Monday, December 9, 2019

Three-step authentication for ATM-Free-Samples-Myassignmenthelp.com

Questions: 1. Examples of confidentiality, integrity and availability requirements associated ATM machines describing the degree of importance for each requirement. 2. Calculation for the maximum number of PINs that the thief might have to enter before correctly discovering a customers PIN. 3. Three reasons why people may be reluctant to use biometrics and ways to counter those objections. 4. Description of two circumstances where false negatives are significantly more serious than false positives. 5. One way that a piece of cipher text can be determined quickly if it was likely a result of a transposition. Deciphering the plain text for the Caeser cypher NTJWKHXK AMK WWUJJYZTX MWKXZKUHE with key 234 that George wanted to send his employees. Answers: 1.Automated Teller Machines or ATMs have become one of the integral parts of a common mass nowadays. It has made lives easier with the ready availability of cash in case of an emergency or by making people travel safely going cashless (Sharma, Misra Misra, 2014). However, Automated Teller Machines or ATMs express the examples of confidentiality, integrity and availability. These examples would be further described with the degree of importance for each as below: Confidentiality: A customer uses the unique access PINs or Personal Identification Numbers to access their personal bank accounts using ATM cards. Therefore, it is natural that a customer expects the PIN to be extremely confidential in every transaction made between the host system and the bank server along the line of communication (Bachu, 2017). The degree of importance for this requirement is very high since a PIN should be appropriately encrypted otherwise it may lose the level of confidentiality is it supposed to possess. Otherwise, there is a chance that the account could be compromised. Integrity: Integrity of an Automatic Teller Machine or ATM is only maintained when the customers expectation of zero malevolent or inadvertent changes in his or her transactions is sustained (Katz Lindell, 2014). The degree of importance of having integrity in ATM machines should be high since it directly affects a customers personal account while transactions are happening. Availability: ATM machines have become a necessity and it has now become a need. It is not always possible for a customer to rush to a nearby bank to access account details or withdraw cash. It is even possible a bank holiday has occurred when a customer is in dire necessity of instant cash. The degree of importance of the availability of ATM machines is even necessary for the banks since it would increase the economic growth of a bank. Therefore, it is necessary that an ATM should be made available at almost all times. 2.The thief was able to jam the card reader and five keys of the Automated Teller Machine. Therefore, there are four keys left for guessing the password of the person who had a successful transaction after the forgery was done. The number of keys left = 4 The maximum number of PINs that the thief would require to guess the correct PIN of the customer who had a successful transaction would be the permutation of the total number of keys and the number of combinations that the keys can deliver, that is, 5!/(5-4)! The result equals to 120 times. Therefore, the thief has to enter a maximum of 120 times before guessing the correct PIN. 3.Biometric systems require the intimate details of the behaviour and body determinants of a person because these attributes are unique to a person. Therefore, it is necessary to keep in mind the cultural, legal as well as the social contexts before deploying a biometric system (Ketab, Clarke Dowland, 2016). Due to the infiltration of these intimate details, many people display reluctance in using biometric systems. The social issues that may form an obligation for using biometric can be manifold. A person may find it unsafe to give away their photographs or face attributes for this system for they may have doubt about these information to be used for some unauthorized activity. Some may even have obligations to give away their face details because of any deformity present in their face, such as burn marks or scars. In some cultures, there may be a prime significance of long nails, but having those limits a person to place their fingers in the biometric system for fingerprint details. Moreover, it is beyond the moral rights of a person to ask for these intimate details about any person without their consent since maintaining privacy of intimate data is a lawful right. Countering these objections to make people use the biometric systems can either be done by evoking the fear of violating law or by making people understand the discrete nature of the information that is recorded through this system for the unique identification attributes of each person. This may counter the cultural and legal obligations. It is important that people be made to understand the fact that the use of biometric is absolutely safe as it is encrypted at a firmware level that it is device specific and information stored can never be duplicated from one device to another 4.False negatives are the situations when a system denies a condition when it has existence, where on the other hand, false positives are the situations where system accepts a condition even if it has no existence in real. In biometrics, false positives are more severe than the false positives. For example, if a biometric system does not acknowledge the fingerprint of authorized personnel as permeable, the incident is a false positive issue that is still manageable (Martinovic et al., 2017). However, accepting the biometrics of an unauthorized malicious person is a false negative case, which has the potential to wreck havoc in the system. Again, in another case if a person installs a biometric lock in a safe but the false positive situation do not allow his identification as authorized is hazardous but safer than the situation where it allows a thief the access to open the lock in a false negative situation (Eberz et al., 2017). This is a much more dangerous situation when the thief would be provided with the facility of the safe being opened and his job to be completed. 5.Transposition is a method of encryption that is different from the other models as this system deals with the permutation of the position of a plaintext (Pandey Verma, 2015). Many techniques are followed to encrypt a text in the transposition method. One of them is the reverse order method that explains a cipher text decryption easily (Konheim, 2016). For example, a reverse order cipher text written in transposition as LUFITUAEB SI DLROW EHT can be easily and quickly deciphered in reverse order as THE WORLD IS BEAUTIFUL. Solution Encrypted Text N T J W K H X K Corresponding numeric value 14 20 10 23 11 8 24 11 Key 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 12 17 6 21 8 4 22 8 Caeser cipher shift 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 9 14 3 18 5 1 19 5 Decoded Text I N C R E A S E Encrypted Text A M K Corresponding numeric value 1 13 11 Key 4 2 3 Decoded from the substitution cipher 23 11 8 Caeser cipher shift 3 3 3 Decoded from the Caeser cipher 20 8 5 Decoded Text T H E Encrypted Text W W U J J Y Z T X Corresponding numeric value 23 23 21 10 10 25 26 20 24 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 19 21 21 6 8 22 22 18 21 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the Caesar cipher 16 18 18 3 5 19 19 15 18 Decoded Text P R O C E S S O R Encrypted Text M W K X Z K U H E Corresponding numeric value 13 23 11 24 26 11 21 8 5 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 9 21 8 20 24 8 17 6 2 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the Caesar cipher 6 18 5 17 21 5 14 3 Decoded Text F R E Q U E N C Y Therefore, the plain text that George had sent his employees was INCREASE THE PROCESSOR FREQUENCY References Bachu, S. (2017). Three-step authentication for ATMs. Eberz, S., Rasmussen, K. B., Lenders, V., Martinovic, I. (2017, April). Evaluating behavioral biometrics for continuous authentication: Challenges and metrics. InProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security(pp. 386-399). ACM. Katz, J., Lindell, Y. (2014).Introduction to modern cryptography. CRC press. Ketab, S. S., Clarke, N. L., Dowland, P. S. (2016). The Value of the Biometrics in Invigilated E-Assessments. Konheim, A. G. (2016). Automated teller machines: their history and authentication protocols.Journal of Cryptographic Engineering,6(1), 1-29. Martinovic, I., Rasmussen, K., Roeschlin, M., Tsudik, G. (2017). Authentication using pulse-response biometrics.Communications of the ACM,60(2), 108-115. Pandey, R. M., Verma, V. K. (2015). Data Security using Various Cryptography Techniques: A recent Survey. Sharma, A., Misra, P. K., Misra, P. (2014). A Security Measure for Electronic Business Applications.International Journal of Computer Applications,102(7).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.