Biometric ATM Security: CIA Triad and Cryptography (ITC 595)

Verified

Added on  2025/04/28

|10
|1831
|149
AI Summary
Desklib provides past papers and solved assignments for students. This solved assignment explores Biometric ATM security.
Document Page
ITC 595
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction...........................................................................................................................................3
QUES 1.................................................................................................................................................4
Ques2....................................................................................................................................................5
Ques3:...................................................................................................................................................5
QUES: 4................................................................................................................................................6
Ques: 5..................................................................................................................................................7
Conclusion.............................................................................................................................................9
Reference.............................................................................................................................................10
Document Page
Introduction
There is a basic question in the assessment which consists of the biometric ATM which have
different functionality form the CIA which is the agency which helps in the Integrity,
Availability, and Confidentiality. There is one question which was based on the maths topic
of permutation and combination. There is the security of the management which helps to
manage to keep the ATM system in the security.
Document Page
QUES 1:
Automated Teller Machines (ATM) are designed so that users will provide a personal
identification number (PIN) and a card to access their bank accounts. Give examples of
confidentiality, integrity and availability requirements associated in such a system and
describe the degree of importance for each requirement.
ANS: 1
The idea of ATM is to low the crime which happens for the money. And to keep the money
secure, this gives the rise to ATM which stand for the Automated Teller Machine. There is
the account in the bank of the user who keeps the money in that account and the bank
provides the ATM which helps the person to fetch the money from anywhere. There is the
agency named the CIA which stands for the Central Intelligence Agency. This agency
follows the 3 main factors namely,
1. Integrity
2. Confidentiality
3. Availabilities
1. Integrity: This means that there is involvement of the third party which means the detail
can be changed by the third part to fetch the online in his bank. The person can change the
details in between.
Example If Y party want to send the money to X party with the amount of the $100 now
when the party Y enter the details of the party X then the third party will change it internally
and as soon as the Y transferred the money all will be Z party which is the third party.
2. Confidentiality: This is the method to keep the data stored and save and secure. To the
bank the individuals will be filled is confidential which will be the details of the person so
that the person can be authorized. The data is encrypted and can be decrypted by the owner
only provided some key to the person. The person will understand all the facts of the bank
and the details of the person will help to fetch the information of the person.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Example: The very good example of confidentiality is the SSL and TLS which is the security
of the protocol which provides the facilities of the good number of the protocols. The PIN of
the can be entered by the user to fetch the data or the money (Seo, et al., 2019)
Ques2:
A thief broke into an Automated Teller Machine (ATM) using a screwdriver and was able to
jam the card reader as well as breaking five keys from the keypad. The thief had to halt the
process of a break-in and hide, as a customer approached to use the ATM. The customer was
able to successfully enter their ATM card, punch in the 4 digit PIN and was able to draw out
some cash. Since the card reader was jammed, the customer was however not able to
withdraw the ATM card and drove off to seek some help. In the meantime, the thief came
back and decided to try to discover the customer’s PIN so that he can steal money from the
customer. You are required to calculate the maximum number of PINs that the thief may have
to enter before correctly discovering the customer’s PIN?
Ans2: The customer who came in the ATM will use the 5 keys only which are not broken by
the thief, therefore the customer will only be able to operate the PIN from that 5. So now
from the previous knowledge, we can use the permutation and the combination to solve this
problem. Now the ATM consist of the 0-9 numeric keys excluding the special keys that are
clear, enter and cancel key will do not relational with this.
Now according to the question the thief has broken the 5 keys, therefore, the thief has to
make the PIN from the 5 keys only. The Combination of 4 pouts of 5 he has to select the
correct PIN.
Now the permutation includes the different arrangement and the combination includes the
selection of the elements and the person can have the minimum 0000 and the maximum 9999
combination in his hand, therefore one there is to make the selection and the combination,
therefore, the expression of the maximum arrangement is 5P4 = 5!/(5-4)! = 5! /!=
(5*4*3*2*1)/1= 120.
Ques3:
The authentication of biometrics has the 3 main and basic reasons for the reluctant to use the
biometrics. There are various ways to which counter the objects.
