Skip to main content

Data Security System for A Bank Based on Two Different Asymmetric Algorithms Cryptography

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Abstract

Recently, a strong security system is very important for a safe banking system. To prevent hacking of important information of bank and client, a secure banking system is a must. This paper deals with a strong security system using a hash function and two different asymmetric algorithms (DSA and RSA) at a time, it will enhance data security. We are using RSA and DSA encryption algorithm to secure our system from unauthorized access. In RSA and DSA, we have to generate two keys called Public and Private Keys. If we use the signer’s private key for encryption, then we have to use the signer’s public key for decryption. The system will verify by confirmation and certificate and the sender will be sent an OTP via mobile phone of the receiver to confirm the authentication. This is the most efficient data security system to save the bank from hacktivism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tariq Banday M (2011) Easing PAIN with digital signatures. Int J Comput Appl (0975–8887) 29(2)

    Google Scholar 

  2. Stallings W (2005) Cryptography and network security, 4th edn. Prentice Hall, pp 58–309

    Google Scholar 

  3. Mahto D, Yadav DK (2015) Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce applications. In: 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT). IEEE, pp 1–6

    Google Scholar 

  4. Salman T (Student Member, IEEE), Zolanvari M (Student Member, IEEE), Erbad A (Member, IEEE), Jain R (Fellow, IEEE), Samaka M (Member, IEEE) (2019) Security services using blockchains: a state of the art survey. IEEE Commun Surv Tutor 21(1)

    Google Scholar 

  5. Harmouch Y, Kouch R (2017) A fair comparison between several ciphers in characteristics, safety and speed test. In: Europe and MENA cooperation advances in information and communication technologies, vol. 520. ISBN: 978-3-319-46567-8

    Google Scholar 

  6. Dutta M, Ashiqul Islam Md, Mamun MH, Psyche KK, Al Mamun M Bank vault security system based on infrared radiation and GSM technology. In: International conference on intelligent data communication technologies and internet of things ICICI 2019, pp 120–127

    Google Scholar 

  7. Jagga S, Sharma P (2014) Banking authentication technique. Int J Inf Comput Technol 4(13):1305–1314. International Research Publications House. ISSN 0974-2239. http://www.irphouse.com

  8. Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and rsa digital signatures. nicj.net/files

    Google Scholar 

  9. Akgül A, Çavuşoğlu Ü, Zengin A, Pehlivan I (2017) The design and implementation of hybrid RSA algorithm using a novel chaos based RNG. Chaos Solitons Fractals 104:655–667

    Article  Google Scholar 

  10. Schoaba V, Sikansi FEG, Branco LC (2011) Digital signature for mobile devices: a new implementation and evaluation. Int J Futur Gener Commun Netw 4(2)

    Google Scholar 

  11. V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology CRYPTO 85 Proc., ser. Lecture Notes in Computer Science, H. Williams, Ed. Springer Berlin Heidelberg, 1986, vol. 218, pp. 417–426

    Google Scholar 

  12. Kar AK Cryptography in the banking industry. Frontiers 1(1). https://www.researchgate.net/publication/269405090. Business

  13. Mahto D, Yadav D (2015) Enhancing security of one-time password using elliptic curve cryptography with finger-print biometric. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), March 2015, pp 1737–1742

    Google Scholar 

  14. Dixit P, Gupta AK, Trivedi MC, Yadav VK (2018) Traditional and hybrid encryption techniques: a survey. Netw Commun Data Knowl Eng 4. ISBN: 978-981-10-4599-8

    Google Scholar 

  15. Saraswat V, Sahu RA, Sharma G, Kuchta V, Markowitch O (2019) Public-key encryption with integrated keyword search. J Hardw Syst Secur 3(1):12–25

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Ashiqul Islam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ashiqul Islam, M., Kobita, A.A., Sagar Hossen, M., Rumi, L.S., Karim, R., Tabassum, T. (2021). Data Security System for A Bank Based on Two Different Asymmetric Algorithms Cryptography. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_77

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_77

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics