two factor authentication cryptography user-proof protection identity theft one time password authentication identity theft protection fraud strong authentication encryption online fraud credit card fraud single console id theft strong file-based encryption security