Bi-crypto: An efficient system with enhanced security

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A convenient two factor (2f) authentication is used in smart card password verification. Thus, the two factors are “dynamic ID-based” or “anonymous”. To preserve user privacy, a tamper resistant security feature used in smart cards. Reverse engineering and power analysis techniques were used to reveal some sensitive information from the smart card memory. The smart card verification is securely implemented in memory than in the database that can be easily attacked by any person. A day to day application such as e-banking, e-health and e-governance maintains password tables on server. During login process user identity is transmitted as clear over public networks. Various non-tamper resistant schemes on OTP put forward but claim to be ambitious in design process. Truly a 2f scheme can make sure that the user whoever possess a valid OTP and password can be authorized by the server.

Cite

CITATION STYLE

APA

Mohemmed Yousuf, R., Karthick Myilvahanan, J., Sindhanaiselvan, K., & Mannar Mannan, J. (2019). Bi-crypto: An efficient system with enhanced security. International Journal of Recent Technology and Engineering, 8(2), 959–963. https://doi.org/10.35940/ijrte.B1756.078219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free