Secure Email-Based OTP Generation and Verification System
Dr K Madan Mohan1, M. Sri Ramchandra2, M. Shiva Kumar3, K. Vedasri4
1Associate Professor, Dept of CSE, Guru Nanak Institute of Technology, Hyderabad, Telangana, India
2UG Scholars, Dept of CSE, Guru Nanak Institute of Technology, Hyderabad, Telangana, India
3 UG Scholar, Guru Nanak Institute of Technology, Hyderabad, Telangana, India
4UG Scholar, Dept of CSE, Guru Nanak Institute of Technology, Hyderabad, Telangana, India
Abstract - Secure user authentication is crucial in the modern digital world to protect private data and stop unwanted access. In order to enhance authentication procedures for various applications, this paper presents a robust Flask-created email-based one-time password (OTP) generation and verification system. Advanced cryptographic techniques and industry-standard protocols are used by the system to create one-of-a-kind, time-sensitive OTPs, which are securely sent to users. Its Flask foundation ensures a smooth connection with backend services, offering a simple and efficient OTP creation and verification solution. Through encryption and secure communication with the server, particular attention is paid to mitigating potential security threats, such as replay and interception attacks. The system architecture combines an intuitive interface with a dependable backend that verifies OTPs within a restricted validity period, ensuring that only valid authentication attempts succeed. Experimental findings illustrate the system's ability to decrease fraudulent access while preserving user-friendliness and high performance. This work presents a comprehensive framework for establishing secure email-based OTP authentication using Flask, positioning it as a valuable solution for improving security in contemporary web and mobile applications.
Keywords:
Secure user authentication, Flask, One-Time Password (OTP), Email-based OTP, Cryptographic techniques, Authentication system, Time-sensitive OTP, Secure communication, Encryption, Replay attack prevention, Interception attack mitigation, Backend integration, User-friendly interface, High performance, Web application security, Mobile application security.