SlideShare a Scribd company logo
1 of 14
1
QR Code based secure OTP distribution
scheme for Authentication in
Net-Banking
TUMMALA SATYAKAMA
SNEHITH PANGULURI
PAGIDALA VIDYHAR REDDY
2
Concepts
 Authentication: It is the process of verifying the
identity of user.
 QR Code: Quick Response code (QR code) is actually
two dimensional bar codes and can store information
in both length and breath.
 OTP: OTP is one time password. It plays a vital role for
authentication in net-banking to make it more secure.
3
Abstract
 Distribution of OTPs to concerned user is a major
issue. Short message service that is available for
mobile phones is the most common methodology
for OTP distribution. QR codes are widely being
used to convey short information such as website
address, mobile numbers etc. In our idea we are
presenting a new authentication scheme for
secure OTP distribution in net banking using QR
codes and via email.
4
Existing methods
 Text message
 Proprietary tokens
 Secure code devices
 Grid file
5
Drawbacks of existing methods
 Some methods use a hash type file to verify users
authentication request which increase risk of
tampering.
 Apart from the above all of the existing methods are
text based methods.
 These increase the risk of being identified in the long
time.
6
What is secure here?
 The OTP and ATM pin are encrypted using AES[*]
encryption standard.
 QR codes are used in the field of cryptography for data
security.
[*] AES is a well known encryption algorithm that is symmetric in
nature. It has also been applied in various application other than data
security.
7
Proposed system
 System consists of a web service that will generate
alpha-numeric OTPs using pseudo-random numbers
and current timestamp.
 Use of timestamp further assures security and
uniqueness of OTP. The alpha-numeric password
string is then encrypted using Advanced Encryption
Standard (AES).
 The key for the algorithm will be ATM pin of the user
since it is unique for every user and can be obtained by
Bank Server in every login session through account
number.
8
 The encrypted string is then converted to QR image
by the Bank Server. It is then sent to the concerned
user using email as transmission medium via SMTP.
 Further process is explained in the flow diagram that
succeeds.
9
Workflow
10
Workflow of proposed
authentication scheme
11
References
 Mohammad Mannan, P. C. Van Oorschot, “Security and
Usability: The Gap in Real-World Online Banking”,
NSPW’07, North Conway, NH, USA, Sep. 18-21, 2007.
 L.Lamport, “Password authentication with insecure
communication, ”Communications of ACM, Vol. 24, No.
11, pp. 770-772, 1981.
12
 Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting-
Ching Lin, “A One-Time Password Scheme with QR-
Code Based on Mobile Phone”, Fifth International Joint
Conference on INC, IMS and IDC, 2009, pp 2069-2071.
 Qiu-xia Wang; Tie Xu; Pei-zhou Wu, "Application
research of the AES encryption algorithm on the engine
anti-theft system," Vehicular Electronics and Safety
(ICVES), 2011 IEEE International Conference on , vol.,
no., pp.25,29, 10-12 July 2011.
13
14
Thank You

More Related Content

What's hot

Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewAkshay Kaul
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondMichael Novak
 
Online bus pass management system
Online bus pass management systemOnline bus pass management system
Online bus pass management systempiyush khadse
 
Drivers for CBDC and implications for architecture
Drivers for CBDC and implications for architectureDrivers for CBDC and implications for architecture
Drivers for CBDC and implications for architectureDavid Birch
 
BUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMBUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMKeerthi Keerthi
 
E Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemE Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemHai Vu
 
Unified Payment Interface (UPI)
Unified Payment Interface (UPI)Unified Payment Interface (UPI)
Unified Payment Interface (UPI)Ravindra Dastikop
 
Online Railway Reservation System
Online Railway Reservation SystemOnline Railway Reservation System
Online Railway Reservation SystemPrince Kumar
 
Wiseasy Profile .pdf
Wiseasy Profile .pdfWiseasy Profile .pdf
Wiseasy Profile .pdfkjhfjfhdsjlf
 
28 javed intelligent agent for 260-264
28 javed intelligent agent for 260-26428 javed intelligent agent for 260-264
28 javed intelligent agent for 260-264Alexander Decker
 
Banking Management System Report .docx
Banking Management System Report .docxBanking Management System Report .docx
Banking Management System Report .docxShubham Jaybhaye
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital PaymentsSantosh Potadar
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On BitcoinTouroxy
 
Payment Gateway History: An interview with the Inventor
Payment Gateway History: An interview with the InventorPayment Gateway History: An interview with the Inventor
Payment Gateway History: An interview with the InventorWayne Akey
 
