AUTHENTICATION VIA SECRET QUESTIONS AND SPACIO-LOCATION WITH SMARTPHONE AND APP USING HYBRID ENCRYPTION PASSWORD TECHNIQUE
Keywords:
smart phone sensor, Geo-location, AES algorithm, blowfish algorithm, Annotation password,hyprid encryption password technique, KNN algorithmAbstract
Atpresent with growing popularity of on the internet purchasing Debit or Credit card fraud. Personalized
data securities are main considerations for all. Several worldwide network application supply secondary verification
techniques i.e., leading confidential query (or retrieve forgot password queries), to reboot the account password once a
user’s login fails. Nowadays prevalence of intelligent phones has authorized us latest possibility to monitor and
recognize the personal information gather by intelligent mobile phone detector and apps can guide to develop and
modified the confidential question not including having abusing the customers confidentiality issues. We current a new
login technique exactly where customers supply username, secrete location and secret keyword to login. We also use
Confidential-Queries based on typically verification method, known as Confidential-Query that generates a set of
confidential questions on standard of people sensible mobile phone utilization. If some of purpose user forgot password
or mistype password then user can’t accessibility his/her account. To get the accessibility of account user have to reply
the security question. In current method User supply password recovery electronic mail id, mobile number at the time of
registration. System user can reset his/her password by electronic mail, mobile. Third party authentication technique
generates bunch of confidential queries according to the information of end users every day action. We evaluated the
dependability and protection by making use of accurate true/false variety secret questions. To provide the additional
security to secret location and secret keyword using hybrid encryption technique which is combination of AES blowfish
algorithm. The best objective of the examination provided in this paper is to develop both AES as well as Blowfish to be
decreased power, actual-time, superior bandwidth, reputable and also incredibly secure cryptography formula.
Evaluation of AES and blowfish algorithm is tough to make sure thathacker does not possible to hack the system.