Loading

Securing Online Transactions with Cryptography and Secured Authentication Methods
A. Aruna1, Devansh Sharma2, Manikanta Elluru3, Subha Sarkar4
1Ms. A. Aruna, Department of Computer Science Engineering (Asst. Prof.), SRM Institute of Science and Technology, Chennai, India.
2Devansh Sharma, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai, India.
3Manikanta Elluru, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai, India.
4Subha Sarkar, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai, India.

Manuscript received on 09 April 2019 | Revised Manuscript received on 14 May 2019 | Manuscript published on 30 May 2019 | PP: 1424-1427 | Volume-8 Issue-1, May 2019 | Retrieval Number: A3278058119 /19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cyber attacks are the common thing which is happening very frequently due to increase in online transactions. Millions of transaction takes place everyday and with increase in the numbers of it ,Stealing user credentials and using it with unauthorized access to do fraud transaction is increasing rapidly. One of the major frauds and stealing of user credential is done during credit card and debit card transactions. We are introducing multi-step authentication and secured algorithm to secure the confidential data. When credit card or debit card is swiped in POS machine or at any counter where the magnetic strip of card is used then automatically machine reads the card details and sends it to the merchant for further completing the transaction. When card details are sent to the are shared between merchant and bank of both the parties then there are several chances of stealing the information of card’s confidential details during the process. Further, there is very weak security at the user end as without user consent, transaction can be carried out. Inorder to secure the transaction at initial stage when the card will be swiped in any machine or any cards data will be used, Card owner have to enter the 4-digit code in bank app to approve the transaction. Then secondly when the card data will be shared between merchant and bank then it will be secured by AES algorithm so that in between process, details can’t be misused by any cyber hack. Finally, eight-digit OTP generated will be the final step to complete the process. These three steps will secure the card transactions which will result in less cyber-crimes.
Index Terms: Cyber Attacks, AES Algorithm, Authentication, Cryptography, Online Transactions
Scope of the Article: Authentication, Authorization, Accounting