Font Size: a A A

Bank Personal Identification Number Of Research And Implementation Of Encryption, Transmission And Verification

Posted on:2013-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:F TangFull Text:PDF
GTID:2248330395450723Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the scale of card issuing by Chinese commercial banks become more and more huge, the environment to use the cards become more and more better, the merchants, POS terminals and ATMs which can accept the card are used more and more widely, also with the usage of internet online transaction and online payment platform, the banking card make people’s life and the way of consuming/shopping become more and more easy, but the security issue is made more and more critical. The banks are searching for more advanced and more reliable security technology to prevent the customer and transaction information to be disclosed by intention or fraudulently. The banking PIN is one of the most important information, this article will focus on the analysis of PIN’s encryption, translation and validation and its achievement.This article described the development of China banking cards, and its challenge encountered at security aspect, discussed about the history of cryptography and its current situation. It analyzed systematically about all kinds of functions, like encryption, decryption provided by IBM ICSF tool. This includes, how to create and manage keys, how to use different PIN format and different algorithm to create PIN, how to ensure the transmitted messages’integrity and authenticity during banking remote channel online services, and about the authentication of credit card, like the VISA card-verification data (CVV) and the MasterCard verification code (CVC). Finally, based on these cryptographic knowledge designed a new system to replace the old banking PIN security system, to archive the latest requirement of PIN security. In the new system, it detail discussed about how to create the PIN, how to encrypt it and saved in the database, how to transmit and translate PIN, how to verify the PIN. All the keys in the new system are categorized in different groups based on the key label naming convention, different usage of the key can be differentiated by the different key label name, like the PIN generation key, PIN encryption key, PIN verifying key and PIN translating key, etc.. This can make the key be used only in its designed way, prevent the fraudulent usage.
Keywords/Search Tags:Banking Card, PIN, Cryptography, Key
PDF Full Text Request
Related items