Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30127
Hybrid Authentication System Using QR Code with OTP

Authors: Salim Istyaq

Abstract:

As we know, number of Internet users are increasing drastically. Now, people are using different online services provided by banks, colleges/schools, hospitals, online utility, bill payment and online shopping sites. To access online services, text-based authentication system is in use. The text-based authentication scheme faces some drawbacks with usability and security issues that bring troubles to users. The core element of computational trust is identity. The aim of the paper is to make the system more compliable for the imposters and more reliable for the users, by using the graphical authentication approach. In this paper, we are using the more powerful tool of encoding the options in graphical QR format and also there will be the acknowledgment which will send to the user’s mobile for final verification. The main methodology depends upon the encryption option and final verification by confirming a set of pass phrase on the legal users, the outcome of the result is very powerful as it only gives the result at once when the process is successfully done. All processes are cross linked serially as the output of the 1st process, is the input of the 2nd and so on. The system is a combination of recognition and pure recall based technique. Presented scheme is useful for devices like PDAs, iPod, phone etc. which are more handy and convenient to use than traditional desktop computer systems.

Keywords: Graphical Password, OTP, QR Codes, Recognition based graphical user authentication, usability and security.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1127144

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 982

References:


[1] William Stallings and Lawrie Brown. “Computer Security: Principle and Practices." Pearson Education, 2008.
[2] Authentication: http://www.objs.com/survey/authent.htm
[3] L.Sobrado and J.C. Birget, “Graphical Passwords”, The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol 4, 2002,http://rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbirg.htm.
[4] Patric Elftmann, Diploma Thesis, “Secure Alternatives to Password-Based Authentication Mechanisms” Aachen, Germany October 2006.
[5] International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-4 Issue-5, June 2015. Graphical User Authentication Techniques for Security: a Comparative Study Harinandan Tunga, Diya Saha.
[6] Mr. Pratik, A Vanjara,and Dr. Kishor Atkotiya, Analysis &Design ‘Graphical Password Authentication Using Cryptography Algorithms’ Volume: 1, Issue: 9,September 2012 ISSN - 2250-1991.
[7] G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
[8] W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004.
[9] W. Jansen, "Authenticating Users on Handheld Devices “in Proceedings of Canadian Information Technology Security Symposium, 2003.
[10] Passfaces Corporation. The science behind Passfaces,White paper, http://www.passfaces.com/enterprise/resources/white_papers.htm
[11] A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse", In Third Australasian Conference on Information Security and Privacy (ACISP): Springer Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
[12] Rachna Dhamija and Adrian Perrig, “Deja Vu: A User Study. Using Images for Authentication” in Proceedings of the 9th USENIX Security Symposium, August 2000.
[13] Salim Istyaq and Lovishagrawal “A New Technique for User AuthenticationUsing Numeric One Time Password Scheme” in International Journal of Computer Sciences and Engineering (IJCSE), Volume-4, Issue-5, E-ISSN: 2347-2693 on 31 May-2016, pp. 163-165.
[14] Salim Istyaq, “A New approach of Graphical Password with Integration of Audio Signature Combination of Recall and recognition” in International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), ISSN(P): 2249-6831; ISSN(E): 2249-7943 Vol. 6, Issue 4, Aug 2016, 45-50.
[15] Mohammad Sarosh Umar and Mohammad QasimRafiq, “A Novel Graphical Interface for User Authentication on Mobile Phones and Handheld Devices”, International Journal On Advances in Intelligent Systems, volume 4, numbers 3 and 4, pp 380 to 387, 2011 (IARIA Journals) Publication Date April 30, 2012.