Authentication in Online Banking Systems through Quantum Cryptography
|
|
|
- Dinah Watkins
- 10 years ago
- Views:
Transcription
1 Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 [email protected], 2 [email protected] Abstract-The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated researchers to introduce a new structure. Online banking is the newest delivery channel for retail banking services. Online banking facilitated by various Electronic Commerce technologies, has helped commercial banks to stay competitive through productivity gains, transaction cost reduction and customer service improvement. Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication in the early implementations was, and sometimes still is, vulnerable to various attacks such as phishing. It is known that the quantum cryptography protocols are able to detect immediately any attempt to attack the key exchange and the authentication process. This paper presents an introduction of online banking and quantum cryptography. In this paper we are proposing a model for authentication in online banking system with quantum cryptography. Keywords- Online banking. Quantum Cryptography, QKD, Security, Authentication. I. INTRODUCTION There are differing definitions related to online banking found in the literature, online banking refers to performing banking transactions using electronic medium over internet. Technological developments particularly in the area of telecommunications and information technology which are revolutionizing the banking industry [1] and the importance of online banking are growing because of its wider reach and lower cost per transaction. Most of banks are using the Internet as a new distribution channel. Online banking has triggered massive change in the commercial banking practices since it was first introduced as home banking services by the four major New York banks in 1981 [2]. The last few years have witnessed profound technological changes among which is the advent of electronic commerce, or the exchange of products (tangible and otherwise) and payments via telecommunication systems. It covers various initiatives such as Internet banking, Internet payment system, phone banking, and mobile banking. Potentialities of this technology are remarkable, specifically in banking industry. Many banks have established presence on the Internet and many others are in the process of doing so using telecommunication systems and technologies, a bank can reach out to users and provide them with not only general information about its services but also the opportunity of performing interactive retail banking transactions [3]. Capitalizing on e- Commerce s ability to offer productivity gains, transaction cost reductions, improved customer services and flexibility in fulfilling user s changing needs and lifestyles, online banking has enabled banking institutions to compete more effectively in this global environment, extending their products and services beyond the restriction of time and space [4]. Having an interactive nature, the Internet as a channel for services delivery is fundamentally different from other channels, such as branch networks or telephone banking [5]. Online banking has been introduced as a solution and started with the use of software and private network in first. Currently, the Internet and the World Wide Web have impacts on the way banks doing the business. Today, international trade has grown significantly. More recently, deregulation and globalization have led to a spectacular growth in the value of nontrade-related financial transactions. The range of functions that are usually offered by telecommunication systems of online banking include displaying balances and statements, paying bills, transferring money between accounts, viewing standing orders and direct debits, viewing transactions with a search and sort facility, ordering cheque books, and transferring information into other software like a personal financial manager [6]. This paper is organized as follows. Section 2 presents the systematic approach for authentication in online banking system. Section 3 gives an overview of Quantum Cryptography and Quantum Key Distribution. Use of QKD in Online Banking System will be explained in section 4. Finally, conclusion and future work will be presented in section 4. ISSN : Vol 5 No 3 Jun-Jul
2 II. AUTHENTICATION IN ONLINE BANKING SYSTEM In online banking systems, banks must ensure that users feel safe when using online banking services. They can control the level of authentication it takes to enter their sites. They can limit and deter attackers by making it far too difficult to have success in obtaining fraudulent access to a customer s account. Fig. 1 Authentication in online Banking Fig.1 shows the authentication process in a traditional online banking system. Following are the steps of authentication in an online banking system. 