You are on page 1of 7

A Project Report On

E-AUTHENTICATION SYSTEM USING


QR CODE AND OTP

Submitted in partial fulfillment of the requirement for the


Award of the degree of

Bachelor of Technology
In
Computer Science & Engineering
By:
Arushi Mehrotra (1447410009)
Divyansh Sinha (1447410013)
Harshit Rastogi (1447410015)
Neha Kapoor (1447410028)

Under the Guidance of:

Mr. Vijay Kumar Dubey


(Assistant Professor, CS/IT Department)

Department of Computer Science & Engineering


SHRI SIDDHI VINAYAK INSTITUTE OF TECHNOLOGY
Approved by A.I.C.T.E.
Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow
Bareilly (U.P.)
(Batch: 2014-2018)
i
SHRI SIDDHI VINAYAK INSTITUTE OF TECHNOLOGY
Bareilly (U.P.)
Approved by A.I.C.T.E.
Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE

This is to certify that Arushi Mehrotra(1447410009), Divyansh Sinha(1447410013), Harshit


Rastogi(1447410015) and Neha Kapoor(1447410028) of the final year B. Tech. (CSE) have
carried out a project work on“E-Authentication using QR Code and OTP” under the guidance
of Mr.Vijay Kumar Dubey, Assistant Professor in CS/IT Department for the partial
fulfillment of the award of the degree of Bachelor of Technology in Computer Science &
Engineering in Shri Siddhi Vinayak Institute of Technology, Bareilly (Affiliated to Dr. A.P.J.
Abdul Kalam Technical University, Lucknow) is a bonafide record of work done by them during
the year 2016 – 2017.

Head of the Department Internal Guide:


Dr. Vibhor Mehrotra Mr. Vijay Kumar Dubey
Assistant Professor (CSE)

ii
DECLARATION

I hereby declare that this submission is my own work and that, to the best of my knowledge and
belief, it contains no material previously published or written by another person nor material
which to a substantial extent has been accepted for the award of any other degree or diploma of
the university or other institute of higher learning, except where due acknowledgment has been
made in the text.

Name: Arushi Mehrotra Name: Divyansh Sinha


Roll No.: 1447410009 Roll No.: 1447410013

Name: Harshit Rastogi Name: Neha Kapoor


Roll No.: 144741015 Roll No.: 1447410028

iii
ACKNOWLEDGEMENT

The extensive endeavor that accompanies the successful completion of any task would not be
complete without the expression of gratitude to the people who made it possible.
We express our sincere thanks to our project guide Mr. Vijay Kumar Dubey (Assistant Professor
CS/IT Department) S.S.V.I.T. He was remarkably patient and willing to help. We thank him for
all his encouragement, valuable advices and suggestions throughout our project work.
We would like to express our gratitude towards Dr. Vibhor Mehrotra (Head, Department of
CS/IT) for his kind suggestions and advices given at every step.

We extend our whole-hearted thanks to all the staff of Computer science & technology for
providing all facilities, valuable suggestions and constant supervision for the completion of the
project.
Last but not the least, We would like to acknowledge the ongoing support of my parents and my
family members, whose patience and encouragement during these long days and night have been
paramount in making this project a reality.

Arushi Mehrotra

Divyansh Sinha

Harshit Rastogi

Neha Kapoor

iv
ABSTRACT

This project explains implementation details of e-authentication system. Security is an important issue
for e-authentication application which can be implemented by various internet technologies and gap
between real world and virtual world can be filled up. While implementing e-authentication system,
secure data transfer need can be fulfilled by using https data transfer and database encryption
techniques for secure storage of sensitive information. To eliminate threat of phishing and to confirm
user identity, QR-code which would be scanned by user mobile device can be used and weakness of
traditional password based system can be improved by one time password (OTP) which can be
calculated by user transaction information and data unique at user side like imei number of the user
mobile device.

The main methodology depends upon the encryption option and final verification by confirming
a set of pass phrase on the legal users, the outcome of the result is very powerful as it only gives
the result at once when the process is successfully done. All processes are cross linked serially
as the output of the 1st process, is the input of the 2nd and so on. The system is a combination
of recognition and pure recall based technique. Presented scheme is useful for devices like
PDAs, iPod, phone etc. which are more handy and convenient to use than
traditionaldesktopcomputersystems.

Keywords: banking application, security, QR-code, one time password (OTP), mobile device.

v
TABLE OF CONTENTS

CERTIFICATE ii
DECLARATION iii
ACKNOWLEDGEMENT iv
ABSTRACT v
Page
Chapter
Content No.
No.

CHAPTER 1: INTRODUCTION 1-3

1.1 History 1
1.2 Objective 1
1.3 Scope 1
1.4 Use of project 2
CHAPTER 2: THEORETICAL BACKGROUND 4-7

2.1 Introduction to E-Authentication 4


2.2 Methodology 4
2.3 Relevance and Implications 6
CHAPTER 3: SYSTEM ANALYSIS AND PLANNING 8-13

3.1 Requirement Analysis 8


3.1.1 Steps in Requirement Analysis Process 8
3.1.2 Requirement Analysis Technique 9
3.2 SRS Document 9
3.2.1 Non Functional Requirements 10
3.2.2 Used Tools and Platform 10
3.3 Feasibility study 11
3.4 System Planning 12
3.4.1 Preliminary Evolution 12
3.4.2 Project Scheduling 13
CHAPTER 4: SYSTEM DESIGN 14-18
4.1 Flow-Chart 14
4.2 DFD 17
4.3 Activity Diagram 18
CHAPTER 5: SYSTEM IMPLEMENTATION DETAILS 19-31

5.1 Modules 19
5.1.1 Registration 19
5.1.2 Login 19
5.1.3 OTP Verification 19

vi
5.1.4 Scan QR codes 20
5.1.5 Main Page Access 20
5.2 Related Work 20
5.2.1 Calculation of OTP 20
5.2.2 Database Encryption 22
5.2.3 Secure Communication Channels 23
5.3 QR-code Processing 23
5.3.1 Generating of QR-code 24
5.3.2 Scanning of QR-code 26
5.3.3 QR-code Decoding 27
5.4 Authentication Scheme 28
5.5 Authentication Factor 31
CHAPTER 6: CODING & TESTING 33-34

6.1 Coding 33
6.1.1 Code Inspection 33
6.1.2 Source code – please refer to Appendix [A] 33
6.2 Testing 34
6.2.1 Testing Objectives 34
6.2.2 Black-box and White-Box Testing 34
CHAPTER 7: LIMITATION, CONCLUSION & FUTURE 35-27
ENHANCEMENT
7.1 Conclusion and Suggestions 35
7.2 Future Enhancement 36

Appendix [A] Source code 37-47


Appendix [B] – Output Screenshots 48-53
References 54

vii

You might also like