You are on page 1of 6

A Hack Free Authentication and Authorization System Using 3

Layered Security

Aishani Priyal Singh1, Antaja Dey2, Dhanya Maria D3 and Srividhya Ganesan4
Computer Science & Engineering, AMC Engineering College, Bengaluru
Abstract-The overall objective is to that could compromise the security of
develop an application that primarily aims systems, such as choosing a bad password
at creating a definite solution to tackle and inputting passwords in an insecure way
shoulder surfing attacks as well as third are regarded as ”the weakest link” in the
party system hackers to make it an
impenetrable system to secure authentication chain. Rather than choosing
confidential data. The first module is arbitrary alphanumeric strings, users tend
basically a Graphical Authentication to choose passwords that are either short or
System which involves a one-time login meaningful for the sake of easy
indicator as well as circulating horizontal memorization and convenience. With the
and vertical bars covering the entire scope augment of web applications and mobile
of the pass images and functions using
apps revolving around every domain that
the pass matrix mechanism. The second
level of authentication is a passkey an enterprise or an individual is connected
module and a honey-pot database scheme. to, there has been a huge rise in demand for
Authorised users are given access to the an impenetrable authentication system that
original database when they enter the can match up to the vulnerabilities the
pass key while other unauthorised users hackers of today pose to confidential data.
are given access to the fake database These applications can be accessed only by
which consists of irrelevant data. The
authentic users only. Different graphical
security scheme is believed to be
impossible to break through by hackers secret word verification plans were created
and also would provide adequate security to address the issues and shortcomings
for confidential and important data like related with printed passwords. Various
finance transactions, project reports, graphical watchword validation plans were
passcode etc. With the combination of produced to address the issues and
these three layers, the hacker would not shortcomings related with literary
be able to crack through the software for
passwords. In light of a few reviews, for
the confidential files of the user.
example, those in people have a superior
capacity to remember pictures with long
haul memory (LTM) than verbal portrayals.
Picture based passwords were turned out to
Keywords-PassMatrix, be less demanding to remember in a few
AES,Honeypot,Authentication client thinks about. Therefore, clients can
set up an intricate verification secret word
I. INTRODUCTION and are fit for recalling it after quite a while
Passwords are largely used in regardless of the possibility that the
application authentication for computer memory is not enacted occasionally. Be
security and privacy. However, with the that as it may, the greater part of these
vulnerability involved with human actions picture based passwords are powerless
against shoulder surfing assaults (SSAs). database model, where the unauthorised
This kind of assault either utilizes users trying to access the files would be
coordinate perception, for example, given access to a false database and at the
viewing behind someone or applies video same time, the system tries to retrieve the
catching systems to get passwords, PINs, or details of the person using IP address,
other touchy individual data Location etc. With this 3 layered security
architecture, we can achieve a hack free
system with complete security.
A. Pass Matrix
Aggressors can watch straight-forwardly or
utilize outer recording gadgets to gather II. METHODOLOGY
clients' accreditations. To defeat this issue,
we proposed a novel validation framework With the increase in shoulder surfing
Pass Matrix, in light of graphical attacks as well as camera based attacks to
passwords to oppose bear surfing assaults. login passwords we propose a pass matrix
We utilize a one-time legitimate login system based on graphical passwords to
overcome this problem. Shoulder-Surfing
pointer and circulating flat and vertical bars
is a recognized hazard where an attacker
which would cover the whole extent of the can capture a password by means of direct
pass-pictures being utilized. With Pass observation or by way of recording the
Matrix alone holding the security for the authentication. There were some graphical
system, the chances for a system to be schemes resistant to SSAs; however they
hacked is reduced unless and until the have got substantial usability drawbacks,
hacker doesn’t get access to it. generally in the time and effort to login. In
this paper, we suggest and compare a brand
new shoulder-browsing resistant scheme
B. AES Encryption and Decryption which has a proper usability for PDAs. The
Nothing is so certain in the field of new scheme requires users to attract
security. Hackers can crack anything throughout their password picks orderly in
nowadays and so the Pass Matrix by some preference to click directly on them. We
attempts. So, we came up with the next have used this in the initial login process.
layer in our security system, where the next Pass Matrix was developed by Hung-Min
Sun, Shiuan Tung Chen, Jyh-Haw Yeh,
level in data access requires the user to Chia-Yun Cheng and the paper can be
enter the passkey in order to perform any found at [1].
functions on the file such as read, write etc.
The second level solely controls the
authentication based on the passkey. This
passkey is a registered key which is given
to the user at the time of account creation
and would only be known by him.

