You are on page 1of 4

SECURE INTERNET BANKING

Prof. K.U.Rahane
Department of Computer Engineering
Amrutvahini COE,Sangamner
rahane_kavita@yahoo.co.in
Abstract— Internet banking websites often use security images as part of the login process, in that they can
help foil phishing attacks. Previous studies, however, have yielded inconsistent results about users ability to
notice that a security image is missing. This project describes an online study of users that attempts to
clarify the extent to which users notice and react to the absence of security images. Most participants
entered their password when the security image and caption were removed. The authors found that changing
the appearance and other characteristics of the security image generally had little enact on whether users
logged in when the security image was absent. Additionally, they subjected the passwords created by
participants to a password-cracking algorithm and found that participants with stronger password were less
likely to enter their passwords when the security image was missing.
Keywords— Sitekey, Security, Onlinebanking, Authentication, Variable, token, Human-
ComputerInteraction, IT Security.
I. Introduction information on bank products and services, and

Internet banking is the latest delivery channel for conduct all financial transactions anytime from

financial services. Internet banking is a self-service anywhere through the use of a bank‘s website.

that allows customers to perform financial activities Internet banking provides a change from the

over the Internet . There is not a singled basic traditional way of face-to-face contact at a bank‘s

definition of Internet banking that is being used counter during office hours to a remote way by

universally. There has been a lack of consensus in online network connection anywhere at any time

the definition given by researchers. Regardless of (24 hours a day, seven days a week). Internet

the differences in definition, Internet banking refers Banking provides many advantages for bank and

to many kinds of electronic services through which customers as well. Therefore, many banks have

bank customers can request information and get invested heavily in Internet banking services.

most of the retail banking services via a computer. Although Internet banking provides many benefits,

It is also commonly known as online banking or e- many individuals still refuse this service. Since the

banking. Internet banking has been defined from acceptance or rejection of new technology depends

different school of thoughts by various researchers on the factors that influence individuals‘ behavioral

depending on their experience, nature and study intention toward this technology, there is a need to

environment .For this research, Internet banking is determine which factors influence individuals'

defined as a self-service that enable bank customers intention to accept new technology. Internet

to get access to their accounts and the latest general banking like other new technology faces many
problems associated with its acceptance. Yemeni III SYSTEM CONCEPTS
banks, as other banks in the Middle Eastern In this system, there are two types of authentication:
countries, have suffered from problem of Internet 1. Two way authentication
banking rejection. So far limited studies have tried 2. Short time password using cryptography
to deal with this problem. Therefore, this research The above two approaches are explained below
investigated factors that influence individuals‘ in Fig1 and Fig2.The Fig 3 illustrates in general
acceptance of Internet banking services, and used working of system where as Fig 4 shows that how
the sampling frame. This chapter provides an each use cases in system is connected to end user
overview of this study; the background of the study, use cases. The Fig 5 illustrates how the data flow
then present the research gap and opportunity, the from one end to another end.
research problem statement, research questions, Two factor authentication approach uses two things.
research objectives, the justification of study and Things can be user knows, user possesses and user
the motivations to conduct this research. The has, to give a much stronger level of authentication.
significance of the study, and the contribution and The first factor is something user knows, in this
definition of key terms, are also presented. case username and password. The second factor is
II. RELATED WORK something user has, in this case your phone or app-

Most current graphical password schemes require running tablet[1].

users to enter the password directly,typically by


clicking or drawing. Hence, passwords are easily
exposed to a third party who has the opportunity to
record a successful authentication session. There
have been a few graphical password schemes
devoted to secure passwords against spyware
attacks .In the following, several representatives
will be described. Man, et al proposed that users
remember a number of text strings as well as
several images as pass-objects. To pass the
authentication, users should enter the unique codes
corresponding to the displayed pass-object variants Fig.1.Two way Authentication
and a code indicating the relative location of the Short-time password authentication method using
pass-objects in reference to a pair of eyes. It is symmetric cryptography in combination with a
relatively hard to crack this kind of password, but Software Security Model is a one approach for
the complex memory requirement is an obstacle to authentication. In this approach encryption and
its popularity. decryption is performed by software system
Fig.2. Short-time Password Authendication Fig.5. Data Flow Diagram

IV. ALGORITHM

 Log In:
Log-In module is useful for entering the user id and
password.This is a simple one way
authentication.The id and password is generated
after the successful registration of user or customer.
 Verification:
Verification module is used to verify user identity.
It consists of two types of verification:
Fig.3. System Architecture 1) Images Selection :
The user is responsible for selecting the various
images from cloud to verify his authentication.
2) OTP Verification:
The OTP is send to the user who is completely
authorized.This verification is two way
authentication[2].
 AES Operation:
AES is an iterative rather than Feistel cipher. It is
based on ‗substitution–permutation network‘. It
comprises of a series of linked operations, some of
which involve replacing inputs by specific outputs
(substitutions) and others involve shuffling bits
around (permutations)[1].
Interestingly, AES performs all its computations on
Fig.4. Use Case bytes rather than bits. Hence, AES treats the 128
bits of a plaintext block as 16 bytes. These 16 bytes VI. REFERENCE
are arranged in four columns and four rows for [1] Min Wu, Robert C. Miller, Simson L.
processing as a matrix . Garfinkel ―Do Security Toolbars Actually Prevent
Unlike DES, the number of rounds in AES is Phishing Attacks‖MIT Computer Science and
variable and depends on the length of the key. AES Artificial
uses 10 rounds for 128-bit keys, 12 rounds for 192- [2] Sonia Chiasson1,2, P.C. van Oorschot1, and
bit keys and 14 rounds for 256-bit keys. Each of Robert Biddle ―Graphical Password Authentication
these rounds uses a different 128-bit round key, Using Cued Click Points‖School of Computer
which is calculated from the original AES key. Science, Carleton University, Ottawa, Canada.
[3]RachnaDhamija, Harvard University ―Why
V.CONCLUSION
Phisingworks‖Conference on Human Factors in
The vulnerabilities of textual password to method
Computing Systems, April 2006.
like eves dropping, dictionary attack, social
[4] Ms. Arati A. Gadgil ―Do Security Toolbars
engineering and shoulder surfing are well known.
Actually Prevent Phishing Attacks‖Authentication
Random and lengthy passwords can make the
Approaches for Online-Banking(Nov,2012)
system secure. But the main problem is the
[5]Susan Wiedenbeck ―Authentication Using
difficulty of remembering those passwords. Studies
Graphical Passwords: Effects of Tolerance and
have shown that users tend to pick short passwords
Image Choice ‖Computer Science Department.
or passwords that are easy to remember.
[6]Ian Jermyn, Alain Mayer ―The design and
Unfortunately, these passwords can be easily
analysis of graphical passwords‖ Proceedings of the
guessed or cracked. The alternative techniques are
8th USENIX Security Symposium(1999)
graphical passwords and biometrics.
[7]Gabriele Paolacci ―Running experiments on
Amazon Mechanical Turk‖Advanced School of
Economics, Ca Foscari University of Venice.

You might also like