Due to its convenience and ease of text secret code user verification is the most popular form of websites. Users secret codes are stolen under a variety of threats and vulnerabilities are not compromised. First, users often choose weak secret codes and using secret codes across multiple websites again. Second, the threat of rogue thief suffers secret code, type the system secret code. Reusing a secret code, stealing a secret code to a user's cell phone and SMS service exists to thwart attacks, Cryptographic Cipher Text (CCT) verification protocol design for a user name in which the cipher text is encoded and decoded by using hash function.