Bi-Crypto: An Efficient System with Enhanced Security
Mohemmed Yousuf R1, Karthick Myilvahanan J2, Sindhanaiselvan K3, Mannar Mannan J4 

1Mr. Mohemmed Yousuf R, Assistant Professor, Department of Computer Science and Engineering at MVJ College of Engineering, Bangalore, India.
2Mr. Karthick Myilvahanan J, Assistant Professor, Department of Computer Science and Engineering at MVJ College of Engineering, Bangalore, India.
3Dr. K. Sindhanaiselvan, Associate Professor, Department of Computer Science and Engineering, MVJ College of Engineering, Bangalore, India.
4Dr. Mannar Mannan J, Associate Professor, Department of Information Science and Engineering, MVJ College of Engineering, Bangalore, India.

Manuscript received on 10 March 2019 | Revised Manuscript received on 16 March 2019 | Manuscript published on 30 July 2019 | PP: 959-913 | Volume-8 Issue-2, July 2019 | Retrieval Number: B1756078219/19©BEIESP | DOI: 10.35940/ijrte.B1756.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A convenient two factor (2f) authentication is used in smart card password verification. Thus, the two factors are “dynamic ID-based” or “anonymous”. To preserve user privacy, a tamper resistant security feature used in smart cards. Reverse engineering and power analysis techniques were used to reveal some sensitive information from the smart card memory. The smart card verification is securely implemented in memory than in the database that can be easily attacked by any person. A day to day application such as e-banking, e-health and e-governance maintains password tables on server. During login process user identity is transmitted as clear over public networks. Various non-tamper resistant schemes on OTP put forward but claim to be ambitious in design process. Truly a 2f scheme can make sure that the user whoever possess a valid OTP and password can be authorized by the server.
Index Terms: 2f Authentication, EMV, AKE, DA2 Local Secure.

Scope of the Article: Energy Efficient Building Technology