An Approach to Improve the Security of Online System using Crypto System
نویسندگان
چکیده
Presently, the chief problem facing Internet banking is the security of online transactions. That’s why, 3-tier security is used to make the transaction more secure. Among the 3-Tier Security layers, Application layer security comes first as it is the topmost layer in OSI model. The visitors always assume about the security and safety of these transactions, and so they are steadily lose their trust on the bank due to increase of various online Internet attacks. Now, it is trying to design an approach to enhance the Application Layer Security in case of online security application. It helps to make a latest idea about online banking transactions as well as increases trust and security over the existing theory, by challenge-response mutual authentication process. This paper says about possible preventions of Password Guessing by padding a random string in the different position of the password depending upon UTC (Coordinated Universal Time) time and Nearest Prime Number Concept. We also propose an algorithm on Multiple Key Block Cipher Symmetric Encryption (MKBCSE) algorithm which is advantageous in many respect than other existing symmetric key encryption technique. Different Key generation and NOB variable have major important role here, because the key here changes after a certain number of bits (NOB). Key comprises of various components and is a combination of various server and client related information. This makes it hard for the attacker to guess the key. Keyword:-Random string Padding, Multiple key symmetric encryption with block cipher, NOB.
منابع مشابه
An automated approach to analysis and classification of Crypto-ransomwares’ family
There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...
متن کاملA Robust Feedforward Active Noise Control System with a Variable Step-Size FxLMS Algorithm: Designing a New Online Secondary Path Modelling Method
Several approaches have been introduced in literature for active noise control (ANC)systems. Since Filtered-x-Least Mean Square (FxLMS) algorithm appears to be the best choice as acontroller filter. Researchers tend to improve performance of ANC systems by enhancing andmodifying this algorithm. This paper proposes a new version of FxLMS algorithm. In many ANCapplications an online secondary pat...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملDesign and Implementation of an Online Test System to Evaluate the Students more Precisely and Improve the Quality of Education
Introduction: Evaluation, play a role in increasing motivation, raising the level of students knowledge, and improving the quality of teaching. Today, educational technology is used to assess the level of learning and to improve the level of student’s knowledge and to increase the incentive to participate in classrooms. This article aims to design and implement an online test system to conduct ...
متن کاملCrypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems
In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age. To locate the issue in a historical perspective and in line with this strand of thought, we consid...
متن کامل