A convenient two factor (2f) authentication is used in smart card password verification. Thus, the two factors are “dynamic ID-based” or “anonymous”. To preserve user privacy, a tamper resistant security feature used in smart cards. Reverse engineering and power analysis techniques were used to reveal some sensitive information from the smart card memory. The smart card verification is securely implemented in memory than in the database that can be easily attacked by any person. A day to day application such as e-banking, e-health and e-governance maintains password tables on server. During login process user identity is transmitted as clear over public networks. Various non-tamper resistant schemes on OTP put forward but claim to be ambitious in design process. Truly a 2f scheme can make sure that the user whoever possess a valid OTP and password can be authorized by the server.
CITATION STYLE
Mohemmed Yousuf, R., Karthick Myilvahanan, J., Sindhanaiselvan, K., & Mannar Mannan, J. (2019). Bi-crypto: An efficient system with enhanced security. International Journal of Recent Technology and Engineering, 8(2), 959–963. https://doi.org/10.35940/ijrte.B1756.078219
Mendeley helps you to discover research relevant for your work.