Secure login technique for online banking


  • Doaa Yaseen Khudhur Anbar university
  • Belal Al-Khateeb
  • Hadeel Amjed Saeed





Authentication, Online Banking, Two Level Passwords, Security, Personal Identification Number (PIN).


In recent years, there are many authentication protocols that are used in the accessing of the sensitive and private data. However most of those methods have many weaknesses by which data can be extracted and used by unauthorized people this due to the use of a one level authentication that may face many attacks. This paper presents an authentication method that involves three levels of user authentication; the first two levels use two level passwords authentication together with a Personal Identification Number (third level) for every operation in Electronic Banking system. Hash functions -Secure Hash Algorithms- and Cyclic Redundancy check (32) for the generations of Personal Identification Number are used. This system eliminates the problem that is related with single level password authentication system and improves the security by using Personal Identification Number.



[1] Janardan Choubey and Bhaskar Choubey," Secure User Authentication in Internet Banking: A Qualitative Survey", International Journal of Innovation, Management and Technology, Vol. 4, No. 2, April 2013.

[2] Rajpreet Kaur Jassal, Dr. Ravinder Kumar Sehgal,"Comparitive Study of Online Banking Security System of various Banks in India", International Journal of Engineering, Business and Enterprise Applications, IJEBEA, 6(1), September-November 2013, pp. 90-96.

[3] Jeffrey M. Kopchik, Matthew Biliouris, John Carlson and Michael Wallas, "Authentication in an Electronic Banking Environment August "8, 2001,2000 K Street,NW,suite 310,Washington DC 2006,(202)872-7500.FAX(202) 872-7501.

[4] Ashwini Deshpande,Suchita Singh, Amrita Kharga,Dr.LataRagha,"SESSION PASSWORDS USING THREE LEVEL AUTHENTICATION SYSTEM, International Journal of Technical Research and Applications ,e-ISSN: 2320-8163, Special Issue 41 (AVALON) (March 2016), PP. 26-29.

[5] Abhishek Gandhi, Bhagwat Salunke, SnehalIthape, Varsha Gawade and Prof.SwapnilChaudhari,"Advanced Online Banking Authentication System Using One Time Passwords Embedded in Q-R Code", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 1327-1329.

[6] Nalini C. Iyer and Sagarika Mandal,"Implementation of Secure Hash Algorithm-1 using FPGA",International Journal of Information and Computation Technology.ISSN 0974-2239 Volume 3, Number 8 (2013), pp. 757-764.

[7] William Stallings,"Cryptography and Network Security Principles and Practices, Fourth Edition", Prentice Hall, November 16, 2005.

[8] Yogendra Singh Solanki, "Performance Based Design and Implementation of a SHA-1 HashModule on FPGA",International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 12, December 2012.

[9] Chris Borrelli, "Cyclic Redundancy Check", IEEE 802.3, XAPP209 (v1.0) March23, 2001.

[10] Hamed Sheidaeian and Behrouz Zolfaghari,"PARALLEL COMPUTATION OF CRC USING SPECIALGENERATOR POLYNOMIALS",International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.1, January 2012.

View Full Article: