SlideShare a Scribd company logo
TITLE
Application of
DES in ATM
INTRODUCTION
• ATM also known as Automatic Teller Machine is a
simple and yet security banking service.
• Allows an authorized cardholder to conduct banking
transaction without visiting a branch.
• They are well known for its convenience to the
customers, cost-effectiveness to the bank and most
importantly it is an extremely secure banking method.
• ATMs rely on authorization of a transaction by the bank
via a secure communications network.
• Encryption methods are built into the communication
network to prevent unauthorized transactions.
ATM COMMUNICATION SECURITY
• ATMs contain secure crypto-processors
• Relies mostly on the integrity of the secure cryptoprocessor.
• ATMs typically connect directly to their ATM Transaction
Processor via a modem over a dedicated telephone line.
• Account number: 8807012345691715
• PIN key: FEFEFEFEFEFEFEFE
• Result of DES: A2CE126C69AEC82D
• Result decimalized: 0224126269042823
• Natural PIN: 0224
• Offset: 6565
• Customer PIN: 6789
DATA ENCRYPTION STANDARD
• (DES) was developed by an IBM team around 1974 and
adopted as a national standard in 1977.
• An approved cryptographic algorithm selected as an official
Federal Information Processing Standard (FIPS) for the
United States (Lockergnome Encyclopedia, 2004).
• Encryption is the transformation of data to a form which is
impossible to read without the appropriate knowledge or
key.
• In DES, data are encrypted in 64-bit blocks using a 56-bit
key.
• DES Modes of Operation describes four different modes for
using the algorithm described in this standard. -(ECB) (CBC)
(CFB) (OFB) mode.
USE OF DES
ADVANTAGES OF DES
•
•
•
•

Convenient
Cost-effective
Secure banking method
No real weaknesses have been found: the most
efficient attack is still brute force.
• The Government is required to re-certify, DES
every five years and ask it be replaced if
necessary.
• Anybody can learn the details and implement it.
• Fast in hardware and relatively fast in software.
DISADVANTAGES OF DES
• DES is so easy to break with today’s rapidly
advancing technology.
• Limited size of key.
• Hardware implementations of DES are very
fast; DES was not designed for software and
hence runs relatively slowly.
• We cannot get the readable data at the
receiving end.
CONCLUSION
• Automatic Teller Machines are protected by
advanced encryption technologies.
• ATM security requires improving methods to
keep up with smart intruders.
• Upgrade from the Data Encryption Standard to
the Advanced Encryption Standard
• ATMs are very convenient, cost-effective and
secure banking method provided to customers
today

More Related Content

Viewers also liked

ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
Radhika Venkat
 
Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)
Ruksin Sangrugee
 
Security
SecuritySecurity
Security
AyushiGupta3123
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
khurda
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
ATM Banking
ATM BankingATM Banking
ATM Banking
Arnav Sameer
 

Viewers also liked (10)

ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)
 
Security
SecuritySecurity
Security
 
Atm.ppt
Atm.pptAtm.ppt
Atm.ppt
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 

Similar to Atm

fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
santhu652
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
akansha bhatnagar
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their assCONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
PROIDEA
 
EMV Vending Secure Card Reader and Payment Solution
EMV Vending Secure Card Reader and Payment SolutionEMV Vending Secure Card Reader and Payment Solution
EMV Vending Secure Card Reader and Payment Solution
Stuart McGregor
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
Finger print based EVM by saurabh
Finger print based EVM by saurabhFinger print based EVM by saurabh
Finger print based EVM by saurabh
Saurabh Kumar
 
E-town Banking system
E-town Banking systemE-town Banking system
E-town Banking system
ViVek Patel
 
Understanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedUnderstanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always Encrypted
Ed Leighton-Dick
 
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwkchapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
NiveditaSingh839848
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Precisely
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_us
Emma Garnier
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
Rahul Wagh
 
Software Protection Techniques
Software Protection TechniquesSoftware Protection Techniques
Software Protection Techniques
Chaitanya Anpat
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’s
Olga Kochetova
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
Don Caeiro
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 
Chapter 1-1.pptx
Chapter 1-1.pptxChapter 1-1.pptx
Chapter 1-1.pptx
biniyamgashaw2
 

Similar to Atm (20)

fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Atm software
Atm softwareAtm software
Atm software
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their assCONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
 
EMV Vending Secure Card Reader and Payment Solution
EMV Vending Secure Card Reader and Payment SolutionEMV Vending Secure Card Reader and Payment Solution
EMV Vending Secure Card Reader and Payment Solution
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Finger print based EVM by saurabh
Finger print based EVM by saurabhFinger print based EVM by saurabh
Finger print based EVM by saurabh
 
E-town Banking system
E-town Banking systemE-town Banking system
E-town Banking system
 
Understanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedUnderstanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always Encrypted
 
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwkchapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_us
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Software Protection Techniques
Software Protection TechniquesSoftware Protection Techniques
Software Protection Techniques
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’s
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Chapter 1-1.pptx
Chapter 1-1.pptxChapter 1-1.pptx
Chapter 1-1.pptx
 

More from are you

Business plan (air umbrella)
Business plan (air umbrella)Business plan (air umbrella)
Business plan (air umbrella)are you
 
A* algorithm
A* algorithmA* algorithm
A* algorithmare you
 
Dijkstra algorithm
Dijkstra algorithmDijkstra algorithm
Dijkstra algorithmare you
 
Application of least square method
Application of least square methodApplication of least square method
Application of least square methodare you
 
Comparative study of fish harvesting
Comparative study of fish harvestingComparative study of fish harvesting
Comparative study of fish harvestingare you
 
