CPP Project
CPP Project
A MICRO-PROJECT REPORT ON
“SECURE LOGIN AUTHENTICATION SYSTEM”
SUBMITED BY:-
SARAS KANGUDE
RUTIK THAKARE
ATUL GAIKWAD
UNDER GUIDANCE OF
Prof mrs. ANKITA GADEKAR MADAM
THIS IS CERTIFY THAT THE MICROPROJECT
IS SUCCESSFULLY SUBMITTED BY,
Saras Kangude
Rutik Thakare
Atul Gaikwad
_____________________________ _________________________
MRS. ANKITA GADEKAR HEAD OF THE
MADAM DEPARTMENT
Acknowledgement
We remain immensely obliged to Lect. Ankita Gadekar for providing us with the
ideas of this Topic and for here invaluable support garnering resources for me
either by the information or computer also her guidance and supervision made
this project happen. I would like to Thank my college PK TECHNICAL
CAMPUS. Our source of inspiration, Principle and HOD Computer Engineering
Department for their valuable support.
ABSTRACT
With the rapid evolution of the wireless communication technology, user
authentication is important in order to ensure the security of the wireless
communication technology. Password play an important role in the
process of authentication. In the process of authentication, the password
enter by the user will be transmitted along the traffic to the authentication
server in order to allow the server to grant access to the authorized user.
The attacks will use the chance to attempt to sniff others person password
in order to perform some illegal activities by using others identity to keep
them safe from troubles. Due the issues, there are many solutions has been
proposed to improve the security of wireless communication technology.
In this paper, the previously proposed solution will be used to enhance the
security of the system. The solution adopted is the one time password,
hashing and two-factor authentication. There also a new solution will be
added by using the QR code to help to save more data. The objective of
the system outcome is to enhance the current login authentication system.
It provides solutions for making password breaking more difficult as well
as convinces users to choose and set hard-to-break passwords.
CONTENTS
Acknowledgement
Abstract
CHAPTER 1: INTRODUCTION
1.1 Idea of project
1.2 Motivation of project
1.3 Brief Description
1.4 Project Objectives
CONCLUSION
REFERANCE
Chapter 1: INTRODUCTION
Introduction
In the age of digitalization and increasing reliance on online services, the
importance of safeguarding user data and ensuring secure access to digital platforms
cannot be overstated. A robust and dependable login authentication system is the
first line of defense against unauthorized access and data breaches. This project aims
to design, develop, and implement a secure login authentication system that not only
protects user accounts but also provides a seamless and user-friendly experience.
The significance of this project lies in its ability to address the growing
concerns related to online security, privacy, and the integrity of personal and
sensitive information. As the digital landscape continues to evolve, malicious actors
are constantly seeking ways to exploit vulnerabilities and gain unauthorized access
to user accounts. Therefore, a strong authentication system is essential to mitigate
these threats and provide users with the confidence that their information is well-
protected.
This project will focus on the development of a multi-faceted authentication
system that incorporates the latest security measures, such as two-factor
authentication (2FA), biometric authentication, and robust password hashing
techniques. It will also emphasize usability, ensuring that the login process is user-
friendly, efficient, and adaptable to various platforms and devices.
Additionally, the project will consider scalability, as the authentication system
should accommodate the needs of both small-scale applications and large-scale
enterprises. Security, usability, and scalability will be at the forefront of this project's
objectives.
The secure login authentication system will not only benefit individual users
but also organizations across industries, including e-commerce, finance, healthcare,
and more. It will contribute to building trust, reducing security risks, and enhancing
the overall online experience.
By the end of this project, we aim to provide a comprehensive and adaptable
secure login authentication system that serves as a reliable and fundamental pillar in
the ongoing battle to protect digital assets and secure online interactions.
1.1 Idea of project
The central idea behind a secure login authentication system project is to create a
reliable and fortified framework that guarantees the protection of digital assets and
sensitive information. In an era marked by escalating cybersecurity concerns, this
concept is designed to address the critical need for ensuring that only authorized
individuals gain access to specific digital resources. It involves verifying the identity
of users through methods such as passwords, biometrics, or multi-factor
authentication, thus preventing unauthorized entry. This project also emphasizes the
safeguarding of sensitive user data from potential security breaches and ensures
strict access control, allowing users to access only the resources that align with their
designated roles and permissions. Additionally, it underscores the significance of
user privacy and compliance with data protection regulations while incorporating
industry-standard security practices and encryption techniques to fortify security.
The project seeks to strike a balance between robust security measures and a user-
friendly interface, making the authentication process seamless for legitimate users,
while staying adaptable and continually updated to address evolving security threats
effectively. Ultimately, it aims to uphold the integrity, confidentiality, and
availability of digital assets, playing a pivotal role in safeguarding user accounts,
financial data, personal information, and other critical resources in the contemporary
digital landscape.
