A Novel Security Model For Password Stealing And Password Reuse Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

The aim of the project is to design a user authentication protocol named Opass which leverages a user cell phone and short message service to password stealing and password reuse attacks. Opass only requires a unique phone number, and involves a telecommunication service provider in registration and recovery phase. This protocol is generated a new password when a user enter the webpage anytime. The generate password is transfer to particular mobile. This Opass system used HMAC (Hash Message Authentication Code) algorithm. The password the user can use the webpage successfully. Through Opass, users only need to remember a long-term password for login on all websites

Keywords: Network security, password reuse attack, password stealing attack, user authentication

Edition: Volume 2 Issue 6, June 2013

Pages: 379 - 381

Share this Article

How to Cite this Article?

P.Kasthuri, R.Kokila, "A Novel Security Model For Password Stealing And Password Reuse Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013283, Volume 2 Issue 6, June 2013, 379 - 381

85 PDF Views | 76 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1287 - 1291

Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation

Devendra Hapase, S. D. Satav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Similar Articles with Keyword 'password reuse attack'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 142 - 145

A Survey on One Time Password

Mirza Tanzila Maqsood, Pooja Shinde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 280 - 285

Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks

Tanzila Maqsood Mirza, Shrikant R. Tandle

Share this Article

Similar Articles with Keyword 'password stealing attack'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 142 - 145

A Survey on One Time Password

Mirza Tanzila Maqsood, Pooja Shinde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 280 - 285

Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks

Tanzila Maqsood Mirza, Shrikant R. Tandle

Share this Article

Similar Articles with Keyword 'user authentication'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2703 - 2708

Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal, Dr. Latesh Malik

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1733 - 1735

Common Gateway Interface

Kamal Kathuria, Chaynika Kapoor, Apoorva Adlakha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article
Top