Progressing biometric security concern with blowfish algorithm

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The world today is completely secured with most recent advancements. Consequently the security is still a huge issue. Biometric provides high security with more precision which recognizes the individual dependent on their physiological qualities of a person by utilizing their biometrics. It aims that the biometric will build security, dependability and agreeableness in the most recent innovation of PC framework. The mainstream MIPS based cryptography processor is utilized for equipment and programming items and guidelines require cryptography keys length for higher security level. Merging biometric with MIPS cryptography processor is as a possible arrangement. We utilize new way to deal with Network security utilizing MIPS constructed crypto processor situated in light of contactless palm vein biometric framework. This methodology considers NOC limitations and its topology. It gives greater security with less key length and there is no compelling reason to store any private key anyplace. Blow fish algorithm is more secure to analyze other symmetric key calculations, and deliver best outcome for less handling time and adjusts to build the key size of blowfish calculation.

Cite

CITATION STYLE

APA

Sridevi, R., & Selvi, S. (2019). Progressing biometric security concern with blowfish algorithm. International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue 2), 166–171. https://doi.org/10.35940/ijitee.I1032.0789S219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free