2018
DOI: 10.14569/ijacsa.2018.090253
|View full text |Cite
|
Sign up to set email alerts
|

Securely Eradicating Cellular Dependency for E-Banking Applications

Abstract: Numerous applications are available on the Internet for the exchange of personal information and money. All these applications need to authenticate the users to confirm their legitimacy. Currently, the most commonly employed credentials include static passwords. But people tend to behave carelessly in choosing their passwords to avoid the burden of memorizing complex passwords. Such frail password habits are a severe threat to the various services available online especially electronic banking or e-banking. Fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 22 publications
0
7
0
1
Order By: Relevance
“…Cryptographic algorithms offer security to the web by preserving the integrity of data [4]. Bunches of scientists and programmers are continually endeavouring and trying to find weaknesses to break these algorithms by utilizing most grounded side channel and brute force assaults [5] [6]. Some assaults were triumphant as it was the situation for the Data Encryption Standard in 1993, where the distributed cryptanalysis assault could break the DES.…”
Section: Revised Manuscript Received On August 3 2019mentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptographic algorithms offer security to the web by preserving the integrity of data [4]. Bunches of scientists and programmers are continually endeavouring and trying to find weaknesses to break these algorithms by utilizing most grounded side channel and brute force assaults [5] [6]. Some assaults were triumphant as it was the situation for the Data Encryption Standard in 1993, where the distributed cryptanalysis assault could break the DES.…”
Section: Revised Manuscript Received On August 3 2019mentioning
confidence: 99%
“…Since the hash value is irreversible, data integrity & security is guaranteed. Now, at the receiver end, for determining the S-Box to be used, the secret key is iteratively divided by the no's (1)(2)(3)(4)(5)(6)(7)(8)(9)(10) and the corresponding hash values are stored in an array. The hash value that is received at the receiver end is compared with the hash values in the array.…”
Section: C) Selection Of S-boxmentioning
confidence: 99%
“…Since the hash value is irreversible, data integrity & security is guaranteed. Now, at the receiver end, for determining the S-Box to be used, the secret key is iteratively divided by the no's (1)(2)(3)(4)(5)(6)(7)(8)(9)(10) and the corresponding hash values are stored in an array. The hash value that is received at the receiver end is compared with the hash values in the array.…”
Section: C) Selection Of S-boxmentioning
confidence: 99%
“…Even number of one's, so R2 = 0. R3 = c [3] = c [3]k [4]k [5]k [6]k [2]k [1] = Even number of one's, so R3 = 0. R4 = c [4]k [4]k [5]k [6]k [7] = 10111 R4 = 0 R5 = c [5]k [4]k [5]k [6]k [7]k [8] = 001110 [6]k [4]k [5]k [6]k [7]k [8]k [1] = 0011101 R6 = 0 R7 = c [7]k [4]k [5]k [6]k [7]k [8]k [1]k [2] = 00111010 R7 = 0 R8 = c [8]k [4]k [5]k [6]k [7]k [8]k [1]k [2]k [3] = 001110101…”
Section: R2 = C[2]k[(1+3)%8]k[(2+3)%8]k[(5+3)%8]k[(6+3)%8]unclassified
See 1 more Smart Citation