International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Robust Security Strategy Using Hybrid Cryptography Approach to Protect Data in the Financial Sector

Author NameAuthor Details

Bilas Haldar, Partha Kumar Mukherjee, Himadri Nath Saha

Bilas Haldar[1]

Partha Kumar Mukherjee[2]

Himadri Nath Saha[3]

[1]Department of Computer Science and Engineering, The Neotia University, Sarisha, South 24 Parganas, West Bengal, India.

[2]Department of Computer Science and Engineering, The Neotia University, Sarisha, South 24 Parganas, West Bengal, India.

[3]Department of Computer Science, SNEC, Calcutta University, Kolkata, West Bengal, India.

Abstract

Ensuring data security has become an imperative aspect across various sectors particularly with the sensitivity of the financial sector. Electronic Banking (E-Banking) serves as a fundamental conduit for accessing information about banks and their services through the Internet. The security of financial data is crucial for building and maintaining customer trust. However, emerging threats are gradually increasing to breach the data in the financial sector. The developed methodology fails to fully protect data against increasingly sophisticated cyberattacks with higher efficiency of the performance. To address these challenges, this work proposed an innovative hybrid cryptography approach designed to strengthen digital data protection in the financial sector. The hybrid cryptography technique combined with proposed Modified IDEA (M-IDEA) with a 512-bit key size, and a Double Secure RSA (DS-RSA) methodology to enhance data protection in the financial sector. Additionally, this work introduces a novel method for generating keys in multi-party authentication systems. The work presents the innovative encryption and decryption methodology for encrypting and decrypting authentication keys and data files. The performance of the suggested hybrid cryptography methodology compared with the traditional methodology showcases its potential advancements in data security. The outcome of the proposed key generation technique varies from 0.60656 to 3.83477 seconds of the prime numbers 2 to 10. Furthermore, the encryption process time fluctuates between 0.62702 and 19.69348 seconds with file sizes of 0.12 to 3.68 MB. Moreover, this research work extends the security defense strategy to address vulnerabilities related to sensitive data disclosure breaches and man-in-the-middle attacks on applications within the financial sector. Consequently, these advancements play a crucial role in bolstering the integrity of digital interactions and transactions in the domain of electronic banking.

