ATM Security: An Analysis of PIN Codes, Biometrics, and Encryption

Verified

Added on  2025/04/29

|10
|1542
|162
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes ATM security.
Document Page
Table of Contents
Introduction...........................................................................................................................................2
Q1..........................................................................................................................................................3
Q2..........................................................................................................................................................4
Q3..........................................................................................................................................................5
Q4..........................................................................................................................................................6
Q5..........................................................................................................................................................7
Conclusion.............................................................................................................................................9
References...........................................................................................................................................10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
The report is properly based on the assessment which consists of the different questions that
are needed to be discussed. The first part explains the concept of the ATM, moving on further
in the report a scenario is used to extract out the proper outcome with the help of the formula.
The third part explains the reasons for not using biometric. Fourth part discusses the
scenarios made on False Positive and False Negative approach. At last part, Encryption and
Decryption processes are properly explained.
Document Page
Q1
ATM also referred to as Automated Teller Machines is mainly defined in order to be used for
taking out the money whenever required at different places using a card having a confidential
PIN. PIN is expressed as Personal Identification Number given to the customers by suitable
banks for keeping the card safe and can only be used by the assigned user. The main purpose
of the bank for providing the ATM was to facilitate the people to move cashless and extract
out the money whenever required (Togami et al, 2016). ATM’s are being provided to the
clients of different banks that also help in providing various benefits to them such as no risk
of losing money or getting theft by the thieves. In case the ATM gets lost, just a call can help
in blocking the card.
Moving further, let us know to understand about Confidentiality, Availabilities, and Integrity:
Confidentiality- This is the method where the data is encrypted and hidden from
unauthorized people, and the person having the rights can only decrypt the information.
All the information about the person is personal and confidential.
For eg: Only the person having the ATM card can take out the money using PIN code.
Integrity- The involvement of the third party is considered here, the amount of the
transaction can also be changed by the third party.
For eg: If a person sends 50$ to another person and a third party interferes in between by
changing the amount to 100$ then the amount would get transferred to the third party
person by changing the details.
Availability- Here, the data or the information is only being extracted by the person
having the authorization as no one else can fetch the details.
For eg: Once the account of any person gets opened then ATM card would be provided to
the person with a PIN that can only be kept with him.
Document Page
Q2
The given case can be solved with the help of the formulas being covered in the topic named
as Permutations and Combinations. This topic can help in extracting out the number of trials
the thief have to make in order to get the correct PIN code. The total number of digits present
in the ATM machine is 9 (0-9). A PIN code is of 4 digits, in order to fetch the correct code
formula for the Permutation and combination must be used (Winkler, A. 2017).
Now, as mentioned in the question, 5 of the keys were broken by the thief so, it became easy
for the thief to detect the code as the number of tries would be decreased with the decrement
in the digits. The first guess the thief can make is the 0000 and the last is 9999.
Now, moving forward to fetch the PIN Code, formula used will be-
Permutation Formula
n Pr = n! / (n – r)!
A permutation is used in case of various arrangements for a different number of elements that
helps in selecting the digits.
Combination Formula
n C r = n! / [(r !) x (n – r)! ]
The combination is used in case of the various selections where a number of elements are
taken at one time.
Using the Formula-
5P4 = 5!/(5-4)!
= 5! /1!
= (5*4*3*2*1)/1
= 120
This is the total number of attempts the thief has to make to get the correct PIN.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Q3
Three reasons that make the people think about using the Bio-metric-
