Вы находитесь на странице: 1из 20

E-Banking Security:

Message
Authentication
Image(MAI)
Under the guidance of,
Dr. Abdul Nizar
Dept. of CSE

Presented by,
REJIN R
Roll No:11
M1 IS

CONTENTS

Introduction

Problem Definition

Message Authentication Code(MAC)

Fractal & Chaos

System Analysis

Drawbacks of Existing system

Proposed System

Advantages of Proposed System

Conclusion

Reference

INTRODUCTION

E-banking plays an important role in today world.

Main types of attacks in E-banking are:


Phishing

trends, such as spear phishing


Pharming
Whaling and Fast-flux service networks

Existing Protection mechanisms:


One

time passwords
e-signatures
hardware authenticators
smart card based solutions
software based solutions

MAC provides Authentication & Integrity only, not Digital Signature.

PROBLEM DEFINITION

Conventional
E-banking
systems
utilize
MAC(Message Authentication Code) scheme. It
can provide Authentication & Message Integrity.

But it cant provide Digital Signature.

Extra Digital signature algorithms are need to be


introduced for this purpose, which is time
consuming.

MESSAGE AUTHENTICATION

Procedure to verify that received messages come


from the alleged source and have not been
altered.

Also verify sequencing and timeliness.

Provides security against following attacks:


Masquerade
Content

Modification

Sequence
Timing

Modification

Modification

Authenticator-Value to be used to authenticate a


message.
Methods used to produce an authenticator:
Hash Function
Message Encryption
Message Authentication Code(MAC)
Digital Signature:
MAC does not provide a digital signature, because
both sender and receiver share the same key.

FRACTALS & CHAOS

Fractals are very complex infinitely detailed and


highly irregular geometric shapes.

Fractals are related to chaos-since, they are much


complex systems with definite properties.

Method for generation of Fractals=Iterated Function


System(IFS)

Chaos arises in dynamical systems- two arbitrarily


close starting points diverges exponentially , so that
their future behavior become unpredictable.

EXISTING SYSTEM

MESSAGE AUTHENTICATION
CODE (MAC)

PROPOSED SYSTEM

Algorithm

In proposed method there are three different Phases.


1. Login Phase
2. Passmark image Generation Phase
3. Digital Signature Phase
Assumptions:
UId User name
PImg server side Passmark Image
ClImg
Client side Passmark Image
FClImg Resultant Fractal Image in Client side
FSImg
Resultant Fractal Image in sever side

1) LOGIN PHASE: THE USER ENTERS THE USER


NAME.
[Input userid]
Verifies tok(UId)
If(tok(UId))
{
Authorized UId
}
else
{
exit(0);
}

Message Authentication,Confidentiality and


Digital Signature: Authentication tied to
CipherText

2) PASSMARK IMAGE
GENERATION PHASE:
Verify tok(UId)
If(tok(UId))
{
Generate(PImg)
Submit(PImg)
}
else
{
exit(0);
}

3) DIGITAL SIGNATURE PHASE


3.1 SERVER VERIFICATION (ORIGINAL SITE):
Verify (PImg)
If(ClPImg = = PImg)
{
enable password text box;
type(pass)
}
else
{
exit(0);
}

3) DIGITAL SIGNATURE PHASE


3.1 CLIENT VERIFICATION (ORIGINAL CLIENT):
Verify(Client)
Num=Rand()
GenerateFractal(Embedd(pass,FClImg))
If(FClImg==FSImg)
{
Valid user:Allow for further transaction
}
Else
{
Exit(0);
}

ADVANTAGES OF PROPOSED SYSTEM

Algorithm can provide Authentication,Integrity


and Digital signature at the same time.

Proposed Method is much faster compared to


conventional systems since generation of
Fractals are easier to produce.

REFERENCES

[1] G.Geetha, K.Thamizhchelvy, E-Banking Security: Mitigating Online Threats


Using Message Authentication Image (MAI) Algorithm, 2012 International
Conference on Computing Sciences

[2] Kiani. K, Arian. M, Soleimani. V Image authentication using fractal


watermarking and chaos theory 4th International Conference on Signal
Processing and Communication Systems (ICSPCS), 2011.

[3] El-Khamy, S.E. Khedr, M. AlKabbany A hybrid fractal-wavelet data hiding


technique, National Radio Science Conference, Pages :1 - 9 ,Print ISBN: 978977-5031-95-2, 2008

[4] S. K. Ghosh, Jayanta Mukherjee et al Fractal image compression: a


randomized approachJournal of Pattern Recognition Letters,Volume 25 Issue
9, 2 July 2004 .

[5] John C. Hart Fractal Image Compression and Recurrent Iterated Function
Systems, journal of IEEE Computer Graphics and Applications , Volume 16
Issue 4, July 1996.

Thanks!

Вам также может понравиться