An improved dual enciphering intrigue for banking process using adaptive huffmann coding

The usage of Internet banking has grown in leaps and bounds because of its appliance. The privacy and Information confidentiality is one of the richest invades to the users of Online Banking Systems. The issue with Online banking applications is that they need to send the confidential contents such as Personal Identification Number (PIN), One Time Password (OTP) to the targeting customers in the form of plaintext, which is insecure. The solvent to the above consequences requires a software-application that holds proficient encryption procedures. To improve the security of the content that is transmitted over the internet, the proposed technique introduce a Dual Enciphering Mechanism (DEM) which includes more than one cryptographic scheme for cipher text creation, which assures the secured transmission over the network environment and the application is developed in Java language as a secured dual enciphering intrigue (SDEI). In this nominated overture the confidential banking content such as personal identification number (PIN) is enciphered using Huffmann compression technique, which in turn subjected to symmetric encryption procedure and the key for the compression scheme is taken in the form of image, which is then transmitted in the form of image shares using the idea of visual cryptography. The content at the receiver end is submitted to deciphering process, which needs the symmetric crypto scheme key to get the intermediate code which in turn needs the image shares to regenerate the original plain text. Hence through the proposed scheme the security issues such as `meet in the middle attacks' and `anonymous hacking' would be reduced and from the experimental results it is identified that the proposed scheme works effectively in terms of memory occupation and execution time and grants secured transactions over the network.

[1]  S. Ramamoorthy,et al.  Double Encryption Based Secure Biometric Authentication System , 2012 .

[2]  Alistair Moffat,et al.  Housekeeping for prefix coding , 2000, IEEE Trans. Commun..

[3]  Hakan Isik,et al.  A Huffman compression based text steganography method , 2012, Multimedia Tools and Applications.

[4]  Inder Jeet Taneja,et al.  Bounds on the redundancy of Huffman codes , 1986, IEEE Trans. Inf. Theory.

[5]  Martin E. Hellman,et al.  On the security of multiple encryption , 1981, CACM.

[6]  Durga Prasad Sharma,et al.  Cloud Computing Security through Cryptography for Banking Sector , 2011 .

[7]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[8]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[9]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[10]  Hongjun Liu,et al.  Triple-image encryption scheme based on one-time key stream generated by chaos and plain images , 2013, J. Syst. Softw..

[11]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[12]  Syeda Farha Shazmeen,et al.  A Practical Approach for Secure Internet Banking based on Cryptography , 2012 .

[13]  G. Manikandan,et al.  A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme , 2012 .

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.