. Triple DES (Data Encryption Standard) 2. PCA (Principle Component Analysis)
  • 4. ARCHITECTURE DIAGRAM: RFID Authentication PIN Code USER Authentication Process USIM Card Authentication Fingerprint Authentication SYSTEM REQUIREMENTS: Hardware Requirements: Intel Pentium IV 256/512 MB RAM 1 GB Free disk space or greater 1 GB on Boot Drive 1 Network Interface Card (NIC)
  • 5. Software Requirements: MS Windows XP/2000 MS IE Browser 6.0/later MS Dot Net Framework 2.0 MS Visual Studio.NET 2005 MS SQL Server 2000 Language :ASP.Net(VB.NET) APPLICATIONS: 1. Bank 2. Military 3. Detective Agencies 4. Administrative Offices