Abstract
Recently, a strong security system is very important for a safe banking system. To prevent hacking of important information of bank and client, a secure banking system is a must. This paper deals with a strong security system using a hash function and two different asymmetric algorithms (DSA and RSA) at a time, it will enhance data security. We are using RSA and DSA encryption algorithm to secure our system from unauthorized access. In RSA and DSA, we have to generate two keys called Public and Private Keys. If we use the signer’s private key for encryption, then we have to use the signer’s public key for decryption. The system will verify by confirmation and certificate and the sender will be sent an OTP via mobile phone of the receiver to confirm the authentication. This is the most efficient data security system to save the bank from hacktivism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tariq Banday M (2011) Easing PAIN with digital signatures. Int J Comput Appl (0975–8887) 29(2)
Stallings W (2005) Cryptography and network security, 4th edn. Prentice Hall, pp 58–309
Mahto D, Yadav DK (2015) Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce applications. In: 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT). IEEE, pp 1–6
Salman T (Student Member, IEEE), Zolanvari M (Student Member, IEEE), Erbad A (Member, IEEE), Jain R (Fellow, IEEE), Samaka M (Member, IEEE) (2019) Security services using blockchains: a state of the art survey. IEEE Commun Surv Tutor 21(1)
Harmouch Y, Kouch R (2017) A fair comparison between several ciphers in characteristics, safety and speed test. In: Europe and MENA cooperation advances in information and communication technologies, vol. 520. ISBN: 978-3-319-46567-8
Dutta M, Ashiqul Islam Md, Mamun MH, Psyche KK, Al Mamun M Bank vault security system based on infrared radiation and GSM technology. In: International conference on intelligent data communication technologies and internet of things ICICI 2019, pp 120–127
Jagga S, Sharma P (2014) Banking authentication technique. Int J Inf Comput Technol 4(13):1305–1314. International Research Publications House. ISSN 0974-2239. http://www.irphouse.com
Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and rsa digital signatures. nicj.net/files
Akgül A, Çavuşoğlu Ü, Zengin A, Pehlivan I (2017) The design and implementation of hybrid RSA algorithm using a novel chaos based RNG. Chaos Solitons Fractals 104:655–667
Schoaba V, Sikansi FEG, Branco LC (2011) Digital signature for mobile devices: a new implementation and evaluation. Int J Futur Gener Commun Netw 4(2)
V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology CRYPTO 85 Proc., ser. Lecture Notes in Computer Science, H. Williams, Ed. Springer Berlin Heidelberg, 1986, vol. 218, pp. 417–426
Kar AK Cryptography in the banking industry. Frontiers 1(1). https://www.researchgate.net/publication/269405090. Business
Mahto D, Yadav D (2015) Enhancing security of one-time password using elliptic curve cryptography with finger-print biometric. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), March 2015, pp 1737–1742
Dixit P, Gupta AK, Trivedi MC, Yadav VK (2018) Traditional and hybrid encryption techniques: a survey. Netw Commun Data Knowl Eng 4. ISBN: 978-981-10-4599-8
Saraswat V, Sahu RA, Sharma G, Kuchta V, Markowitch O (2019) Public-key encryption with integrated keyword search. J Hardw Syst Secur 3(1):12–25
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ashiqul Islam, M., Kobita, A.A., Sagar Hossen, M., Rumi, L.S., Karim, R., Tabassum, T. (2021). Data Security System for A Bank Based on Two Different Asymmetric Algorithms Cryptography. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_77
Download citation
DOI: https://doi.org/10.1007/978-981-15-5258-8_77
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5257-1
Online ISBN: 978-981-15-5258-8
eBook Packages: EngineeringEngineering (R0)