Anti-Phishing Design Using Mutual Authentication Approach

Abstract

The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft. The e-mail endorse the client to visit a mimic Web site where they are request to update individual information, such as credit card number, bank account numbers, date of birth, confidential passwords etc., the above process is known as Phishing. We recommend an approach, “anti-Phishing Design using Mutual Authentication Approach” With mutual authentication, a connection can occur only when the client trusts the server and the server trusts the client. The exchange of data is carried out by means of the Security protocol. For the anti-Phishing system we are proposed mutual authentication protocol & hash generating function RIPEMD-160 along with one time password. Our process can efficiently reduce the risk of phishing in very simple steps to naive computer user

Authors and Affiliations

Mitesh Bargadiya , Vijay Chaudhari , Mohd. Ilyas khan , Bhupendra Verma

Keywords

Related Articles

 Fault-Tolerance and Permutation Analysis of ASEN and its Variant

 High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory mo...

E-Governance and Effective Deliverance of Information and Services to Citizens Architecture

By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...

Performance Enhancement of MC-CDMA System through STTC based STBC Site Diversity

The combination of multiple antennas and multicarrier code division multiple access (MC-CDMA) is a strong candidate for the downlink of future mobile communications. The study of such systems, in scenarios that model rea...

A Journey on WiMAX and its Security Issues

Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my...

The Foot Step of mobile network - wireless network architecture

In this paper we discuss a modal of embedded Linux system support wireless network and its management. Wireless networks spread over a large physical area. Physical access of each node in other words signal sending place...

Download PDF file
  • EP ID EP134442
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Mitesh Bargadiya, Vijay Chaudhari, Mohd. Ilyas khan, Bhupendra Verma (2010). Anti-Phishing Design Using Mutual Authentication Approach. International Journal of Computer Science and Information Technologies, 1(3), 175-178. https://europub.co.uk/articles/-A-134442