College transport management system
College transport management systemCollege transport management system
College transport management systemPrateek Singh
 
Srs on-railway-reservation-system
Srs on-railway-reservation-systemSrs on-railway-reservation-system
Srs on-railway-reservation-systemRajesh Salla
 

What's hot (20)

Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian Overview
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
 
Online bus pass management system
Online bus pass management systemOnline bus pass management system
Online bus pass management system
 
Drivers for CBDC and implications for architecture
Drivers for CBDC and implications for architectureDrivers for CBDC and implications for architecture
Drivers for CBDC and implications for architecture
 
BUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMBUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEM
 
E Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemE Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment System
 
Unified Payment Interface (UPI)
Unified Payment Interface (UPI)Unified Payment Interface (UPI)
Unified Payment Interface (UPI)
 
Online Railway Reservation System
Online Railway Reservation SystemOnline Railway Reservation System
Online Railway Reservation System
 
Wiseasy Profile .pdf
Wiseasy Profile .pdfWiseasy Profile .pdf
Wiseasy Profile .pdf
 
Direct Debit System
Direct Debit SystemDirect Debit System
Direct Debit System
 
Srs for banking system
Srs for banking systemSrs for banking system
Srs for banking system
 
28 javed intelligent agent for 260-264
28 javed intelligent agent for 260-26428 javed intelligent agent for 260-264
28 javed intelligent agent for 260-264
 
Banking Management System Report .docx
Banking Management System Report .docxBanking Management System Report .docx
Banking Management System Report .docx
 
Online banking
Online bankingOnline banking
Online banking
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On Bitcoin
 
Digital bus pass
Digital bus passDigital bus pass
Digital bus pass
 
Payment Gateway History: An interview with the Inventor
Payment Gateway History: An interview with the InventorPayment Gateway History: An interview with the Inventor
Payment Gateway History: An interview with the Inventor
 
College transport management system
College transport management systemCollege transport management system
College transport management system
 
Srs on-railway-reservation-system
Srs on-railway-reservation-systemSrs on-railway-reservation-system
Srs on-railway-reservation-system
 

Viewers also liked

Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Pank Jes
 
Secure QR code payment
Secure QR code paymentSecure QR code payment
Secure QR code paymentJames Wu
 
QR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless paymentQR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless paymentMahindra Comviva
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile PaymentsJonathan LeBlanc
 
Concept_presentation_QR_code based_Loyalty system
Concept_presentation_QR_code based_Loyalty systemConcept_presentation_QR_code based_Loyalty system
Concept_presentation_QR_code based_Loyalty systemLEOLEOMAX
 
Developing the Use of QR Codes in Teaching and Learning at the University of ...
Developing the Use of QR Codes in Teaching and Learning at the University of ...Developing the Use of QR Codes in Teaching and Learning at the University of ...
Developing the Use of QR Codes in Teaching and Learning at the University of ...andyramsden
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Steve Werby
 
Mobile payments - Short overview
Mobile payments - Short overviewMobile payments - Short overview
Mobile payments - Short overviewVolgamatics
 
QR Codes for Fun & Profit
QR Codes for Fun & ProfitQR Codes for Fun & Profit
QR Codes for Fun & ProfitRun2LIVE, Inc.
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 
Post University's Online Discussion Forum Guideline
Post University's Online Discussion Forum GuidelinePost University's Online Discussion Forum Guideline
Post University's Online Discussion Forum GuidelinePost University
 
Assessing messaging activity in an online discussion forum using an innovatio...
Assessing messaging activity in an online discussion forum using an innovatio...Assessing messaging activity in an online discussion forum using an innovatio...
Assessing messaging activity in an online discussion forum using an innovatio...Luis Borges Gouveia
 
Best Practices In Discussion Forums
Best Practices In Discussion ForumsBest Practices In Discussion Forums
Best Practices In Discussion ForumsCrystal Mosley
 

Viewers also liked (20)

Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
 
Secure QR code payment
Secure QR code paymentSecure QR code payment
Secure QR code payment
 
Qr code ppt
Qr code pptQr code ppt
Qr code ppt
 
QR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless paymentQR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless payment
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
2FA and OTP
2FA and OTP2FA and OTP
2FA and OTP
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile Payments
 
Concept_presentation_QR_code based_Loyalty system
Concept_presentation_QR_code based_Loyalty systemConcept_presentation_QR_code based_Loyalty system
Concept_presentation_QR_code based_Loyalty system
 
