SlideShare una empresa de Scribd logo
1 de 17
Communication in
Automatic Teller Machine (ATM)
Knowing in Automatic Teller Machine
(ATM)
A block diagram of an ATM
Hardware
ATM hardware that we often use in our life
Software
VS.
Software
Linux Penguin-OS on ATMs in Brazil
Bank of Philippine running Windows XP OS
State-Chart for One Transaction
Getting
Specifics
Sendingto
Bank
Handling
InvalidPin
Completing
Transaction
Printing
Receipt
Askingifcustomer
wantsanother
Cancelled
Specificsentered
Disapproved
(exceptinvalidPIN)
ApprovedInvalidPIN
Approved
Cancelled
Not
Cancelled
Toomany
InvalidPINs
Disapproved
(exceptinvalidPIN)
OrCancelled
ATM Transaction Processing
Provider
DataCenter
TANDEM CoreBranch
-GPRS
-3G
-ADSL
Encryption
Encryption
Encryption
ATMMachine
Encryption=3DESor AES-256bits
Branch=AES-256bits
ATMMachine=3DES
DisasterRecoverySite
Encryption Encryption
Encryption
NormalConnection
BackupConnection
Branch Transaction Processing
Provider1
DataCenter
TANDEM CoreBranch
Encryption
Encryption
Encryption=3DESor AES-256bits
Branch=AES-256bits
ATMMachine=3DES
DisasterRecoverySite
Encryption Encryption
Encryption
Branch
Provider2
MPLSL2
(Speed512-1024kbps)
MPLSL1
(Speed512-1024kbps)
NormalConnection
BackupConnection
DDN (Digital Data Network)
• Point to point
• Accuracy
• Fast
• Secure
• Backup Connection
• High ROI
• High cost (compare to other technologies)
DDN Applications
DSU/CSU
DSU/CSU
DSU/CSU
DSU/CSU
Router
PC
PC
PC
Mainframe
ATMMachine
Telepresence
DDN LAN
MPLS VPN (Multi Protocol Label
Switching Virtual Private Network)
• Point to point, Point to multi-point
• VPN
• Leverage existing ATM hardware
• Ultra fast forwarding
• IP Traffic Engineering
• Constraint-based Routing
• Controllable tunneling mechanism
• Voice/Video on IP
• QoS constraints
• Cost effective (compare to other technologies)
MPLS
Branch1
Branch6
Branch2
Branch3
Branch4
Branch5
MPLS VPN
MostbankinThailanduse
512-1024kbpslinksspeed.
DDN vs. MPLS
Feature DDN MPLS
Connection Type Point to Point Point to Point, Point to
Multi-Point
Disaster Recovery Link No Yes
VPN Ability No Yes
Price High* Low*
*Compare to other
technologies
3DES (Triple Data Encryption Algorithm)
• Most widely used algorithm
• Pioneered by IBM
• It is symmetric crypto system
• Developed to protect sensitive, unclassified, US
government, Computer data.
• Used to provide authentication of electronic funds transfer
messages.
AES-256bits (Advanced Encryption
Standard)
• Designed simple
• Low memory cost
• High speed algorithm
• The key used to decrypt and encrypt is same
• Cipher text and plain text are same size
• Fast both in Software and Hardware
AES-256bits vs. 3DES**
Feature AES 3DES
Description Advanced
Encryption
Standard
Triple Data
Encryption
Standard
Timeline Official standard
since 2001
Standardized
1997
Type of algorithm Symmetric Symmetric
Key size (bits) 256 168
Speed High Low
Time to crack
(assume a
machine could try
255 key per
second - NIST)
149 trillion years 4.6 billon years
Resource
consumption
Low Medium
**“AES can encrypt data much faster than Triple-
DES, a DES enhancement which essentially
Q&A

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Atm System
Atm SystemAtm System
Atm System
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Atm system
Atm systemAtm system
Atm system
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
Whitelabel atm
Whitelabel atmWhitelabel atm
Whitelabel atm
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Ppt final
Ppt finalPpt final
Ppt final
 
Atm system_project
Atm system_projectAtm system_project
Atm system_project
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Atm security
Atm securityAtm security
Atm security
 
Atm.ppt
Atm.pptAtm.ppt
Atm.ppt
 
EMV Overview
EMV OverviewEMV Overview
EMV Overview
 
EMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow WorksEMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow Works
 
Bank system presentation
Bank system presentationBank system presentation
Bank system presentation
 
Atm security
Atm securityAtm security
Atm security
 
Atm Simulator
Atm SimulatorAtm Simulator
Atm Simulator
 
Digital Payment Campaign
Digital Payment CampaignDigital Payment Campaign
Digital Payment Campaign
 
ATM
ATMATM
ATM
 

Similar a Communication in automatic teller machine (atm)

Shopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuseShopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuseAndrey Apuhtin
 
Defcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posDefcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posPriyanka Aash
 
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & ProfitDerbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & ProfitMauricio Velazco
 
Mobile Network Attack Evolution
Mobile Network Attack EvolutionMobile Network Attack Evolution
Mobile Network Attack EvolutionPositive Hack Days
 
