Show simple item record

dc.contributor.advisorMonim, Mobashir
dc.contributor.authorBose, Anindita
dc.contributor.authorIslam, Raima
dc.contributor.authorSafrina, Sikander Sofia
dc.contributor.authorBin Khurshid, Dishari
dc.contributor.authorKhan, Mashequr Rahman
dc.date.accessioned2023-08-14T04:32:23Z
dc.date.available2023-08-14T04:32:23Z
dc.date.copyright2023
dc.date.issued2023-01
dc.identifier.otherID: 22341067
dc.identifier.otherID: 22341060
dc.identifier.otherID: 22341074
dc.identifier.otherID: 21141082
dc.identifier.otherID: 22341068
dc.identifier.urihttp://hdl.handle.net/10361/19394
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2023.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 50-52).
dc.description.abstractWhile password-based authentication is widely used by many applications today, it has grave vulnerabilities that can make our devices and accounts prone to malicious attacks. 2-factor authentication (2FA) and Multi-factor authentication (MFA) were introduced to increase the security of the generic password-based authentication and they did enhance the security of the credential-based system by using second or multiple factors to provide additional security. However, even though the intro duction of the second factor increased the security, this approach has weaknesses as well: there are many methods through which a hacker can get access to our do main, such as SIM swap hacking, phishing attacks, ambush attacks during password recoveries, or One Time Password (OTP)-based attacks. Instead of addressing the security problems of 2FA or MFA, we aim to strengthen the security of the generic password-based authentication system by adding a layer of security to the existing first factor. In this process, the user will log in using their credentials and on suc cessful verification of the password, the blockchain-based authentication will begin. Lastly, the Dien_US
dc.description.statementofresponsibilityAnindita Bose
dc.description.statementofresponsibilityRaima Islam
dc.description.statementofresponsibilitySikander Sofia Safrina
dc.description.statementofresponsibilityDishari Bin Khurshid
dc.description.statementofresponsibilityMashequr Rahman Khan
dc.format.extent52 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectBlockchainen_US
dc.subjectAuthenticationen_US
dc.subjectSecurityen_US
dc.subjectHashen_US
dc.subjectNonceen_US
dc.subjectDiffie-Hellmanen_US
dc.subject.lcshBlockchains (Databases)--Security measures.
dc.titleAuthentication using blockchainen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB. Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record