Document Page
There are three factors which have the basic reason for the reluctant namely
1: Point of failure
2: Accuracy problem
3: Cost
1: Point of failure: The system of the ATM is like the whole system is connected with the
bank and each other and when there is any problem in bank of the account all the things will
be stopped because it follows the bus topology which their there is any type of damage find
the all will stop working because connected with each other.
2: Accuracy Problem: There might be accuracy not achieve like the authorization may not
implement the biometric at it right things. The inaccuracy occurs due to the implantation of
the biometrics of the person bod parts and the authentication. The authorization is given to
the authorized person only with the proper authentic Id which will help to have the security.
3. Cost: The cost is the main factor in the any kind of project so here also the cost is one of
the factors that the person can be able to have the system in the organisation because this is
the most costly because there is implementation of the AI in the software of the biometric so
that this will be convenient to the person who put this figure print so that the machine can
speak something like thank u or successful and if not then try again message can be shown.
There to apply this organization should invest high in these technologies because this is
costly (Breier, et., al 2019 )
QUES: 4
In biometric authentication, false positive and false negative rates can be tuned according to
the requirement, and they are often complementary i.e. raising one lowers the other. Describe
two circumstances where false negatives are significantly more serious than false positives.
False Positive and the False Negative
False Positive means to get the positive result of the task and the false negative means is to
get the wrong result of the task. Let us understand this by the scenario:
Case1:
Document Page
The biometric work is to measure the person identify by the fingerprints of the person and in
the organization this is important so that the employee attendance can be seen but owner done
have that much fund to invest so this will be suffered by the owner only, because there is no
funding and this tends to the false negative. There is all thing stored in the database of the
person and when there is an issue found in the database this will lead to the false negative and
have to suffer from the common person only.
Case 2:
There might be the satiation occur when the person feels easy to die or will be hurt
completely. There is the loss of the individual's characters which is doe y the society and by
telling them again and again and might that person will not be able to bear than he or she will
i.e. because of the pressure. This is the most false negative.
Ques: 5
Ans:5 Transposition is one known method of encrypting the text. What can be one way that a
piece of ciphertext can be determined quickly if it was likely a result of a transposition?
Utilizing some of the decryption techniques (substitution and others) covered in the subject
so far, you are required to decipher (find the plain text) the ciphertext that will be provided to
you closer to the assessment due date via the subject site. In order to present your solution,
you need to demonstrate and explain the steps taken to decipher this text.
Ans:5 In this the transposition is the other name of the rail fence which means to convert the
ciphertext to the plain text or wise versa. So the ciphertext is identified by the process so
decryption and the plain text to cipher text the thing is called is the encryption. The process of
converting the data is cryptography. The encryption can be done by the sender and the
decryption can be done by the receiver after knowing the keys.
The steps of the encryption and the decryption:
Encryption:
The ciphertext is written in the downward diction and the if downward over then
upward direction
The traversing the text is done by row-wise.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The encryption text is received (Ghosh, P., & Thakor, V. 2019).
Decryption
The decryption is done of the encrypted text only in the rail the decryption is formed by the
When we get the text the in the form of the metric and then the key is given to the person so
that he or she can decrypt. Now the data is fetched by row-wise and traversing is done in a
zigzag manner.
Let us see the example of this:
Ciphertext: encrypted
Dttrepiaaeecynodihrns
Plain text: decryption
Decryption data is here
Document Page
Conclusion
The above report is of the biometric of the ATM and here there is the security of the
management which helps to manage to keep the ATM system in the security. There is the
account in the bank of the user who keeps the money in that account and the bank provides
the ATM which helps the person to fetch the money from anywhere all the thing is explained
in the above report. It is false positive and false positive. There is the decryption and the
encryption techniques used.
Document Page
Reference
Seo, M., Abdalla, M., Lee, D. H., & Park, J. H. (2019). New Technique for Chosen-
Ciphertext Security Based on Non-Interactive Zero-Knowledge. Information Sciences.]
Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., & Iwata, T. (2019, March). Quantum
chosen-ciphertext attacks against Feistel ciphers. In Cryptographers’ Track at the RSA
Conference (pp. 391-411). Springer, Cham.
Ghosh, P., & Thakor, V. (2019). Optimization of Hybrid Encryption Algorithm for Secure
Communication System. In Third International Congress on Information and
Communication Technology (pp. 973-981). Springer, Singapore.
Sharma, A., Keshwani, B., & Dadheech, P. (2019). Authentication Issues and Techniques in
Cloud Computing Security: A Review. Available at SSRN 3362164.
Breier, J., Hou, X., & Bhasin, S. (Eds.). (2019). Automated Methods in Cryptographic Fault
Analysis. Springer Nature.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]