CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Using Mobile Phones as Software Token for Generating Digital Signature Code � Digitally Signing An Online Banking Transaction

Published on None 2011 by Abin Oommen Philip
Computational Science - New Dimensions & Perspectives
Foundation of Computer Science USA
NCCSE - Number 3
None 2011
Authors: Abin Oommen Philip
142cb98d-9021-4b7e-8fd1-dc2f67b258f0

Abin Oommen Philip . Using Mobile Phones as Software Token for Generating Digital Signature Code � Digitally Signing An Online Banking Transaction. Computational Science - New Dimensions & Perspectives. NCCSE, 3 (None 2011), 118-121.

@article{
author = { Abin Oommen Philip },
title = { Using Mobile Phones as Software Token for Generating Digital Signature Code � Digitally Signing An Online Banking Transaction },
journal = { Computational Science - New Dimensions & Perspectives },
issue_date = { None 2011 },
volume = { NCCSE },
number = { 3 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 118-121 },
numpages = 4,
url = { /specialissues/nccse/number3/1872-174/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computational Science - New Dimensions & Perspectives
%A Abin Oommen Philip
%T Using Mobile Phones as Software Token for Generating Digital Signature Code � Digitally Signing An Online Banking Transaction
%J Computational Science - New Dimensions & Perspectives
%@ 0975-8887
%V NCCSE
%N 3
%P 118-121
%D 2011
%I International Journal of Computer Applications
Abstract

Nowadays, Online banking security mechanisms focus on safe authentication mechanisms, but all these mechanisms are rendered useless if we are unable to ensure the integrity of the transactions made. Of late a new threat has emerged known as Man In The Browser attack, its capable of modifying a transaction in real time without the users notice, after the user has successfully logged in using safe authentication mechanisms. In this paper we analyze the Man In the Browser attack and propose a solution based upon Digitally signing a transaction and using the mobile phones as a software token for Digital Signature code generation.

References
  1. Protecting Online Customers from Man-in the-Browser and Man-in-the-Middle Attacks, Whitepaper by ARCOT
  2. Two Factor Authentication Using Mobile Phones Fadi Aloul, Syed Zahidi And Wassim El-Hajj.
  3. Implementation of OTP Two Factor Authentication System From Visolve For Banks, Whitepaper.
  4. nisr-wp-phishing.pdf, The Phishing guide NGS Ltd.
  5. Online_Banking_Fraud_Prevention_WP_US_4301.pdf, Whitepaper by ACI
  6. An introduction to cryptography and digital signature by Ian Curry.
  7. Descriptions of SHA-256, SHA-384, and SHA-512, sha 256-384-512 pdf.
  8. RSAEncryption,http://www.geometer.org/mathcircles/RSA .pdf
  9. Web based Digital Signature Verification solution by Maestro
  10. How to increase the Online banking users confidence by Mr.Gilbert
Index Terms

Computer Science
Information Sciences

Keywords

Online Transactions Man In Browser Attack Digital Signature Mobile Phones as Software Token