Business idea
Business ideaBusiness idea
Business ideaare you
 
Effective determinants of corporate nano
Effective determinants of corporate nanoEffective determinants of corporate nano
Effective determinants of corporate nanoare you
 
Govida chocolate
Govida chocolateGovida chocolate
Govida chocolateare you
 
Yourprezi
YourpreziYourprezi
Yourpreziare you
 
Skrip Arabic (الكتابة العربية)
Skrip Arabic (الكتابة العربية)Skrip Arabic (الكتابة العربية)
Skrip Arabic (الكتابة العربية)are you
 
Report ent600
Report  ent600Report  ent600
Report ent600are you
 
Analysis of parallel algorithms for energy consumption
Analysis of parallel algorithms for energy consumptionAnalysis of parallel algorithms for energy consumption
Analysis of parallel algorithms for energy consumptionare you
 
Mgt project
Mgt projectMgt project
Mgt projectare you
 
MyBride Presentation
MyBride PresentationMyBride Presentation
MyBride Presentationare you
 
Levi's jeans presentation
Levi's jeans presentationLevi's jeans presentation
Levi's jeans presentationare you
 
Portable Printer
Portable PrinterPortable Printer
Portable Printerare you
 
Air craft control system of parallel processing
Air craft control system of parallel processingAir craft control system of parallel processing
Air craft control system of parallel processingare you
 
Application of Parallel Processing
Application of Parallel ProcessingApplication of Parallel Processing
Application of Parallel Processingare you
 

More from are you (20)

Business plan (air umbrella)
Business plan (air umbrella)Business plan (air umbrella)
Business plan (air umbrella)
 
A* algorithm
A* algorithmA* algorithm
A* algorithm
 
Poster
PosterPoster
Poster
 
Dijkstra algorithm
Dijkstra algorithmDijkstra algorithm
Dijkstra algorithm
 
Application of least square method
Application of least square methodApplication of least square method
Application of least square method
 
Comparative study of fish harvesting
Comparative study of fish harvestingComparative study of fish harvesting
Comparative study of fish harvesting
 
Business idea
Business ideaBusiness idea
Business idea
 
Effective determinants of corporate nano
Effective determinants of corporate nanoEffective determinants of corporate nano
Effective determinants of corporate nano
 
Govida chocolate
Govida chocolateGovida chocolate
Govida chocolate
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
Skrip Arabic (الكتابة العربية)
Skrip Arabic (الكتابة العربية)Skrip Arabic (الكتابة العربية)
Skrip Arabic (الكتابة العربية)
 
Report ent600
Report  ent600Report  ent600
Report ent600
 
Analysis of parallel algorithms for energy consumption
Analysis of parallel algorithms for energy consumptionAnalysis of parallel algorithms for energy consumption
Analysis of parallel algorithms for energy consumption
 
Mgt project
Mgt projectMgt project
Mgt project
 
MyBride Presentation
MyBride PresentationMyBride Presentation
MyBride Presentation
 
Prezi
PreziPrezi
Prezi
 
Levi's jeans presentation
Levi's jeans presentationLevi's jeans presentation
Levi's jeans presentation
 
Portable Printer
Portable PrinterPortable Printer
Portable Printer
 
Air craft control system of parallel processing
Air craft control system of parallel processingAir craft control system of parallel processing
Air craft control system of parallel processing
 
Application of Parallel Processing
Application of Parallel ProcessingApplication of Parallel Processing
Application of Parallel Processing
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Atm

  • 2. INTRODUCTION • ATM also known as Automatic Teller Machine is a simple and yet security banking service. • Allows an authorized cardholder to conduct banking transaction without visiting a branch. • They are well known for its convenience to the customers, cost-effectiveness to the bank and most importantly it is an extremely secure banking method. • ATMs rely on authorization of a transaction by the bank via a secure communications network. • Encryption methods are built into the communication network to prevent unauthorized transactions.
  • 3. ATM COMMUNICATION SECURITY • ATMs contain secure crypto-processors • Relies mostly on the integrity of the secure cryptoprocessor. • ATMs typically connect directly to their ATM Transaction Processor via a modem over a dedicated telephone line. • Account number: 8807012345691715 • PIN key: FEFEFEFEFEFEFEFE • Result of DES: A2CE126C69AEC82D • Result decimalized: 0224126269042823 • Natural PIN: 0224 • Offset: 6565 • Customer PIN: 6789
  • 4. DATA ENCRYPTION STANDARD • (DES) was developed by an IBM team around 1974 and adopted as a national standard in 1977. • An approved cryptographic algorithm selected as an official Federal Information Processing Standard (FIPS) for the United States (Lockergnome Encyclopedia, 2004). • Encryption is the transformation of data to a form which is impossible to read without the appropriate knowledge or key. • In DES, data are encrypted in 64-bit blocks using a 56-bit key. • DES Modes of Operation describes four different modes for using the algorithm described in this standard. -(ECB) (CBC) (CFB) (OFB) mode.
  • 6. ADVANTAGES OF DES • • • • Convenient Cost-effective Secure banking method No real weaknesses have been found: the most efficient attack is still brute force. • The Government is required to re-certify, DES every five years and ask it be replaced if necessary. • Anybody can learn the details and implement it. • Fast in hardware and relatively fast in software.
  • 7. DISADVANTAGES OF DES • DES is so easy to break with today’s rapidly advancing technology. • Limited size of key. • Hardware implementations of DES are very fast; DES was not designed for software and hence runs relatively slowly. • We cannot get the readable data at the receiving end.
  • 8. CONCLUSION • Automatic Teller Machines are protected by advanced encryption technologies. • ATM security requires improving methods to keep up with smart intruders. • Upgrade from the Data Encryption Standard to the Advanced Encryption Standard • ATMs are very convenient, cost-effective and secure banking method provided to customers today