Index Terms

Key Generation

Encryption

Decryption

M-IDEA

DS-RSA

Man-in-the-Middle Attack

Sensitive Data Disclosure Breaches Attack

Security Strategy Framework

Reference

  1. 1.
    Cayabyab, G.T., Sison, A.M., Medina, R.P.: A secure key scheduling operation for international data encryption algorithm using serpent key schedule operation. In: Proceedings of the 2nd International Conference on Computing and Big Data, pp. 63–67 (2019).
  2. 2.
    Durga, R., Sudhakar, P.: Implementing rsa algorithm for network security using dual prime secure protocol in crypt analysis. International Journal of Advanced Intelligence Paradigms 24(3-4), 355–368 (2023).
  3. 3.
    Ma, Z.: Comparative study of the optimization of the multi-prime rsa algorithm. In: 2021 International Conference on Signal Processing and Machine Learning (CONF-SPML), pp. 158–162 (2021). IEEE.
  4. 4.
    Zhou, J., Zeng, X.: Physical-layer secret key generation based on domain- adversarial training of autoencoder for spatial correlated channels. Applied Intelligence 53(5), 5304–5319 (2023).
  5. 5.
    Iwasokun, G.B., Akinyokun, O.C., Alawode, S.J., Omomule, T.G.: An rsa algorithm for securing financial data on the cloud. Journal of Advances in Mathematics and Computer Science 34(3), 1–11 (2019).
  6. 6.
    Venkatesh, G., Gopal, S.V., Meduri, M., Sindhu, C.: Application of session login and one time password in fund transfer system using rsa algorithm. In: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 732–738 (2017). IEEE.
  7. 7.
    Dawson, J.K., Twum, F., Hayfron-Acquah, J.B., Missah, Y.M., Ayawli, B.B.K.: An enhanced rsa algorithm using gaussian interpolation formula. International Journal of Computer Aided Engineering and Technology 16(4), 534–552 (2022).
  8. 8.
    Abdullah, D., Rahim, R., Utama Siahaan, A.P., Ulva, A.F., Fitri, Z., Malahayati, M., Harun, H.: Super-encryption cryptography with idea and wake algorithm. In: Journal of Physics: Conference Series, vol. 1019, p. 012039 (2018).
  9. 9.
    Aparicio, A., Mart´?nez-Gonz´alez, M.M., Carden˜oso-Payo, V.: App-based detection of vulnerable implementations of otp sms apis in the banking sector. Wireless Networks, 1–14 (2023).
  10. 10.
    Khan, H.U., Sohail, M., Nazir, S., Hussain, T., Shah, B., Ali, F.: Role of authentication factors in fin-tech mobile transaction security. Journal of Big Data 10(1), 138 (2023).
  11. 11.
    Guly´as, O., Kiss, G.: Impact of cyber-attacks on the financial institutions. Procedia Computer Science 219, 84–90 (2023).
  12. 12.
    Tso, R.: Untraceable and anonymous mobile payment scheme based on near field communication. Symmetry 10(12), 685 (2018).
  13. 13.
    Khan, H.U., Malik, M.Z., Nazir, S., Khan, F.: Utilizing bio metric system for enhancing cyber security in banking sector: a systematic analysis. IEEE Access (2023).
  14. 14.
    Al-Alawi, A.I., Al-Bassam, M.S.A.: The significance of cybersecurity system in helping managing risk in banking and financial sector. Journal of Xidian University 14(7), 1523–1536 (2020).
  15. 15.
    Shanthakumari, R., Malliga, S.: Dual-layer security of image steganography based on idea and lsbg algorithm in the cloud environment. S¯adhan¯a 44, 1–12 (2019).
  16. 16.
    Sarna, S., Czerwinski, R.: Small prime divisors attack and countermeasure against the rsa-otp algorithm. Electronics 11(1), 95 (2021).
  17. 17.
    Kanu, C., Nnam, M.U., Ugwu, J.N., Achilike, N., Adama, L., Uwajumogu, N., Obidike, P.: Frauds and forgeries in banking industry in africa: a content analyses of nigeria deposit insurance corporation annual crime report. Security Journal 36(4), 671–692 (2023).
  18. 18.
    Khan, H.U., Sohail, M., Nazir, S., Hussain, T., Shah, B., Ali, F.: Role of authentication factors in fin-tech mobile transaction security. Journal of Big Data 10(1), 138 (2023).
  19. 19.
    Mishra, S.: Exploring the impact of ai-based cyber security financial sector management. Applied Sciences 13(10), 5875 (2023).
  20. 20.
    Shivaramakrishna, D., Nagaratna, M.: A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating aes-otp and rsa with adap- tive key management and time-limited access control. Alexandria Engineering Journal 84, 275–284 (2023).
  21. 21.
    Abid, R., Iwendi, C., Javed, A.R., Rizwan, M., Jalil, Z., Anajemba, J.H., Biamba, C.: An optimised homomorphic crt-rsa algorithm for secure and efficient communication. Personal and Ubiquitous Computing 27, 1405–1418 (2023).
