17
E-Banking Security: Message Authentication Image(MAI) Presented by, REJIN R Roll No:11 M1 IS Under the guidance of, Dr !bdul Ni"ar De#t of $SE

E-Banking Security- Using Message Authentication Image(MAI)Prjct-Preliminary Presentation

Embed Size (px)

DESCRIPTION

A new scheme to Mutual authentication utilizing concepts of Fractals theory

Citation preview

Slide 1

E-Banking Security: Message Authentication Image(MAI)Presented by, REJIN R Roll No:11 M1 IS

Under the guidance of,Dr. Abdul NizarDept. of CSEIntroductionProblem DefinitionMessage Authentication Code(MAC)Fractal & Chaos System AnalysisDrawbacks of Existing systemProposed SystemAdvantages of Proposed SystemConclusionReference

contentsIntroductionE-banking plays an important role in today world.

Main types of attacks in E-banking are:Phishing trends, such as spear phishing PharmingWhaling and Fast-flux service networks

Existing Protection mechanisms:One time passwords e-signatureshardware authenticatorssmart card based solutions software based solutions

MAC provides Authentication & Integrity only, not Digital Signature.

Problem DefinitionConventional E-banking systems utilize MAC(Message Authentication Code) scheme. It can provide Authentication & Message Integrity.

But it cant provide Digital Signature.

Extra Digital signature algorithms are need to be introduced for this purpose, which is time consuming.Message AuthenticationProcedure to verify that received messages come from the alleged source and have not been altered.

Also verify sequencing and timeliness.

Provides security against following attacks:MasqueradeContent ModificationSequence ModificationTiming Modification

Authenticator-Value to be used to authenticate a message.Methods used to produce an authenticator:Hash FunctionMessage EncryptionMessage Authentication Code(MAC)

Digital Signature:MAC does not provide a digital signature, because both sender and receiver share the same key.Fractals & chaosFractals are very complex infinitely detailed and highly irregular geometric shapes.

Fractals are related to chaos-since, they are much complex systems with definite properties.

Method for generation of Fractals=Iterated Function System(IFS)

Chaos arises in dynamical systems- two arbitrarily close starting points diverges exponentially , so that their future behavior become unpredictable. Existing SystemMessage authentication code (MAC)

Proposed System Algorithm

In proposed method there are three different Phases.Login PhasePassmark image Generation PhaseDigital Signature Phase

Assumptions:UIdUser namePImg server side Passmark ImageClImg Client side Passmark ImageFClImg Resultant Fractal Image in Client sideFSImg Resultant Fractal Image in sever side

1) Login Phase: The user enters the User Name.

[Input userid]Verifies tok(UId)If(tok(UId)){Authorized UId}else{exit(0);}

Message Authentication,Confidentiality and Digital Signature: Authentication tied to CipherText

2) Passmark Image Generation Phase: Verify tok(UId)If(tok(UId)){Generate(PImg)Submit(PImg)}else{exit(0);}

3) Digital Signature Phase3.1 Server Verification (Original Site):Verify (PImg)If(ClPImg = = PImg){enable password text box;type(pass)}else{exit(0);}

3) Digital Signature Phase3.1 client Verification (Original client):Verify(Client)Num=Rand()GenerateFractal(Embedd(pass,FClImg))

If(FClImg==FSImg){Valid user:Allow for further transaction}Else{Exit(0);}

Advantages of Proposed SYstemAlgorithm can provide Authentication,Integrity and Digital signature at the same time.

Proposed Method is much faster compared to conventional systems since generation of Fractals are easier to produce.References[1] G.Geetha, K.Thamizhchelvy, E-Banking Security: Mitigating Online Threats Using Message Authentication Image (MAI) Algorithm, 2012 International Conference on Computing Sciences

[2] Kiani. K, Arian. M, Soleimani. V Image authentication using fractal watermarking and chaos theory 4th International Conference on Signal Processing and Communication Systems (ICSPCS), 2011.

[3] El-Khamy, S.E. Khedr, M. AlKabbany A hybrid fractal-wavelet data hiding technique, National Radio Science Conference, Pages :1 - 9 ,Print ISBN: 978-977-5031-95-2, 2008

[4] S. K. Ghosh, Jayanta Mukherjee et al Fractal image compression: a randomized approachJournal of Pattern Recognition Letters,Volume 25 Issue 9, 2 July 2004 .

[5] John C. Hart Fractal Image Compression and Recurrent Iterated Function Systems, journal of IEEE Computer Graphics and Applications , Volume 16 Issue 4, July 1996.Thanks!