OTP Intense Cryptography and Palm Vein Voguish on Online Transaction

Authors

  • E. Meena  Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India
  • Dr. G. Ravi  Associate Professor & Head, Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India

Keywords:

Online Transaction (OLT), One-time password (OTP), Triple Data Encryption Standard (3DES), Palm vein Biometric

Abstract

Online-Transaction (OLT) is a widespread data processing system in today’s initiatives that simplify and accomplish transactions-oriented applications using computer networks such as the internet. The online transactions are based on the one -time password (OTP), which is transmitted over an untrusted communication channel (internet). Security for the OTP is essential in order to prevent the reply occurrences during the transactions. In the existing system, RSA algorithm involves 2048 bits key size in order to achieve 112 bits security level. But in the proposed, Triple Data Encryption Standard (3DES) which performs 56-bit key size multiplies by three times of DES for high level security. In order to overcome these above inconsistencies and to develop a robust security model OTP using Biometrics is combined with cryptography. This paper proposes better security models with 3DES that engenders adequate block size value and aggrandize security of OTP using palm-vein as biometric.

References

  1. Ganesan R. and Vivekanandan K. A secured hybrid architecture model for internet banking (e-banking). Journal of Internet Banking and Commerce, 14(1):1-17, 2009.
  2. Nandini C. and Shylaja B. Efficient cryptographic key generation from fingerprint using symmetric hash functions. Research and Reviews in Computer Science, International Journal of, 2(4), 2011.
  3. Andrew Teoh Beng Jin, David Ngo Chek Ling, and Alwyn Goh. Personalized cryptographic key generation based on Face Hashing. Computers& Security, 23:606-614, 2004.
  4. Dindayal Mahto and DilipKumar Yadav. Network security using ECC with Biometric. In Karan Singh and Amit K. Awasthi, editors, Quality, Reliability, Security and Robustness in Heterogeneous Networks, 853. Springer Berlin Heidelberg, 2013.
  5. Dindayal Mahto, DilipKumar Yadav. Computing for Sustainable Global Development (INDIACom) 2015; 1737 - 1742.
  6. Lucas Ballard, Seny Kamara, and Michael K. Reiter. The practical subtleties of biometric key generation. In Proceedings of the 17th Conference on Security Symposium,SS’08, pages 61- 74, Berkeley,CA,USA, 2008. USENIX Association.
  7. NELSON Mike, WRIGHT Tim, and ASHIDA Ken. Fujitsu’s palm secure-based e-pose system for school cafeteria. Fujitsu scientific and technical journal, 43(2):236-244, 2007. Eng.
  8. Ding, Yuhang Ding, Dayan Zhuang and Kejun Wang, "A Study of Hand Vein Recognition Method", The IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada, July 2005, pp. 2106-2110.
  9. J.-G. Wang, W.-Y. Yau, A. Suwandy, and E. Sung, "Person recognition by fusing palmprint and palm vein images based on "Laplacianpalm" representation," Pattern Recognit., vol. 41, pp. 1514-1527, Oct. 2007.
  10. Yingbo Zhou and Ajay Kumar, Senior Member, IEEE, "Human Identification Using Palm-Vein Images", IEEE Transactions on Information Forensics and Security, vol. 6, no. 4, December 2011.
  11. P. Ghosh and R. Dutta, "A new approach towards Biometric Authentication System in Palm Vein Domain"

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
E. Meena, Dr. G. Ravi, " OTP Intense Cryptography and Palm Vein Voguish on Online Transaction, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.751-756, July-August-2017.