Атаки на мобильные сети
Атаки на мобильные сетиАтаки на мобильные сети
Атаки на мобильные сетиEkaterina Melnik
 
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...TUESDAY Business Network
 
Derived Unique Token per Transaction
Derived Unique Token per TransactionDerived Unique Token per Transaction
Derived Unique Token per TransactionPriyanka Aash
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machineVidya Sagar
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Olga Kochetova
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sOlga Kochetova
 
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)Nate Lawson
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionmalvvv
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesYan Cui
 
Botnet Detection And Countermeasures
Botnet Detection And CountermeasuresBotnet Detection And Countermeasures
Botnet Detection And CountermeasuresSynerzip
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionRoberto C. Mayer
 
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
 CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming  CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming Anand Bhojan
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesYan Cui
 

Similar a Communication in automatic teller machine (atm) (20)

Shopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuseShopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuse
 
ATM
ATMATM
ATM
 
Defcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posDefcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-pos
 
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & ProfitDerbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
 
Mobile Network Attack Evolution
Mobile Network Attack EvolutionMobile Network Attack Evolution
Mobile Network Attack Evolution
 
Атаки на мобильные сети
Атаки на мобильные сетиАтаки на мобильные сети
Атаки на мобильные сети
 
Teller pass slides
Teller pass slidesTeller pass slides
Teller pass slides
 
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
 
Derived Unique Token per Transaction
Derived Unique Token per TransactionDerived Unique Token per Transaction
Derived Unique Token per Transaction
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’s
 
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile games
 
Botnet Detection And Countermeasures
Botnet Detection And CountermeasuresBotnet Detection And Countermeasures
Botnet Detection And Countermeasures
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introduction
 
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
 CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming  CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile games
 
Cisco Equipment Security
Cisco Equipment SecurityCisco Equipment Security
Cisco Equipment Security
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

Communication in automatic teller machine (atm)

  • 2. Knowing in Automatic Teller Machine (ATM) A block diagram of an ATM
  • 3. Hardware ATM hardware that we often use in our life
  • 5. Software Linux Penguin-OS on ATMs in Brazil Bank of Philippine running Windows XP OS
  • 6. State-Chart for One Transaction Getting Specifics Sendingto Bank Handling InvalidPin Completing Transaction Printing Receipt Askingifcustomer wantsanother Cancelled Specificsentered Disapproved (exceptinvalidPIN) ApprovedInvalidPIN Approved Cancelled Not Cancelled Toomany InvalidPINs Disapproved (exceptinvalidPIN) OrCancelled
  • 7. ATM Transaction Processing Provider DataCenter TANDEM CoreBranch -GPRS -3G -ADSL Encryption Encryption Encryption ATMMachine Encryption=3DESor AES-256bits Branch=AES-256bits ATMMachine=3DES DisasterRecoverySite Encryption Encryption Encryption NormalConnection BackupConnection
  • 8. Branch Transaction Processing Provider1 DataCenter TANDEM CoreBranch Encryption Encryption Encryption=3DESor AES-256bits Branch=AES-256bits ATMMachine=3DES DisasterRecoverySite Encryption Encryption Encryption Branch Provider2 MPLSL2 (Speed512-1024kbps) MPLSL1 (Speed512-1024kbps) NormalConnection BackupConnection
  • 9. DDN (Digital Data Network) • Point to point • Accuracy • Fast • Secure • Backup Connection • High ROI • High cost (compare to other technologies)
  • 11. MPLS VPN (Multi Protocol Label Switching Virtual Private Network) • Point to point, Point to multi-point • VPN • Leverage existing ATM hardware • Ultra fast forwarding • IP Traffic Engineering • Constraint-based Routing • Controllable tunneling mechanism • Voice/Video on IP • QoS constraints • Cost effective (compare to other technologies)
  • 13. DDN vs. MPLS Feature DDN MPLS Connection Type Point to Point Point to Point, Point to Multi-Point Disaster Recovery Link No Yes VPN Ability No Yes Price High* Low* *Compare to other technologies
  • 14. 3DES (Triple Data Encryption Algorithm) • Most widely used algorithm • Pioneered by IBM • It is symmetric crypto system • Developed to protect sensitive, unclassified, US government, Computer data. • Used to provide authentication of electronic funds transfer messages.
  • 15. AES-256bits (Advanced Encryption Standard) • Designed simple • Low memory cost • High speed algorithm • The key used to decrypt and encrypt is same • Cipher text and plain text are same size • Fast both in Software and Hardware
  • 16. AES-256bits vs. 3DES** Feature AES 3DES Description Advanced Encryption Standard Triple Data Encryption Standard Timeline Official standard since 2001 Standardized 1997 Type of algorithm Symmetric Symmetric Key size (bits) 256 168 Speed High Low Time to crack (assume a machine could try 255 key per second - NIST) 149 trillion years 4.6 billon years Resource consumption Low Medium **“AES can encrypt data much faster than Triple- DES, a DES enhancement which essentially
  • 17. Q&A