1. Produce Login Id and Pass-code 2. Transmit Login Id and Pass-code 3. Verify Login Id and Pass-code 4. Transmit service options 5. Present service options 6. Transaction request 7. Transmit transaction request 8. Transmit transaction confirmation 9. Present transaction confirmation III. QUANTUM CRYPTOGRAPHY The quantum cryptography is based on the Heisenberg uncertainty principle of quantum mechanics and photon polarization. According the Heisenberg Uncertainty principle, it is not possible to measure the quantum state of any system without disturbing that system. Thus, the polarization of a photon or light particle can only be known at the point when it is measured. Secondly, the photon polarization principle describes how light photons can be oriented or polarized in specific directions. Moreover, a polarized photon can only be detected by a photon filter with the correct polarization or else the photon will be destroyed. It is this one-way-ness of photons along with the Heisenberg Uncertainty principle that make quantum cryptography an attractive option for ensuring the privacy of data and defeating eavesdroppers. Fig. 2.The basic idea of Quantum Cryptography. The concept of quantum cryptography (QC) was introduced by Bennett and Brassard in the early 1980s [7]. The BB84 protocol is the first quantum key distribution (QKD) protocol, which was proposed by Bennett and Brassard in Then other protocols succeeded like the protocol with two states, the protocol with six states, the protocol of Einstein- Podolsky-Rosen and others. They all exploit the disturbances of the quantum states inevitably caused by the indiscretions. But the majority of the experiments of quantum cryptography are now limited to protocol BB84 because it is simple and due to limited physical devices necessary for its implementation. In the beginning of the year 90, the first experiment was carried out by Charles Bennett and ISSN : Vol 5 No 3 Jun-Jul
3 Brassard and their colleagues at the laboratory of IBM over 30cm through the air [8]. The first demonstration on an optical fiber was successfully executed in the university of Geneva in 1993 [9]. Fig. 3. Conventional Model for Quantum Cryptography IV. QC in ONLINE BANKING Online banking is increasingly becoming more complex and sophisticated. As internet is becoming more popular to check account balances and transfer funds between accounts worldwide. As wired and wireless banking are becoming more popular worldwide, their securities continue to be major concerns among users. Nowadays, Banks and financial institutions use either symmetric cryptography or asymmetric cryptography. However, due to the advent of sophisticated technology and cryptanalysis techniques, security solutions are not unconditionally secure. As computers become more powerful, encryption and decryption keys have to be longer in order to retain the level of difficulty. So transactions could be corrupted and altered without the awareness of the bank. This constitutes a serious danger because criminals and malicious organizations could profit of the breach to steal and highjack. Securing critical financial transaction is mandatory and will be more and more necessary to master economical crime. One of major concerns in online-banking is a security threat. This section discusses on main challenges in online-banking i.e. authentication. Since most online-banking applications use some pass-code or PIN for commercial transaction settlements. Researchers have been actively involved in development of secured methods for online-banking over the Internet. Authentication is even more sensitive issues in online banking. The banking industry is regulated and monitored by governments and online-banking need to assure regulators of security for their clients. Researchers throughout the world are experimenting new techniques in authentication for online banking security. The idea is that user information can be transmitted through QKD. The quantum cryptography performances have already captured the interest of banks, companies and institutions, and many of them are testing this technology, that is commercially available: MagiQ Technologies, New York; idquantique, Geneve and SmartQuantum, New York. Single factor authentication in online banking is no longer sufficient to protect accounts. Our objective is to propose an authentication method for the online banking security. Our proposed model can be seen in figure 4. The starting point is the user s request. In the event of a request, the user is redirected to authentication service, carrying with him/her some kind of Pass code or PIN. After verifying that pass code or PIN the user will access that Quantum cryptosystem. Quantum Cryptography / Quantum Key Distribution involvement is needed only to authenticate. Entities involved are the user, user s pass-code/pin and the quantum cryptosystem. Fig. 4. Quantum Cryptography for User Authentication We are sketching out the entire process of authentication using a user authentication and QKD user authentication to decide whether access is granted or not. ISSN : Vol 5 No 3 Jun-Jul
