Sarad Venugopalan Home Page

Welcome to data.at.preempted.net
Sunday, December 17 2017 @ 07:50 AM UTC

Mini Project on Secure E-Banking

ArticlesFunctionality E-Banking is vulnerable to numerous attacks as it deals with online digital cash transactions. It is hence important to use publicly acclaimed cryptographic algorithms that have been under scrutiny and cryptanalysis for numerous years. We choose a symmetric key cryptosystem such as Blowfish for our implementation. Though encrypted, the transactions between the two banks are still vulnerable to block replay attacks by a man in the middle. To thwart this attack we use a suitable chaining mode such as Cipher Block Chain with checksum (CBCC). A separate Initialization Vector (IV) is generated for chaining each transaction, using a fast Pseudo Random Number Generator (PRNG) with a large period. We use one such PRNG known as Mersenne Twister (MT19937). The public keys of Bank A and Bank B are authenticated by a Certifying Authority (CA). The application is implemented by writing a client and server program using Berkley Sockets. This application assumes the existence of a CA and doesn't implement any Public Key cryptosystem.
report.zip
mt.zip
serverecode.zip
clientcode.zip
testing.zip

Story Options

Mini Project on Secure E-Banking | 0 comments | Create New Account
The following comments are owned by whomever posted them. This site is not responsible for what they say.