Developing the Use of QR Codes in Teaching and Learning at the University of ...
Developing the Use of QR Codes in Teaching and Learning at the University of ...Developing the Use of QR Codes in Teaching and Learning at the University of ...
Developing the Use of QR Codes in Teaching and Learning at the University of ...
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Qrcodes
QrcodesQrcodes
Qrcodes
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
Mobile payments - Short overview
Mobile payments - Short overviewMobile payments - Short overview
Mobile payments - Short overview
 
QR Codes for Fun & Profit
QR Codes for Fun & ProfitQR Codes for Fun & Profit
QR Codes for Fun & Profit
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
Plone OTP
Plone OTPPlone OTP
Plone OTP
 
Post University's Online Discussion Forum Guideline
Post University's Online Discussion Forum GuidelinePost University's Online Discussion Forum Guideline
Post University's Online Discussion Forum Guideline
 
QR code
QR codeQR code
QR code
 
Assessing messaging activity in an online discussion forum using an innovatio...
Assessing messaging activity in an online discussion forum using an innovatio...Assessing messaging activity in an online discussion forum using an innovatio...
Assessing messaging activity in an online discussion forum using an innovatio...
 
Best Practices In Discussion Forums
Best Practices In Discussion ForumsBest Practices In Discussion Forums
Best Practices In Discussion Forums
 

Similar to Qr code based secure otp distribution scheme for Online banking

Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingIRJET Journal
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreementijtsrd
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...Venkat Projects
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 

Similar to Qr code based secure otp distribution scheme for Online banking (20)

Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
E0962833
E0962833E0962833
E0962833
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
otp crid cards
otp crid cardsotp crid cards
otp crid cards
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
120 i143
120 i143120 i143
120 i143
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Qr code based secure otp distribution scheme for Online banking

  • 1. 1 QR Code based secure OTP distribution scheme for Authentication in Net-Banking
  • 3. Concepts  Authentication: It is the process of verifying the identity of user.  QR Code: Quick Response code (QR code) is actually two dimensional bar codes and can store information in both length and breath.  OTP: OTP is one time password. It plays a vital role for authentication in net-banking to make it more secure. 3
  • 4. Abstract  Distribution of OTPs to concerned user is a major issue. Short message service that is available for mobile phones is the most common methodology for OTP distribution. QR codes are widely being used to convey short information such as website address, mobile numbers etc. In our idea we are presenting a new authentication scheme for secure OTP distribution in net banking using QR codes and via email. 4
  • 5. Existing methods  Text message  Proprietary tokens  Secure code devices  Grid file 5
  • 6. Drawbacks of existing methods  Some methods use a hash type file to verify users authentication request which increase risk of tampering.  Apart from the above all of the existing methods are text based methods.  These increase the risk of being identified in the long time. 6
  • 7. What is secure here?  The OTP and ATM pin are encrypted using AES[*] encryption standard.  QR codes are used in the field of cryptography for data security. [*] AES is a well known encryption algorithm that is symmetric in nature. It has also been applied in various application other than data security. 7
  • 8. Proposed system  System consists of a web service that will generate alpha-numeric OTPs using pseudo-random numbers and current timestamp.  Use of timestamp further assures security and uniqueness of OTP. The alpha-numeric password string is then encrypted using Advanced Encryption Standard (AES).  The key for the algorithm will be ATM pin of the user since it is unique for every user and can be obtained by Bank Server in every login session through account number. 8
  • 9.  The encrypted string is then converted to QR image by the Bank Server. It is then sent to the concerned user using email as transmission medium via SMTP.  Further process is explained in the flow diagram that succeeds. 9
  • 12. References  Mohammad Mannan, P. C. Van Oorschot, “Security and Usability: The Gap in Real-World Online Banking”, NSPW’07, North Conway, NH, USA, Sep. 18-21, 2007.  L.Lamport, “Password authentication with insecure communication, ”Communications of ACM, Vol. 24, No. 11, pp. 770-772, 1981. 12
  • 13.  Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting- Ching Lin, “A One-Time Password Scheme with QR- Code Based on Mobile Phone”, Fifth International Joint Conference on INC, IMS and IDC, 2009, pp 2069-2071.  Qiu-xia Wang; Tie Xu; Pei-zhou Wu, "Application research of the AES encryption algorithm on the engine anti-theft system," Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference on , vol., no., pp.25,29, 10-12 July 2011. 13