  22. 22.
    Stanikzai, A.Q., Shah, M.A.: Evaluation of cyber security threats in banking systems. In: 2021 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1–4 (2021). IEEE.
  23. 23.
    Ghelani, D., Hua, T.K., Koduru, S.K.R.: Cyber security threats, vulnerabilities, and security solutions models in banking. Authorea Preprints (2022).
  24. 24.
    Kumar, M., et al.: An overview of cyber security in digital banking sector. East Asian Journal of Multidisciplinary Research 2(1), 43–52 (2023).
  25. 25.
    Ganavi, M., Prabhudeva, S., Nayak, S.N.: A secure image encryption and embed- ding approach using mrsa and rc6 with dct transformation. International Journal of Computer Networks and Applications (IJCNA) 9(3), 262–278 (2022).
  26. 26.
    Kanda, G., Ryoo, K.: Vedic multiplier-based international data encryption algorithm crypto-core for efficient hardware multiphase encryption design. Webology 19(1) (2022).
  27. 27.
    Neela, K., Kavitha, V.: An improved rsa technique with efficient data integrity verification for outsourcing database in cloud. Wireless Personal Communications 123(3), 2431–2448 (2022).
  28. 28.
    Kuppuswamy, P., Al, S.Q.Y.A.K., John, R., Haseebuddin, M., Meeran, A.A.S., et al.: A hybrid encryption system for communication and financial transactions using rsa and a novel symmetric key algorithm. Bulletin of Electrical Engineering and Informatics 12(2), 1148–1158 (2023).
  29. 29.
    Maria, R., Anitha, V.: Light weight asymmetric cryptographic algorithm for financial transactions through mobile application. International Journal of Computer Applications 975, 8887.
  30. 30.
    Iyer, S.C., Sedamkar, R., Gupta, S.: A novel idea on multimedia encryption using hybrid crypto approach. Procedia Computer Science 79, 293–298 (2016).
  31. 31.
    Mangalagowri, R., Venkataraman, R.: Hypervisor attack detection using advanced encryption standard (hadaes) algorithm on cloud data. International Journal of Computer Networks and Applications, 9 (5) 555–567 (2022).
  32. 32.
    Hermawan, N., Winarko, E., Ashari, A.: Eight prime numbers of modified rsa algorithm method for more secure single board computer implementation. International Journal on Advanced Science, Engineering and Information Technology 11(6), 2375–2384 (2021).
  33. 33.
    Wardak, O., Sinha, D., Sethi, A.: Encryption and decryption of signed graph matrices through rsa algorithm. Indian Journal of Pure and Applied Mathematics, 1–8 (2023).
  34. 34.
    Karim, R., Rumi, L.S., Ashiqul Islam, M., Kobita, A.A., Tabassum, T., Sagar Hossen, M.: Digital signature authentication for a bank using asymmetric key cryptography algorithm and token based encryption. In: Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020, pp. 853–859 (2021). Springer.
  35. 35.
    Kaur, D., et al.: Efficient encryption mechanism for financial transactions: Avoiding data loss and tackling collisions. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12(11), 1861–1872 (2021).
  36. 36.
    Merkepci, M., Abobala, M., Allouf, A.: The applications of fusion neutrosophic number theory in public key cryptography and the improvement of rsa algorithm. Fusion: Practice and Applications (2023).
  37. 37.
    Alatawi, M.N.: A hybrid cryptography and logixgboost model for intelligent and privacy protection in wireless body sensor networks (wbsns). International Journal of Computer Networks and Applications, 10 (2) 166–179 (2023).
  38. 38.
    Joseph, M., Mohan, G.: Design a hybrid optimization and homomorphic encryption for securing data in a cloud environment. International Journal of Computer Networks and Applications (IJCNA) 9(4), 387–395 (2022).
  39. 39.
    Alatawi, M.N.: A hybrid cryptographic cipher solution for secure communication in smart cities. International Journal of Computer Networks and Applications, 10(5) 776 - 791 (2023).
  40. 40.
    Kbar, G., Mansoor, W.: Modified rsa using triple keys based encryption/decryption. Jordan Journal of Electrical Engineering. All rights reserved-Volume 7(1), 2 (2021).
  41. 41.
    Haldar, B., Mukherjee, P. K. & Saha, H. N , An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector. International Journal of Mathematical, Engineering and Management Sciences, 9(6), 1453-1482, (2024).
SCOPUS
SCImago Journal & Country Rank