C. Honeypot Database Model


To make sure that the hacker never
fans access to the database which consists
of important data, we use Honeypot
added to each file in the real database to
prevent unauthorized users from being
granted access to confidential files. This
would help in a preventing shoulder surfing
attacks and provide adequate security to the
users. These files can be financial files,
project code, ideologies for future and
many more.

B. AES Algorithm
The all the more outstanding and
by and large got symmetric encryption
figuring prone to be encountered nowadays
is the Advanced Encryption Standard
(AES). It is found to be under six times
Figure 1: Image for Pass snappier than triple DES.
Matrix An exchange for DES was
required as its key size was close to
nothing. With increasing figuring power, it
A. MD5 Algorithm was seen as exposed against complete key
To generate the OTP for the pass pursuit attack. Triple DES was expected to
matrix we have used MD5 Algorithm vanquish this drawback anyway it was
(Message-Digest Algorithm).There will be discovered direct. The components of AES
three otp generated each for different are according to the accompanying –
image, toproide high security. The MD5
message-process calculation is a generally · Symmetric key symmetric piece
utilized cryptographic hash function figure
creating a 128-bit (16-byte) hash value, · 128-bit data, 128/192/256-piece keys
normally communicated in content · Stronger and snappier than Triple-
organization as a 32 digit hexadecimal DES
number. MD5 were concocted by Ron · Provide full assurance and setup
Rivest as an enhanced variant of MD4. purposes of intrigue.
MD5 has been used in a wide assortment of · Software implementable in C and Java
cryptographic applications, and is
additionally ordinarily used to check AES Operation:
information trustworthiness. It is intended AES is an iterative instead of
where a substantial document must be Feistel figure. It relies upon substitution–
"packed" in a protected way before being permutation arrange. It incorporates a
scrambled with a private key under an open movement of associated operations, some
key crypto-framework, for example, PGP. of which include supplanting commitments
MD5 can be utilized to store one-route by specific yields (substitutions) and others
hash of a secret key, regularly with key incorporate rearranging bits around
extending. (stages).
Unusually, AES plays out each
At the same time, keeping in mind one of its estimations on bytes rather than
the possibility of the system still being bits. In this manner, AES treats the 128 bits
vulnerable to Hackers we propose a Honey of a plaintext deter as 16 bytes. These 16
pot to enable the hacker to access a fake bytes are composed in four fragments and
database while at the same time track down four sections for taking care of as a system.
his location. Another layer of encryption is Not at all like DES, the amount of
rounds in AES is variable and depends on
upon the length of the key. AES uses 10 Each segment of four bytes is right
rounds for 128-piece keys, 12 rounds for now changed using an exceptional
192-piece keys and 14 rounds for 256-piece numerical capacity. This limit takes as data
keys. Each of these rounds utilizes an the four bytes of one segment and yields
alternate 128-bit round key, which is four absolutely new bytes, which supplant
figured from the first AES key. the main area. The result is another new
lattice including 16 new bytes. It should be
seen that this movement is not performed
in the last round.

● Include Round-key:
The 16 bytes of the cross section
are presently considered as 128 bits and are
XORed to the 128 bits of the round key. In
case this is the last round then the yield is
the cipher-text. Something else, the ensuing
128 bits are deciphered as 16 bytes and we
start another practically identical round.

