About me | My thinking | Seminar given | Project done | FAQ | personal |
Till now we are concentrating on decoding the password and I think it’s very difficult and it takes a long time. So to overcome this type of problem now I have developed a new type of technique. To understand this you have to concentrate on what are the problems we are facing on decrypting a unknown data. See the following figure.
For a client machine
In the above figure I am using 3-levels of encryption technique. The more levels are use to provide more security to the data. Most of people think that more encryption level added to a system is more secure. But now I am going to break that traditional thinking. As the above figure show 3-leveles of encryption technique, so it’s vary difficult to decrypt. But do you think that to hack a system it is necessary to decrypt its password. In my opinion no absolutely not.
For a server machine
Now think a system like ATM system. Suppose you are inserting input data to draw Rs. 500/-. (let it be y) and after passing the 3-leveles of encryption let it will converted to y3. So the y3 will be transmitted to the centralized database for verification and updating the account. After getting the y3 the server decrypts the y3 to y and sends the y to the centralized database. The centralized database will verify the data and update the account by deducting Rs. 500/-. After that the centralized database will send data as the permission granted to the server (let it be x). The server processes some encryption technique to encrypt the data (let the encrypted data be x3). After that it will transmit x3 to the client machine (i.e. ATM). By getting x3, first of all, the ATM will decrypt the data to x then it will verify the data. After all the ATM machine will give you Rs 500/-. This is a rough scheme or mechanism that is used in ATM systems. Y3-----------à ß-----------x3
(ATM Machine) (Centralized Server)
Now I will tell you how you can able to hack this type of system. Do you think that you have to know the encryption technique they have used? In my opinion no and absolutely not. But you have to know the y3 and x3 for each event. Now monitor all to process with respect to time slice. Calculate the time gaps between each process. Then by any way if you are able to block the transmitting of y3 to the centralized server. And transmit the x3 from your system (with doing IP spoofing). Then you are able to withdraw Rs.500/- having your account balance remains same.
|
About me | My thinking | Seminar given | Project done | FAQ | personal |