Security analysis of mobile banking
This report provides a comprehensive theoretical study on security analysis of mobile banking. As mobile banking gets more and more efficient and convenient in recent years, security is as important as ever. It will be disastrous if sensitive information is obtained by attackers who wants to make us...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/76169 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-76169 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-761692023-03-03T20:26:31Z Security analysis of mobile banking Tok, Jonus Jun Ming Althea Liang Qianhui School of Computer Science and Engineering DRNTU::Engineering::Computer science and engineering This report provides a comprehensive theoretical study on security analysis of mobile banking. As mobile banking gets more and more efficient and convenient in recent years, security is as important as ever. It will be disastrous if sensitive information is obtained by attackers who wants to make use of such information for their own benefit. Currently, there are several security protocols existing in the real world, such as Hypertext Transfer Protocol Secure (HTTPS), two factor authentications (2FA), Rivest-Shamir-Adleman (RSA), Advanced Encryption standard (AES), Message Authentication Code (MAC) and Secure remote password protocol (SRP). This paper aims to study and research on the existing protocols and understand their vulnerability to security attacks. This paper also aims to research and study the algorithms behind DBS Paylah! security protocol (OAUTH) and attempts to apply SRP concepts on an imaginary bank to demonstrate how SRP can overcome the theoretical shortcomings of Oauth. Bachelor of Engineering (Computer Science) 2018-11-21T15:50:33Z 2018-11-21T15:50:33Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/76169 en Nanyang Technological University 50 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Tok, Jonus Jun Ming Security analysis of mobile banking |
description |
This report provides a comprehensive theoretical study on security analysis of mobile banking. As mobile banking gets more and more efficient and convenient in recent years, security is as important as ever. It will be disastrous if sensitive information is obtained by attackers who wants to make use of such information for their own benefit. Currently, there are several security protocols existing in the real world, such as Hypertext Transfer Protocol Secure (HTTPS), two factor authentications (2FA), Rivest-Shamir-Adleman (RSA), Advanced Encryption standard (AES), Message Authentication Code (MAC) and Secure remote password protocol (SRP). This paper aims to study and research on the existing protocols and understand their vulnerability to security attacks. This paper also aims to research and study the algorithms behind DBS Paylah! security protocol (OAUTH) and attempts to apply SRP concepts on an imaginary bank to demonstrate how SRP can overcome the theoretical shortcomings of Oauth. |
author2 |
Althea Liang Qianhui |
author_facet |
Althea Liang Qianhui Tok, Jonus Jun Ming |
format |
Final Year Project |
author |
Tok, Jonus Jun Ming |
author_sort |
Tok, Jonus Jun Ming |
title |
Security analysis of mobile banking |
title_short |
Security analysis of mobile banking |
title_full |
Security analysis of mobile banking |
title_fullStr |
Security analysis of mobile banking |
title_full_unstemmed |
Security analysis of mobile banking |
title_sort |
security analysis of mobile banking |
publishDate |
2018 |
url |
http://hdl.handle.net/10356/76169 |
_version_ |
1759853782069411840 |