Skip to main content
Top

2021 | OriginalPaper | Chapter

Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption

Authors : Rafat Karim, Laila Sultana Rumi, Md. Ashiqul Islam, Aysha Akter Kobita, Tasfia Tabassum, Md. Sagar Hossen

Published in: Evolutionary Computing and Mobile Sustainable Networks

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays security system is being with more important issues. In modern science, technology is updated day by day and we are getting insecure in our daily life. Through this project, a digital signature authentication security system has been designed to protect the bank from unauthorized access. In this paper, we are producing the most efficient and productive security system based on digital signature authentication using the asymmetric key cryptography algorithm and token-based encryption. In this project, we are using public and private keys for encryption and decryption data with the hash function and also provide digitally signed data, RSA algorithm to encrypt the data. The receiver will send a certificate and confirmation request to the sender to verify the certificate and the sender will send an OTP via phone through the Internet to authenticate the receiver. All of these works are producing a good and valuable security system in the banking sector.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hiltgen A, Kramp T, Weigold T (2006) Secure internet banking authentication. Article in IEEE Security and Privacy Magazine, Apr 2006 Hiltgen A, Kramp T, Weigold T (2006) Secure internet banking authentication. Article in IEEE Security and Privacy Magazine, Apr 2006
2.
go back to reference Ezeofor CJ, Ulasi AG (2014) Analysis of network data encryption & decryption techniques in communication systems. Int J Innov Res Sci Eng Technol (An ISO 3297: 2007 Certified Organization) 3(12), Dec 2014 Ezeofor CJ, Ulasi AG (2014) Analysis of network data encryption & decryption techniques in communication systems. Int J Innov Res Sci Eng Technol (An ISO 3297: 2007 Certified Organization) 3(12), Dec 2014
3.
go back to reference Stallings W (2005) Cryptography and network security. 4th edn. Prentice Hall, pp 58–309 Stallings W (2005) Cryptography and network security. 4th edn. Prentice Hall, pp 58–309
5.
go back to reference Iana GV, Anghelescu P, Serban G (2011) RSA encryption algorithm implemented on FPGA. In: International conference on applied electronics, pp 1–4 Iana GV, Anghelescu P, Serban G (2011) RSA encryption algorithm implemented on FPGA. In: International conference on applied electronics, pp 1–4
6.
go back to reference Rivest RL, Shamir A, Adleman L (1978) Methods for obtaining digital signatures and public key cryptosystems. Commun ACM 21:120–126 Rivest RL, Shamir A, Adleman L (1978) Methods for obtaining digital signatures and public key cryptosystems. Commun ACM 21:120–126
7.
go back to reference Tariq Banday M (2011) Easing PAIN with digital signatures. Int J Comput Appl (0975 – 8887) 29(2), Sep 2011 Tariq Banday M (2011) Easing PAIN with digital signatures. Int J Comput Appl (0975 – 8887) 29(2), Sep 2011
8.
go back to reference Kazmirchuk S, Anna I, Sergii I. Digital signature authentication scheme with message recovery based on the use of elliptic curves. In: International conference on computer science, engineering and education applications ICCSEEA 2019: Advances in computer science for engineering and education II, pp 279–288 Kazmirchuk S, Anna I, Sergii I. Digital signature authentication scheme with message recovery based on the use of elliptic curves. In: International conference on computer science, engineering and education applications ICCSEEA 2019: Advances in computer science for engineering and education II, pp 279–288
9.
go back to reference Takahashi K, Matsuda T, Murakami T, Hanaoka G, Nishigaki M (2019) Signature schemes with a fuzzy private key. Int J Inf Secur 18(5):581–617, Oct 2019 Takahashi K, Matsuda T, Murakami T, Hanaoka G, Nishigaki M (2019) Signature schemes with a fuzzy private key. Int J Inf Secur 18(5):581–617, Oct 2019
11.
go back to reference Mahto D, Yadav DK (2015) Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce applications. In: Computer, communication, control and information technology (C3IT), 2015 third international conference on. IEEE, pp 1–6 Mahto D, Yadav DK (2015) Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce applications. In: Computer, communication, control and information technology (C3IT), 2015 third international conference on. IEEE, pp 1–6
12.
go back to reference Mahto D, Yadav D (2015) Enhancing security of one-time password using elliptic curve cryptography with finger-print biometric. In: Computing for sustainable global development (INDIACom), 2015 2nd international conference on, March 2015, pp 1737–1742 Mahto D, Yadav D (2015) Enhancing security of one-time password using elliptic curve cryptography with finger-print biometric. In: Computing for sustainable global development (INDIACom), 2015 2nd international conference on, March 2015, pp 1737–1742
13.
go back to reference Singh PK, Vij P, Vyas A, Nandi SK, Nandi S. Elliptic curve cryptography based mechanism for secure wi-fi connectivity. In: International conference on distributed computing and internet technology ICDCIT 2019, pp 422–439 Singh PK, Vij P, Vyas A, Nandi SK, Nandi S. Elliptic curve cryptography based mechanism for secure wi-fi connectivity. In: International conference on distributed computing and internet technology ICDCIT 2019, pp 422–439
14.
go back to reference Dutta M, Ashiqul Islam M, Hasan Mamun M, Kaem Psyche K, Al Mamun M. Bank vault security system based on infrared radiation and GSM Technology. In: International conference on intelligent data communication technologies and internet of things ICICI 2019, pp 120–127 Dutta M, Ashiqul Islam M, Hasan Mamun M, Kaem Psyche K, Al Mamun M. Bank vault security system based on infrared radiation and GSM Technology. In: International conference on intelligent data communication technologies and internet of things ICICI 2019, pp 120–127
15.
go back to reference Prakasha K, Gowda P, Acharya V, Muniyal B, Khandelwal M. Enhanced authentication and key agreement mechanism using PKI. In: International conference on applications and techniques in information security ATIS 2018, p 40 Prakasha K, Gowda P, Acharya V, Muniyal B, Khandelwal M. Enhanced authentication and key agreement mechanism using PKI. In: International conference on applications and techniques in information security ATIS 2018, p 40
Metadata
Title
Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption
Authors
Rafat Karim
Laila Sultana Rumi
Md. Ashiqul Islam
Aysha Akter Kobita
Tasfia Tabassum
Md. Sagar Hossen
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5258-8_79