Enhancing Data Security in Banking: The Power of Hybrid Algorithm-Based Solutions

Main Article Content

Rakesh Bhavsar, Madhavi Dave, Pooja Shah, Hetal A. Joshiyara, Chintan Patel

Abstract

A safe financial system requires a safe security system. It takes a secure banking system to stop sensitive data from being stolen from customers and banks. Important information may be quickly and easily exchanged online in the modern society. A hacker may more easily take our information the easier it is to transmit information. Thus, a robust security mechanism is necessary. Currently, a banking system must guarantee the secrecy of the customer's data in order to preserve the customer's trust in the system and data security. Bank-based security systems are made secure by means of cryptographic methods.


In RSA and ECC, two keys are generated: a private key and a public key. It is the best data security technique to protect the bank against online fraud. Stated differently, the digital signature standard and associated message verification are created by both public key algorithms. Moreover, the Diffie Hellman algorithm is calculated to provide the user's keys in a secure way. Regarding mutual authentication and key exchange, it is evident that ECC is more robust and offers more advantages than RSA. Elliptic Curve Cryptography and Random Access Keys (RSA) are two distinct asymmetric algorithms that are used in this research to create a strong security system that improves data security and takes into account key exchange and mutual authentication between two untrusted parties. Our system is protected against unwanted access by the use of the encryption methods RSA and ECC.

Article Details

Section
Articles

References

Ali, S., Abdullah, T. P. T. A., Athar, A., Hussain, A., Ali, M., Yaseen, M., Joo, M. I., & Kim, H. C. (2023). Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security. Sensors (Basel, Switzerland), 23.

Pavan kumar S.Aruna Deepti, E.Sreenivasa Rao (2022). Comparison of RSA and ECC Public key cryptography techniques in WSN”. Journal of VLSI Design tools &Technology vol 12 issue 1

Islam, Md & Kobita, Aysha & Hossen, Md & Rumi, Laila & Karim, Rafat & Tabassum, Tasfia. (2021). Data Security System for A Bank Based on Two Different Asymmetric Algorithms Cryptography. 10.1007/978-981- 15-5258-8_77.

Tara Salman, Student Member, IEEE, Maede Zolanvari, Student Mem-ber, IEEE, Aiman Erbad, Member, IEEE, Raj Jain, Fellow, IEEE, and Mohammed Samaka, Member, IEEE “Security Services Using Block- chains: A State of the Art Survey” IEEE Communications Surveys & Tu-torials ( Volume: 21 , Issue: 1)

Sankalp Jagga and Puneet Sharma (2014). Banking Authentication Technique” International Journal of Information & Computation Technology. ISSN 0974- 2239 Volume 4, Number 13, pp. 1305-1314 © Inter-national Research Publications House http://www. irphouse.com

M. Tariq Banday (2011). Easing PAIN with Digital Signatures” International Journal of Computer Applications (0975 – 8887) Volume 29– No.2

Vagner Schoaba, Felipe Eduardo Gomes Sikansi, Luiz Castelo Branco (2011). Digital Signature for Mobile Devices: A New Implementation and Eval-uation” International Journal of Future Generation Communication and Networking Vol. 4, No. 2

Stallings W., ''Cryptography and Network Security 4th Ed,'' Prentice Hall, PP. 58-309, 2005.

Arpan K Kar Cryptography in the Banking Industry .https://www.researchgate.net/publication/26940 5090, © Business Fron-tiers Vol. 1, No. 1.

D. Mahto and D. K. Yadav (2015). Enhancing security of one- time password using elliptic curve cryptography with biometrics for e-commerce applications,” in Computer, Communication, Control and Information Tech-nology (C3IT).Third International Conference on. IEEE, pp. 1–6.

D. Mahto and D. Yadav (2015). Enhancing security of one-time password us-ing elliptic curve cryptography with finger- print biometric,” in Compu-ting for Sustainable Global Development (INDIACom), 2nd Inter-national Conference on, March 2015, pp. 1737–1742.

V. S. Miller. Use of elliptic curves in cryptography,” in Advances in Cryptology CRYPTO 85 Proc., ser. Lecture Notes in Computer Science,

H. Williams, Ed. Springer Berlin Heidelberg (1986) vol. 218, pp. 417–426.