Accuracy Issue: The accuracy is where the bio-metric fails most of the time.
Detecting the fingerprint is the main purpose of the bio-metric but it fails sometimes.
So, accuracy is the first issue.
Cost Issue: AI has developed a lot nowadays; bio-metric is one of the inventions
based on Artificial Intelligence. The cost related to Bio-metric is quite high and it is
not affordable at sometimes for a few of the organizations. So, the investment is quite
high for using bio-metric.
Point of Failure: Every technology has some issues related to their working. The
whole system is centralized at a single point so if that point gets into some problem or
we can say if any trouble occurs at that point the whole system gets wasted or fails.
Document Page
Q4
False Positive-
It means the result would be positive even with the negative input.
False Negative-
It means the result would be negative, as the input would also be negative.
Two Scenarios are to be discussed below based on the topic False Positive as well as False
Negative.
First Scenario:
The first Scenario is about False Positive approach, it can be understood with the help of the
example of the Face detection feature in the smartphones. The purpose of this feature is to
unlock the phone but if the smartphone gets unlocked with the face detection of some other
person then it is termed as False Positive (McCracken et al, 2018).
Second Scenario:
Next Scenario is about the False Negative Approach, it can be understood with the help of the
feature of a Fingerprint sensor in smartphones that helps in unlocking the smartphones. The
purpose of the feature is to unlock the mobile screen but sometimes due to some reasons the
sensor doesn’t accept the fingerprint, so this causes the False Negative approach.
Document Page
Q5
The conversion of the plain text into the unintelligible text is known as the Cryptography
(Pirandola et al, 2015). The security, in this case, gets increased. Here, the data which is
encrypted gets easily decrypted by the authorized person. The main purpose here is to fetch
the original text from the encrypted data. So, various techniques are being used in order to get
the original data.
The data can be attacked by the different attackers in various ways so, in order to keep the
data safe from them. Encryption and Decryption of the data are to be done so that the data in
encrypted form can only be decrypted by the authorized person (Yoon et al, 2016).
Transposition is the method that is mentioned and helps in the encryption process.
Cipher Text- Encrypted text is basically known as the Ciphertext. Before encrypting any of
the text it is considered to be plain text and after the encryption process, the text becomes
encrypted. A ciphertext is being provided as-
LCDOMXIZYXVHPXMJQSHAANWFIHABRT
This text present is considered a Ciphertext. Now, for converting the given ciphertext into
plain text few of the steps are to be followed-
Step 1: One-time pad Decryption
One time Pad Decryption is the first step to be followed first. One time pad is the process
where every page gets destroyed after one use, so for sending each of the messages a
different key is being used.
After applying the First step, the text we get is-
ENRIEOEXXKJCMWEUKOZOSDNRCWNZNN
Step 2: Ceaser Cipher Substitution Decryption
Next step to be followed is the Ceaser Cipher Substitution decryption. This method is a type
of a method where each of the letters is shifted to a few of the places down the alphabet.
After applying the Second step, the text we get is-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
JSWNJTJCCPOHRBJZPTETXISWHBSESS
Step 3- Again applying Ceaser Cipher Substitution Decryption-
The final text that we wish to get is the Plain text and the final solution is-
OXBSOYOHHUTMWGOEUYJYCNXBMGXJXX
Document Page
Conclusion
The whole report is concluded by explaining the whole scenario about the Automated Teller
Machines also abbreviated as ATM. Most of the things are being kept in a notice in the report
related to the biometric as well. A small scenario is also been used in order to extract the
outcome with the use of the proper formula. Two of the scenarios are also been mentioned
about the False Positive and the False Negative approaches. Each and every part of the
assessment explains about ATM is the proper way.
Document Page
References
Pirandola, S., Ottaviani, C., Spedalieri, G., Weedbrook, C., Braunstein, S. L., Lloyd, S., ...
& Andersen, U. L. (2015). High-rate measurement-device-independent quantum
cryptography. Nature Photonics, 9(6), 397.
McCracken, H., Smith, M., & Taylor, N. G. (2018). U.S. Patent No. 9,904,915.
Washington, DC: U.S. Patent and Trademark Office.
Winkler, A. (2017). Statistical analysis of areal quantities in the brain through
permutation tests (Doctoral dissertation, Université de Liège, Liège, Belgique).
Togami, M., Takashima, R., & Fujita, Y. (2016, September). Solving permutation
problem with a cascade combination of phase difference entropy and power spectral
correlation. In 2016 IEEE International Workshop on Acoustic Signal Enhancement
(IWAENC) (pp. 1-4). IEEE.
Yoon, H. J., Sohn, J. H., Lee, S. Y., Lee, H. T., & Cheon, J. H. (2016). U.S. Patent No.
9,379,891. Washington, DC: U.S. Patent and Trademark Office.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]