4 Fig. 5. User Authentication through Quantum Cryptography Here we are having step by step scheme for our proposed authentication mechanism. In this proposed model we have introduced quantum cryptography concept for authentication. Figure 5 shows the steps for authentication. The two levels of authentication we have used in an online banking system to stronger the authentication. 1. Produce Login Id and Pass-code 2. Transmit Login Id and Pass-code 3. Verify Login Id and Pass-code 4. Transmit service options 5. Present service options 6. Transaction request 7. Transmit transaction request 8. Quantum Key Distribution 9. Produce Quantum code 10. Transmit Quantum code 11. Verify Quantum code 12. Transmit transaction confirmation 13. Present transaction confirmation This scheme of authentication is an enhancement of the standard authentication scheme which authenticates the customer to the online banking system. Strength of this Quantum authentication is that it allows the user to have a higher level of trust in any communication they receive from the banks and it allows users to feel safe when logging into their accounts. V. CONCLUSION The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Online Banking is multifaceted and impacted by changes in such technology, deregulation of many parts of finance, the emergence of new banking institutions and economic restructuring. The relationship between theory and practice may be considered weak and unstructured, as qualitative approaches have been criticized for not infusing theoretical factors. To this end, in this paper an attempt was made to address this issue by developing a theoretical framework which may improve the online banking security. Nowadays the cost of a Quantum Cryptography system can be estimated around one hundred of thousands of dollars, but we expect that it will get cheaper and will be implemented in banks in the next few years. REFERENCES [1] M.S. Sohail, B. Shanmugham, E-banking and customer preferences in Malaysia: An empirical investigation, Information Sciences (2003). [2] Osho, G.S., How technology is breaking traditional barriers in the banking industry: Evidence from financial management perspective. European Journal of Economics, Finance and Administrative Sciences, 2008(11): p [3] A.M. Aladwani, Online banking: a field study of drivers, development challenges, and expectations, International Journal of Information Management 21 (2001) [4] Turban, E., et al., Electronic commerce: a managerial perspective. 4th Edition ed. 2008: Prentice Hall. [5] M.H. Shah, F.A. Siddiqui, Organisational critical success factors in adoption of e-banking at the Woolwich bank, International Journal of Information Management 26 (2006). [6] C.S. Elizabeth Daniel, On-line Banking: Strategic and Management Challenges, Long Range Planning 30 (1997) [7] C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, New York, Bangalore, India, 1984, pp ISSN : Vol 5 No 3 Jun-Jul
5 [8] C.H. Bennett, G. Bessette, G. Brassard, L. Salvail, and 1. Smolin, Experimental quantum cryptography, Advanges in Cryptology Eurocrypt '90 Proceedings, pages , May [9] Muller, 1. Breguet, and N. Gisin, Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than lkm, Europhysics Letters, 23: , August [10] Anand Sharma, Vibha Ojha, R.C.Belwal, Vishal Goar Quantum cryptography The Concept and challenges in proceeding of 2nd International Conference on Computer and Automation Engineering (ICCAE 2010) Singapore, volume 1, 2010 pp [11] Lee Y. G., "The influence of security and risk perception on the reuse of internet banking", The Journal of MIS Research, Vol.17, No.1, 2007, pp [12] Anand Sharma, Vibha ojha, R.C.Belwal, Gaurav Agarwal Transmission and System Control in Quantum Cryptography International Journal of Computer Technology and Applications. Volume 2 (3) 2011 pp [13] Suh, B. and I. Han, "Effect of trust on customer acceptance of Internet banking", Electronic Commerce Research and Applications, Vol.1, 2002, pp [14] Yu I. and So S. H., "An empirical study on the factors influencing the usage intention of internet banking systems", The Journal of Industrial Economic Research, Vol.17, No.6, 2004, pp [15] M. Quaddus, D. Achjari, a model for electronic commerce success, telecommunications policy (2005) [16] M. Pohjola, The New Economy: Facts, Impacts and Policies, Information Economics and Policy, 14, pp [17] C.S. Yiua, K. Grantc, D. Edgar, Factors affecting the adoption of Internet Banking in Hong Kong implications for the banking sector, International Journal of Information Management 27 (2007) [18] C.S. Elizabeth Daniel, On-line Banking: Strategic and Management Challenges, Long Range Planning 30 (1997) [19] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, User acceptance of information technology: Toward a unified view, MIS Quarterly, vol. 27, no. 3, pp , [20] B. H. Wixom and P. A. Todd, A theoretical integration of user satisfaction and technology acceptance, Information System Research, vol. 12, no. 1, pp , ISSN : Vol 5 No 3 Jun-Jul
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
The New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,
Towards Securing E-Banking by an Integrated Service Model Utilizing Mobile Confirmation
Research Inventy: International Journal of Engineering And Science Vol.4, Issue 9 (Sept 2014), PP 26-30 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Towards Securing E-Banking by an
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Quantum Encoder and Decoder for Secret Key Distribution with Check Bits
Research Journal of Applied Sciences, Engineering and Technology 6(23): 4381-4386, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 31, 2013 Accepted: May
Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission
