Sir I want seminar report on two factor authentication
Sir I want seminar report on two factor authentication
Posts: 6,843
Threads: 4
Joined: Mar 2015
Many fields in the world requires authentication of the users. We use authentication in day today life. Most authentications are protected only by Passwords. Passwords are known to be one of the easiest target of hackers. So the authentication is easily broken. Solution to this problem is Two Factor Authentication. Different problems with passwords are Finding written password, Post-It Notes, Guessing password / pin, Shoulder surfing, Keystroke logging, Screen scraping (with Keystroke logging) and Brute force password crackers.
Two Factor Authentication is the most commonly used authentication means. It is based on the following factors:
Something you know (as a secret password).
Something you have (as an unclonable secure device with a secret key).
Something you are(E.g : Biometrics)
Two Factor Authentication implements two of the above factors. Stronger and more secure than the traditionally implemented one factor authentication system. An approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. From a security perspective, the ideas is to use evidences which have separate range of attack vectors (e.g. logical, physical)leading to more complex attack scenario and consequently lower risk. It is commonly found in electronic computer authentication, where basic authentication is the process of a requesting entity presenting some evidence of its identity to a second entity. It seeks to decrease the probability that the requester is presenting false evidence of its identity.
Two Factor Authentication could drastically Reduce the incidence of online identity theft and Reduce other online fraud because the victim’s password would no longer be enough to give a thief permanent access to their information. The project requires the system to be functional as multi-user one.It should be based on specified technology. The system under study must be portable and platform independent. The software that is needed for the development of the system is java script support socket programming, remote database, xml etc which is easily available.