I10320789S219
Progressing Biometric Security Concern with Blowfish Algorithm
R. Sridevi1, S. Selvi2
1R. Sridevi, Associate Professor & Head, Department of Data Analytics & B Voc (N/W & MA), PSG College of Arts & Science, Coimbatore, Tamilnadu, India.
2S. Selvi, Associate Professor in Computer Science, PSG College of Arts & Science, Coimbatore, Tamilnadu, India.
Manuscript received on 09 August 2019 | Revised Manuscript received on 16 August 2019 | Manuscript Published on 31 August 2019 | PP: 166-171 | Volume-8 Issue-9S2 August 2019 | Retrieval Number: I10320789S219/19©BEIESP DOI: 10.35940/ijitee.I1032.0789S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The world today is completely secured with most recent advancements. Consequently the security is still a huge issue. Biometric provides high security with more precision which recognizes the individual dependent on their physiological qualities of a person by utilizing their biometrics. It aims that the biometric will build security, dependability and agreeableness in the most recent innovation of PC framework. The mainstream MIPS based cryptography processor is utilized for equipment and programming items and guidelines require cryptography keys length for higher security level. Merging biometric with MIPS cryptography processor is as a possible arrangement. We utilize new way to deal with Network security utilizing MIPS constructed crypto processor situated in light of contactless palm vein biometric framework. This methodology considers NOC limitations and its topology. It gives greater security with less key length and there is no compelling reason to store any private key anyplace. Blow fish algorithm is more secure to analyze other symmetric key calculations, and deliver best outcome for less handling time and adjusts to build the key size of blowfish calculation.
Keywords: Cryptography, Biometrics, MIPS and Blowfish algorithm.
Scope of the Article: Cryptography and Applied Mathematics