International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
E-ISSN: 2349-7300Impact Factor - 9.907

A Widely Indexed Open Access Peer Reviewed Online Scholarly International Journal

Call for Paper Volume 12 Issue 4 July-August 2024 Submit your research for publication

Optimal Strong Password Authentication Protocols

Authors: Sanya Jain, Avani Kasat

Country: India

Full-text Research PDF File:   View   |   Download


Abstract: The process or action of proving or showing something to be true, genuine, or valid is called authentication.
The proper functioning of OSPA (Optimal Strong Password Authentication) has been explained that how it functions and how the OSPA can improve the authentication process for obtaining mutual communication between user and server and the secure transfer of data between them.
Two major techniques can be used for the same — Hash Function and using USB Sticks.
Authenticating passwords using USB sticks is described with all the phases that are: Initialisation Phase, Registration Phase, Login and Authentication Phase and the Password change activity. These activities are described using proper notations and the diagrammatic representation.
As in Existing system only one hash function is used, so only the same value is passed every time during authentication. In multiple hash function will be used, so the values keep changing each time of authentication. So, the attacker cannot find the values.
The Proposed system is based on the cryptography. Cryptography plays a major role in computer security. It is a method of transferring private information and data through network communication, so only the receiver who has the secret key can read the encrypted messages. The messages could be in the format of images, texts or videos etc. Security issues in text-based password authentication are rarely caused by technical issues, but rather by the limitations of human memory, and human perceptions together with their consequential responses can be resolved using cryptography.

Keywords: Password, Authentication, Authorization, Cryptography


Paper Id: 921

Published On: 2021-05-03

Published In: Volume 9, Issue 3, May-June 2021

Cite This: Optimal Strong Password Authentication Protocols - Sanya Jain, Avani Kasat - IJIRMPS Volume 9, Issue 3, May-June 2021.

Share this