Title Application of Quantum Cryptography Detectable Data Transmission Author(s) Kudo, Takamitsu; Usuda, Tsuyoshi Sa Masayasu IEICE Transactions on Fundamentals Citation Communications and Computer Science
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4
Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam ([email protected]) Omidreza Karimi ([email protected]) Dr. Ma en T. Alrashdan ([email protected])
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E- Banking System
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: 06 68 Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E- Banking System Ibidapo, O. Akinyemi,
A Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Secret Sharing based on XOR for Efficient Data Recovery in Cloud
Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
SecurityMetrics Vision whitepaper
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS
SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS
Why Cryptosystems Fail. By Ahmed HajYasien
Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Information Systems and Electronic Communications in Logistics Management
Information Systems and Electronic Communications in Logistics Management Ephrem Eyob, Virginia State University, Petersburg, VA 23806 [email protected] ABSTRACT Telecommunications and Networking Technologies
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions Version 5.0 (April 2011) Contents Contents...2 Introduction...3 What are the 12 key requirements of
E-Banking and Emerging Multidisciplinary Processes:
E-Banking and Emerging Multidisciplinary Processes: Social, Economical and Organizational Models Mohammad Ali Sarlak Payam Noor University, Iran Asghar Abolhasani Hastiani Payam Noor University, Iran BUSINESS
A Secure Intrusion Avoidance System Using Hybrid Cryptography
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM
IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM Mohammed Abdullah Mohammed Aysan* Abstract: Electronic Fund Transfer involves electronic transfer
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
The Design of Web Based Secure Internet Voting System for Corporate Election
The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2
An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS. By Suhas Desai
An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS By Suhas Desai CONTENTS Executive Summary The Need for Mobile Application Security 3 USSD-based Mobile Payment Application
Various Attacks and their Countermeasure on all Layers of RFID System
Various Attacks and their Countermeasure on all Layers of RFID System Gursewak Singh, Rajveer Kaur, Himanshu Sharma Abstract RFID (radio frequency identification) system is one of the most widely used
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
1. Introduction to ehealth:
1. Introduction to ehealth: E-Health is one of the fastest growing areas within the health sector. The scope of e- Health involves application of the knowledge, skills and tools, which enable information
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Optum ID Migration for Provider Express Users
Introducing Optum ID FREQUENTLY ASKED QUESTIONS Optum ID Migration for Provider Express Users 1. What is Optum ID? A1. Optum ID is a centralized, secure identity management solution that enables a single
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18
Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Fida Hussain Chandio [email protected] ABSTRACT Pakistan banking sector has gone through
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Electronic Fraud Awareness Advisory
Electronic Fraud Awareness Advisory Indiana Bankers Association Fraud Awareness Task Force February, 2012 Electronic Fraud Awareness Advisory Purpose/Summary The Indiana Bankers Association (IBA) was involved
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Dept. of Financial Information Security
Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators
American International Journal of Research in Humanities, Arts and Social Sciences
American International Journal of Research in Humanities, Arts and Social Sciences Available online at http://www.iasir.net ISSN (Print): 2328-3734, ISSN (Online): 2328-3696, ISSN (CD-ROM): 2328-3688 AIJRHASS
IT-Security of E-Banking in Eyes of Croatian Clients. Nedim Makarević. Hikmet Secim. Mehmet Toycan
IT-Security of E-Banking in Eyes of Croatian Clients 1 Cyprus International University, Cyprus Doctor of Business Administration candidate E-mail: [email protected] 2 Cyprus International University,
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com
High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Foundations of Computer Security
Foundations of Computer Security Lecture 1: Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 1: 1 Course Topics Topics we will cover include: What is computer security?
Electronic Commerce. 4. Payment Schemes. V Rajaraman. In this part, we will describe payments using credit cards and cheques in e-commerce.
Electronic Commerce 4. Payment Schemes V Rajaraman In this part, we will describe payments using credit cards and cheques in e-commerce. V Rajaraman is with the Jawaharlal Nehru Centre for Advanced Scientific
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
