Secure Transaction using Dynamic Session Key
T. Mekala1, N. Madhu Suganya2
1T.Mekala, Asst. Professor, Department of CSE, M.Kumarasamy college of Engineering. Karur, Tamilnadu, India.
2N.Madhu Suganya, PG Scholar, Department of CSE, M.Kumarasamy college of Engineering. Karur, Tamilnadu, India.
Manuscript received on March 05, 2013. | Revised Manuscript received on March 11, 2013. | Manuscript published on March 15, 2013. | PP: 40-44 | Volume-1 Issue-4, March 2013. | Retrieval Number: D0189031413/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cryptography is a concept to protect data during transmission over wireless network. Cryptography is used in information security to protect information from unauthorized or accidental disclosure while the information is in transmitting (either electrically or physically) and while information is in storage. The information could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption/decryption methods to enhance data security. The existing system limits only the total number of users from the unknown remote host to as low as the known remote host. It uses the white list values for tracking legitimate users. But the cookie value expires after certain time period. So the attackers may use different browsers or may try on another machine or may retry after certain time. If any malicious attacks occurred the authenticated user does not know about that. The proposed system uses two algorithms known us Bio-Metric Encryption Algorithm (BEA), Minutiae Extraction Algorithm (MEA). It uses Multi Bio-metric features for authentication purpose. And also this system dynamically generates a new Session Key for each transaction. So the proposed system will protect Data Confidentiality, Data Integrity, Authentication, Availability, Access control of information over the network.
Keywords: Biometric Encryption Algorithm, Finger print, Minutiae Extraction Algorithm, Session key, Biometrics.