Main Reference PaperoPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks, IEEE Transactions on Information Forensics and Security, April 2012.
  • This paper designs a user authentication protocol named oPass which leverages a user’s cellphone and short message service to thwart password stealing and password reuse attacks. oPass only requires each participating website possesses a unique phone number, and involves a telecommunication service provider in registration and recovery phases. Through oPass, users only need to remember a long-term password for login on all websites. After evaluating the oPass prototype, it shows oPass is efficient and affordable compared with the conventional web authentication mechanisms.

+ Description
  • This paper designs a user authentication protocol named oPass which leverages a user’s cellphone and short message service to thwart password stealing and password reuse attacks. oPass only requires each participating website possesses a unique phone number, and involves a telecommunication service provider in registration and recovery phases. Through oPass, users only need to remember a long-term password for login on all websites. After evaluating the oPass prototype, it shows oPass is efficient and affordable compared with the conventional web authentication mechanisms.

  • To resist against password attacks through a novel technique

  • To reduce the burden of users to memorize the password for each website

+ Aim & Objectives
  • To resist against password attacks through a novel technique

  • To reduce the burden of users to memorize the password for each website

  • The shared key can be hacked by the attacker which affects the security of the authentication system. In order to provide more security, shared key must be sent securely. User and server apply the public and private key pair using the asymmetric key generation algorithmfor sharing the secret key.

+ Contribution
  • The shared key can be hacked by the attacker which affects the security of the authentication system. In order to provide more security, shared key must be sent securely. User and server apply the public and private key pair using the asymmetric key generation algorithmfor sharing the secret key.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.