IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM



Similar documents
A New Efficient Digital Signature Scheme Algorithm based on Block cipher

A Spatial Coding Technique for Secure Data Transmission

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Recommendation for Applications Using Approved Hash Algorithms

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Providing Data Protection as a Service in Cloud Computing

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

Secured Medical Information Transmission Using Chaos Through Cloud Computing

ELECTRONIC COMMERCE WORKED EXAMPLES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Dept. of Financial Information Security

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

SFWR ENG 4C03 - Computer Networks & Computer Security

An Efficient data storage security algorithm using RSA Algorithm

Securing MANET Using Diffie Hellman Digital Signature Scheme

A Factoring and Discrete Logarithm based Cryptosystem

CRYPTOGRAPHY IN NETWORK SECURITY

ECE Lecture 1. Security Services. Need for information security. widespread use of data processing equipment: computer security

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Security in Electronic Payment Systems

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

A Novel Cryptographic Key Generation Method Using Image Features

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

What is a SSL VPN and How Does it Work?

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Secure File Transfer Using USB

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Information Security and Cryptography

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Software Tool for Implementing RSA Algorithm

Overview Keys. Overview

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

How To Ensure Correctness Of Data In The Cloud

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Software Engineering 4C03: Web Encryption Software And It s Purpose

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

An Internet Based Anonymous Electronic Cash System

Strengthen RFID Tags Security Using New Data Structure

Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio

Security for Computer Networks

TELECOMMUNICATION NETWORKS

Framework of e-commerce

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Why Cryptosystems Fail. By Ahmed HajYasien

Associate Prof. Dr. Victor Onomza Waziri

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Evaluating The Performance of Symmetric Encryption Algorithms

Lecture 9: Application of Cryptography

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Cornerstones of Security

A comprehensive survey on various ETC techniques for secure Data transmission

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Table of Contents. Bibliografische Informationen digitalisiert durch

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

Notes on Network Security Prof. Hemant K. Soni

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Data Security in Cloud Using Elliptic Curve Crytography

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

The Mathematics of the RSA Public-Key Cryptosystem

Taxonomy of Security Protocol

SECURITY IN LOW RESOURCE ENVIRONMENTS

Understanding Digital Signature And Public Key Infrastructure

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

A New Generic Digital Signature Algorithm

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Enhance data security of private cloud using encryption scheme with RBAC

E-Democracy and e-voting

Hill s Cipher: Linear Algebra in Cryptography

Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle

Journal of Electronic Banking Systems

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

National Security Agency Perspective on Key Management

One Time Password Generation for Multifactor Authentication using Graphical Password

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Transcription:

IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM Mohammed Abdullah Mohammed Aysan* Abstract: Electronic Fund Transfer involves electronic transfer of money by financial institutions. EFT is the groundwork of the cash-less and check-less culture where and paper bills, checks, envelopes, stamps are eliminated. EFT is used for transferring money from one bank account directly to another without any paper money changing hands. The most popular application of EFT is that instead of getting a paycheck and putting it into a bank account, the money is deposited to an account electronically.cryptography has been used for years to secure electronic funds transfers. However, in theelectronic data interchange environment, cryptographic controls are still in their infancy. In this paper, we examine the function and operation flow of the electronic funds transfer process as well as its security control mechanism. To evaluate telecommunication and data security techniques, a standard-leading inter-bank payment system called the Society for Worldwide Inter-bank Financial Telecommunications System is introduced. Key words: Electronic Fund Transfer, EFT, Symmetric key, Bank, E-cash, Logarithm etc. *Student, Computer Engineering & Networks Department, College of Computer Sciences and Information System, Jazan University, KSA Vol. 3 No. 4 April 2014 www.garph.co.uk IJARIE 10

INTRODUCTION Every day billions of dollars are transferred electronically between institutions and individuals in Electronic Funds Transfer (EFT) systems. EFT systems transactions cannot be processed securely unless user identities can be validated and the correct transmission of messagesbetween system nodes can be assured [1]. Information security is considered one of the most critical concerns in today s competitive digital economy. Web technologies provide an amazing infrastructure for electronic data interchange (EDI), direct marketing, and information retrieval [5]. In particular, electronic banking and financial services have immense growth potential via the Internet. Some of the most important security issues involve electronic money and digital cash. As more and more companies jump onto the information superhighway with interactive web sites, information security becomes an important issue in digital economy [2]. Cryptography is the science of protecting the privacy of information during communication under hostile conditions. In the present era of information technology and proliferating computer network communications, cryptography assumes special importance. Cryptography is now routinely used to protect data, which must be communicated and/or saved over long periods, to protect electronic fund transfers and classified communications [3]. Current cryptographic techniques are based on number theoretic or algebraic concepts. Chaos is another paradigm, which seems promising. Chaos is an offshoot from the field of nonlinear dynamics and has been widely studied. A large number of applications in real systems, both man-made and natural, are being investigated using this novel approach of nonlinear dynamics. The chaotic behavior is a subtle behavior of a nonlinear system, which apparently looks random. However, this randomness has no stochastic origin. It is purely resulting from the defining deterministic processes. characteristics of chaos are its extreme sensitivity to initial conditions of the system. LITERATURE REVIEW The important C.H.Meyer, S.M.Mat.yas (1981)discussed the personal verification processes at different institutions in an interchange environment are isolated from one another. It is assumed that only information stored on the bank card and information remembered by a sys tern user are employed for personal verification. It is shown that only through the use of a secret Vol. 3 No. 4 April 2014 www.garph.co.uk IJARIE 11