1.2 Motivation of project
The password is added to the sharing operating system in 1960s. However, the
problem arose very quick due to the leakage of the unencrypted password master
file. When reaching 1970s, the password started to be stored in the hashed form. In
1979, the hashed password was improved with the salting. With the mid-1990s
introduce of the World Wide Web, the password is secure using the public-key
cryptography via secure sockets layer(SSL) client certificates. The password is then
started to link to the email and two-factor authentication is introduced. In the early
of 2010s, the smartphone starts to be widely used. The reason for the implementation
is also because of the free smartphone applications to act as a second factor based
on the emerging time-based-one-time-pad (TOTP) standard. TOTP is an algorithm
that computes a one-time password from a shared secret key and the current time.
There are also services provided by sending codes via short message service (SMS)
as a backup authentication mechanism.
QR code is named after quick response because of the high-speed reading. QR code
is an evolution of the barcodes. The evolution occurs due to the limitation of the
barcodes which only can hold 20 alphanumeric characters. The outcome
of the QR code is a huge success due to it can store 7,000 numerals with
the additional capability to code Kanji characters was finally created.
With the current technology, the QR code is scanned can help to redirect
to a website or coupon.
1.3 Brief Description
A secure login authentication system project is a vital component of modern
information technology, providing a robust barrier against unauthorized access and
data breaches. This system facilitates controlled entry to applications, services, or
resources by confirming the identity of users through a variety of security
mechanisms. These may include password-based verification, biometrics like
fingerprints or facial recognition, and multi-factor authentication. It also manages
the sensitive user data securely, implementing encryption and hashing techniques to
protect against potential security breaches. Access control features further restrict or
grant user privileges based on their roles and permissions. Regular updates, logging,
and auditing mechanisms are in place to continually monitor and strengthen security,
ensuring the confidentiality and integrity of user data while providing a user-friendly
interface for seamless user interaction. The objective of such a project is to fortify
the system against security threats and maintain the privacy and security of user
accounts and data.
1.4 Project Objectives
1. The main objective is to implement a secure login authentication
system with utilizing with two-factor authentications. By using the
concept two-factor authentication could help to increase the strength of
the login system. The attacker will need to pass through the next barrier
of defence to success to log in. This system will help to enhance the login
authentication system.
2. Next objective is to ensure login password will not be transmitted
over the network. As compared to the previous solution, the password is
just encrypted, but the attackers might succeed to decide the data and
retrieve the password. So in order to prevent this happens, the password
with the random key will need to be hash before the sender sends the
password to the server. It is important to secure the password of the user.
3. Apart from that, third objective will be to generate the one time
password offline. This will help in perform the login procedure if there is
a limited connection of wi-fi or mobile signal is weak. It will help the user
who lives in the countryside which has a weak phone signal.
4. Lastly, the fourth objective is to ensure the system is protected from
rainbow table attack. The rainbow table will act as a dictionary store and
optimized for hashes and password. So, the random key is repeated, the
password will be retrieved. So, the random key should be long enough to
cause the attackers to use a longer time to generate the rainbow table.
CHAPTER 2: LITERATURE REVIEW
The phone is used to generate a random key when it's camera is used to
scan with the QR code. So, the smartphone used with the features of can
download and install a new application and must have a camera which can
be used to scan QR code.
2. Laptop
2. RAM 8GB
Windows 11
3. Operating System
CHAPTER 6: ADVANTAGES AND DISADVANTAGES
6.1 Advantages
1. User Identity Verification: Secure authentication systems ensure that
users are who they claim to be, preventing unauthorized access to
accounts and data.
2. Data Protection: Strong authentication measures protect sensitive user
data and confidential information from being compromised or stolen by
malicious actors.
3. Reduced Unauthorized Access: A secure authentication system helps
prevent unauthorized individuals from gaining access to user accounts and
systems.
4. Prevention of Identity Theft: Robust authentication methods help
safeguard against identity theft, as they make it much more difficult for
attackers to impersonate legitimate users.
5. Mitigation of Password-Related Risks: Secure authentication systems
reduce the risk of password-related vulnerabilities, such as password
guessing, brute force attacks, and credential stuffing.
6. Improved User Trust: Users are more likely to trust a service or
platform that has a secure authentication system in place, which can
enhance the reputation of the organization.
7. Regulatory Compliance: Many industries and jurisdictions have
specific requirements for data security and authentication. Implementing
a secure authentication system can help organizations meet regulatory
compliance requirements.
8. Single Sign-On (SSO): SSO systems streamline user access by allowing
them to log in once and access multiple services or applications,
improving user experience while maintaining security.
6.2 Disadvantages