● Decoding Process:
The procedure of
Figure 2: Schematic AES Structure decoding of an AES cipher-text
is like the encryption process
Encryption Process: in the switch arrange. Each
● Byte Substitution: round comprises of the four
The 16 input bytes are procedures conducted in the
substituted by investigating a turnaround request −
settled table (S-box) given in
outline. The result is in a grid of • Add round key
four lines and four fragments.
• Mix sections
● Shift rows:
Each of the four lines of the • Shift lines
system is moved to the other side. Any
entries that 'tumble off are re-implanted on • Byte substitution
the right half of segment. Move is finished
as takes after:
AES Analysis:
· First line is not moved. In present day cryptography, AES
· Second section is moved one (byte) is comprehensively gotten and reinforced in
position to the other side. both equipment and programming. Till
· Third section is moved two positions to date, no logical cryptanalytic ambush
the other side. against AES has been found. Likewise,
· Fourth section is moved three positions AES has worked in flexibility of key
to the other side. length, which allows a level of 'future-
· The outcome is another matrix including fixing' against progress in the ability to
a comparable 16 bytes yet moved with perform exhaustive key searches. However,
respect to each other. comparably concerning DES, the AES
security is guaranteed just in case it is
● Mix Columns:
precisely executed and incredible key
organization is utilized.

Figure 5: Data-Flow Diagram


Figure 3: AES Encryption

We have used driveHQ (i.e cloud)


to store the encrypted user’s data and also III. RESULT ANALYSIS
created a honeypot database to direct the
fake users to the wrong database which We have developed the project to provide
consists of similar but irrelevant data. A authentication security in the form of
file can be opened, closed or even edited. OTP which carries the co-ordinates of the
Below is the data flow diagram and pass matrix.We have written code to split
flow chart of the, image into chunks and get them back into
one during the login phase.
The user would get the
coordinates in the from of an OTP and he
needs to align the sliders in order to
login.
The files can only be
downloaded but not viewed without
entering the decryption key which was
generated when the files were being
uploaded into user’s storage.
The administrator has the
provision to check the user details and
has all rights to block an unauthorized
user or say hacker who has tried to login
with wrong credentials. He would be able
to see the IP address of the hacker and
also would alert the legit user that his
Figure 4: Flow Chart storage details are under risk.
The project would be completed
when we successfully get the sample
results of some test cases for user and
hacker modules. We need to create
sample datasets and store them on cloud [2] Ashwini M. Deshpande, Mangesh S.
storage and make sure the retrieval Deshpande, Devendra N. Kayatanavar, ‘
process works exactly as we have FPGA ‘ Implementation of AES
expected. Encryption and Decryption’, August 2009,
Control, Automation, Communication and
IV. CONCLUSION Energy Conservation.

Many projects are rendered less effective [3] S.K. Gupta, Anand Gupta, Renu
because the change management Damor, Vikram Goyal, Sangeetha
imperative is often overlooked and/or Sabarwal, ‘Context Honeypot: A
underestimated and is therefore not framework for anticipatory privacy
managed as an integral part of the planning violation’ July 2008, Emerging Trends in
and execution of the project concerned. Engineering& Technology.
The literature survey done at the start
of this study confirmed the importance of [4] S. Sood, A. Sarje, and K. Singh,
proper change management and revealed “Cryptanalysis of password authentication
that the absence of such management can schemes: Current status and key issues,” in
have a negative impact on a project’s Methods and Models in Computer Science,
outcome. 2009. ICM2CS 2009.
In the traditional network security
system passwords where either short
alphanumeric strings or meaningful for the
sake of easy memorization and
convenience. We wish to change that into
graphical passwords using Pass Matrix
concepts.
Hackers can crack anything nowadays
and so the Pass Matrix by some attempts.
The second level will solely controls the
authentication based on the passkey, where
we wish to generate a pass key for each
subsequent encryption and decryption of
files stored in the database.
To make sure that the hacker never
fans access to the database which consists
of important data, we wish to use Honeypot
database model, where the unauthorised
users trying to access the files would be
given access to a false database.

REFERENCES
[1] Hung-Min Sun, Shiuan Tung Chen,
Jyh-Haw Yeh , Chia-Yun Cheng , ‘A
Shoulder Surfing Resistant Graphical
Authentication System’, March 2016, IEEE
Transactions on Dependable and Secure
Computing, Volume 99.

You might also like