Open Access Open Access  Restricted Access Subscription or Fee Access

Data Security System for a Bank using Hybrid Algorithm

S. Aruna Deepthi, V. Aruna, S. Jhansi, R. Leelavathi

Abstract


A secure security system is critical for a secure banking system. A secure banking system is required to prevent the theft of sensitive data from banks and clients. In today's world, exchanging vital information over the internet is extremely simple and quick. The easier it is to exchange information, the easier it is for the hacker to steal our information .As a result, a strong security system is required. To maintain the customer's confidence in the system and data security, a banking system is currently required to ensure the confidentiality of the customer's data. Bank-based safety mechanisms are made secure by means of cryptographic methods. In RSA and ECC, two keys are generated: a private key and a public key.. It is the most effective data security method for defending the bank from cybercrime. In other words, both public key algorithms create the digital signature standard and its message verification. Furthermore, the Diffie Hellman method is computed to supply the user's keys in a safe manner. In terms of key exchange and mutual authentication, it is clear that ECC has more benefits and is more powerful than RSA. This paper deals with a solid security system using two different asymmetric algorithms namely, Elliptic Curve Cryptography and RSA, it will enhance data security, and consider the mutual authentication, and key exchange between two untrusted parties. Our system is protected against unwanted access by the use of the encryption methods RSA and ECC.


Keywords


Curve Cryptography, RSA, Security Method, communication, Banking systems, Social Networking.

Full Text:

PDF

References


“Pavan kumar S.Aruna Deepti, E.Sreenivasa Rao “Comparison of RSA and ECC Public key cryptography techniques in WSN”. Journal of VLSI Design tools &Technology vol 12 no.1 issue (2022).

Islam, Md & Kobita, Aysha & Hossen, Md & Rumi, Laila & Karim, Rafat & Tabassum, Tasfia. (2021). Data Security System for A Bank Based on Two Different Asymmetric Algorithms Cryptography. 10.1007/978-981-15-5258-8_77.

Tara Salman, Student Member, IEEE, Maede Zolanvari, Student Mem-ber, IEEE, Aiman Erbad, Member, IEEE, Raj Jain, Fellow, IEEE, and Mohammed Samaka, Member, IEEE “Security Services Using Block-chains: A State of the Art Survey” IEEE Communications Surveys & Tu-torials (Volume: 21, Issue: 1,

Sankalp Jagga and Puneet Sharma on” Banking Authentication Tech-nique” International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1305-1314 © Inter-national Research Publications House http://www. irphouse.com

M. Tariq Banday” Easing PAIN with Digital Signatures” International Journal of Computer Applications (0975 – 8887) Volume 29– No.2, Sep-tember 2011

Vagner Schoaba, Felipe Eduardo Gomes Sikansi, Luiz Castelo Branco” Digital Signature for Mobile Devices: A New Implementation and Eval-uation” International Journal of Future Generation Communication and Networking Vol. 4, No. 2, June, 2011

Stallings W., ''Cryptography and Network Security 4th Ed,'' Prentice Hall, PP. 58-309, 2005.

Arpan K Kar” Cryptography in the Banking Industry”https://www.researchgate.net/publication/269405090, © Business Fron-tiers Vol. 1, No. 1.

D. Mahto and D. K. Yadav, “Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce appli-cations,” in Computer, Communication, Control and Information Tech-nology (C3IT), 2015 Third International Conference on. IEEE, 2015, pp. 1–6.

D. Mahto and D. Yadav, “Enhancing security of one-time password us-ing elliptic curve cryptography with finger-print biometric,” in Compu-ting for Sustainable Global Development (INDIACom), 2015 2nd Inter-national Conference on, March 2015, pp. 1737–1742.

V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology CRYPTO 85 Proc., ser. Lecture Notes in Computer Science,

H. Williams, Ed. Springer Berlin Heidelberg, 1986, vol. 218, pp. 417–426.




DOI: https://doi.org/10.37591/joedt.v14i2.7732

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Electronic Design Technology