Site icon Premium Researchers

THREE LEVEL PASSWORD AUTHENTICATION SYSTEM

Do You Have New or Fresh Topic? Send Us Your Topic

THREE LEVEL PASSWORD AUTHENTICATION SYSTEM

 

 

Abstract—In the current state, there are numerous authentication schemes, the majority of which suffer from numerous flaws.

weaknesses. Some are based on the user’s physical and behavioral characteristics, while others are based on

on the user’s knowledge, such as textual and graphical passwords. There are also other methods of authentication.

schemes based on tokens, such as smart cards, i.e. based on the resources you have Among the various methods of authentication

Textual schemes are the most commonly used schemes schemes based on passwords and tokens, or a combination of the two both. Both of these authentication schemes, however, are vulnerable to certain types of attacks

We present a three-level password authentication scheme in this paper.

scheme, which is a system of multi-factor authentication. being

This project intends to present a three-level password once it has been authenticated.

system created by combining existing features

Schemes of authentication The three distinct levels employed in the

Image ordering is a three-level password authentication scheme.

color pixels as well as a one-time password (OTP).

We make use of

various hash functions, such as SHA-1 and MD5, for the

creation of OTP

Authentication, graphical passwords, and

Textual passwords, 3-level passwords, and image passwords are all examples of multifactor authentication.

ordering, pixel color, one-time password, SHA-1

 

I. FORMAL INTRODUCTION

Human factors are considered in computer security systems.

The weakest link is regarded as the weakest link. There are, however, three

major domains in which human-computer interaction is used

authentication, the development of secure systems, and

Operations relating to security The main emphasis is on the in this case.

Authentication issue

One of the most widely used methods of computer authentication

A user must submit a user name and a text message using this method.

password. However, there are numerous flaws in this method.

The difficulty is one of the most serious issues that could arise.

in terms of remembering passwords According to research, users

Usually, short passwords are chosen so that the passwords can be remembered.

are simple to remember Furthermore, these passwords can be

easily deduced or broken

The massive increase in computer usage has resulted in

There are numerous security concerns, the most serious of which is

The issue is authentication. Authentication is the process of verifying a person’s identity.

validating who you are in relation to who you claimed to be [1].

Human authentication techniques are classified as follows:

knowledge-based, that is, what you know Knowledge-based

Authentication can be further subdivided into the following categories:

1) A technique based on recall that requires the user to

Recreate or repeat a previously created secret.

One common example of recall-based authentication is

Textual passwords are the scheme. One of the most significant limitations of

Its two contradictory requirements are the textual password and the

selection of passwords that are simple to remember and, at the same time,

at the same time, are difficult to predict.

2) A sub-division of recognition bases technique

graphical passwords Graphic passwords demonstrate how

Pictures are easier for the user to remember and recognize than words.

Some graphical password schemes necessitate a lengthy password.

It’s time to get started. Its main drawback is that, while

When the user enters the graphical password, it can be

An intruder can easily observe and record it, so it is

shoulder surfing attacks are possible.

The three-level password system is a two-factor authentication system.

scheme for authentication It combines the advantages of existing technologies.

Authentication schemes are used to create the three levels of security.

password. The three-level password is built using the

current authentication systems have exciting features such as

as well as image ordering, color pixels, and a one-time password

 

 

Do You Have New or Fresh Topic? Send Us Your Topic 

 

 

THREE LEVEL PASSWORD AUTHENTICATION SYSTEM

Not What You Were Looking For? Send Us Your Topic

INSTRUCTIONS AFTER PAYMENT

After making payment, kindly send the following:

» Send the above details to our email; contact@premiumresearchers.com or to our support phone number; (+234) 0813 2546 417 . As soon as details are sent and payment is confirmed, your project will be delivered to you within minutes.