This sub-section addresses why Internet security is a problem and how it came to be that we are depending on an infrastructure with fundamental vulnerabilities. updated 2000-08-07
Confidentiality Integrity Authentication Ensures that the origin of a message is correctly identified, with an assurance that the identity is not false Nonrepudiation Neither the sender nor the receiver of a message is able to deny the transmission Access Control Availability
SECURE INTERNET BANKINGAUTHENTICATION AAR T H I K AN N AP P AN D H IV Y AA.R M AH A L AK S H M I.S
Network Security c tion Offline cr trod u edential In Attacks onOnl Sho ine authentication rt t cha ime pwd nn el Abstract nomy bjec tives k t axo o At tac Conclusion sol ution based f icate Certi 2
PRESENTATION OBJECTIVES Understand network security services Be aware of vulnerabilities and threats Realize why network security is necessary Highly attractive solution for valuable and secure future. 3
ABSTRACTThe authors present two challenge response Internetbanking authentication solutions one based on short-time passwords and one on certificatesattacks on authenticationtransaction-signing option 4
INTRODUCTION The Internet is an integral part of our daily lives, and the proportion of people who expect to be able to manage their bank accounts anywhere, anytime is constantly growing This article describes current Authentication threats and two proposed solutions as well as how these solutions can be extended in the face of more complex future attacks 5
ATTACKS ON AUTHENTICATION Internet banking systems must authenticate users before granting them access to particular services. successful authentication eventually enables users to access their private information. We can classify all Internet banking authentication methods according to their resistance to two types of common attacks offline credential-stealing attacks online channel-breaking attacks 6
Offline credential-stealing attacks Security precautions can help users protect themselves from malicious software. For example-- installing and maintaining a firewall and up-to date antivirus software, regularly applying operating system and browser patches 7
Online channel-breaking attack The intruder noticeablyintercepts messages between the client PC and the banking server by masquerading as the server to the client and vice versa Online channel-breakingattacks don’t necessarily compromise the user’s credentials but the session’s credentials and therefore typically require the user-initiated banking 8 session to work properly.
AN ATTACK TAXONOMYTaxonomy of Internet banking authentication methods. Methodsare classified according to their resistance against offline 9credential-stealing and online channel-breaking attacks.
SHORT-TIME PASSWORD SOLUTION It uses symmetric cryptography in combination with a hardware security module . User authentication works as follows:4. The user connects to the Internet banking5. The user claims his or her identity by entering an account number in the bank’s login form6. The user opens his or her smart card by entering the corresponding PIN in the reader before entering the given challenge.7. The user manually copies the shown response to the bank’s login form to be checked by the bank’s authentication server. 10
CERTIFICATE-BASED SOLUTIONUser authentication works asfollows. First, the user establishes anSSL/TLS channel betweenthe user PC andthe bank’s Web server bysetting up an SSL/TLSsession without clientauthentication.Once the card is available,its certificates become visiblein the Web browser. 12
Conclusion Internet banking has turned into an arms race between financial institutions and public network attackers. Both solutions offer high security against common attacks. However, changing legislation and the eventually spread of e-IDs among customers makes this solution a highly attractive and valuable alternative for the future. 13