quantity stored on the bank card will the set of required criteria be satisfied. With a personal key, the same degree of isolation can be achieved for authentication of transaction request messages sent from the entry point to the issues [1]. Dan Zhu (2002) analyzed about modern financial institutions have cashed in on the electronic business opportunities of the Internet by developing numerous payment systems to meet various payment service requirements. In this paper, we examine the function and operation flow of the electronic funds transfer process as well as its security control mechanism. To evaluate telecommunication and data security techniques, a standardleading inter-bank payment system called the Society for Worldwide Inter-bank Financial Telecommunications System is introduced. investigated in detail [2]. Some important security features are Mintu Philip,Asha Das(2011) Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based encryption methods have been presented and discussed in the last two decades. In order to reach higher performance, these methods take advantage of the more and more complex behavior of chaotic signals[4]. Mohammed AbudallahMdAysan, Fareed Hassan Almalki, Abdullah Mohammed Almalki (2014) This paper proposes a symmetric key cryptosystem based on the simple mathematical logarithm function. The proposed system benefits from the algebraic properties of log x such as non-commutative, high computational speed and high flexibility in selecting keys which make the Discrete Logarithm Problem. Also the encrypted text converted into binary numbers to make harder to understand by the backer. This method will be suitable in any business house, government sectors, communication network, defense network system, sensor networks etc [6]. PROPOSED ARCHITECTURE Electronic Fund Transfer essential for the Middle East country, in particularly Saudi. More than 7.5 million expatriate working in Saudi Arabia. Our proposed modelenables transactions between customers with the help of banks or other third partiescentre. ThisElectronic Fund Transfer system is secure and convenient alternative to bills and bank transaction. Electronic Fund Transfer is transferred immediately from one place to another Vol. 3 No. 4 April 2014 www.garph.co.uk IJARIE 12

within fraction of secondthe recipient can collect the money immediately. Therefore, Electronic Fund Transfer transactions usually require no remote authorization or personal identification number (PIN) codes at the point of sale. Mr. A X-Bank Processing Secret Key WWw Mr. B Y-Bank Verification Figure 1: EFT system model How a typical e-cash system works: A Banker or vendor signs up with one of the participating banks or financial institutions. The vendor receives specific software to install on his or her computer. Then the transaction procedure describedin Figure.1 model transaction between two parties Mr. A and Mr.B. The first person wants to transfer the money to other person, though he approaches X-Bank or local vendor, the vendor or Banker processing Mr.A request and providing secret or symmetric key. Also X-Bank transfer Cipher text through web application to Y-Bank. At the same time Mr.A sending secret key to Mr.B through secured channel. Then Mr.B approach to the Y-Bank to pay the money, Y-Bank verifies the message with secret key and transfer money to Mr. B. IMPLEMENTATION Electronic funds transfer is one of the oldest electronic payment systems. EFT is the groundwork of the cash-less and check-less culture where and paper bills, checks, envelopes, stamps are eliminated. EFT is used for transferring money from one bank account directly to another without any paper money changing hands.eft is considered to be a safe, reliable, and convenient way to conduct business and transfer the money. The implementation program allows the vendor or banker to install electronic fund transfer to his or her desktop. The software manages the secret key. The vendor software generates a cash transaction with our new proposed algorithm and secret key provided to the sender. The sender transfers the secret key to the recipient for appeal the cash in his Vol. 3 No. 4 April 2014 www.garph.co.uk IJARIE 13

destination place. Recipient banker verifies the secret message with key and delivers the cash to the recipient. Sender Bank Process Here,we have taken some example of transferring money 5432 Saudi Riyal. As per the integer value 5 is 32, 4 is 31 and so on (A-Z=1 to 26,0-9 is 27 to 36). Then we choose random Logarithm as a secret key and converting value to binary digits is cipher text message transfer to the recipient and secret key given to the sender. The entire sender bank process mentioned in the following table. Saudi Riyal Integer Value Table 1.Moneysending process Log 3 (X) Cipher text (binary value) 5 32 3.154649 11.00100111100101110001001110101101 4 31 3.12575 11.00100000001100010010011011101001 3 30 3.095903 11.00011000100011010001100101011000 2 29 3.065045 11.00010000101001101100101000000011 Recipient Bank Process When the recipient claims his money with the secret key, we verify the binary digits and convert into integer value with secret key. The process of recipient claim mentioned in the table no.2. Table 2. Payment verification process Cipher text (binary value) Y=(X) 3 Integer value Saudi Riyal 11.00100111100101110001001110101101 3.154649 32 5 11.00100000001100010010011011101001 3.12575 31 4 11.00011000100011010001100101011000 3.095903 30 3 11.00010000101001101100101000000011 3.065045 29 2 CONCLUSION Our New algorithm using symmetric key based on the simple logarithm function. The logarithm and mathematical power function has good relationship of inverse each Vol. 3 No. 4 April 2014 www.garph.co.uk IJARIE 14

other.this Electronic Fund Transfer system easy to access, send for the short communication very quickly. Another advantage for the proposed structure is converting binary digits. This will make confusion and diffusion to the invader. Another innovative idea for our new algorithm, we are extending characters up to 37 letters. A-Z consider as 1 to 26 and 0-9 as 27 to 36.Most of the algorithm working based on the 26 alphabets, especially hill cipher or linear block cipher working based on the 26 alphabets only. In this chapter we are extending the text value up to 36. There is few highlight point about our experimental setup, we are converting logarithm value as a binary digits send to the recipient destination. Our proposed methods capture the new idea of general usage in commercial sector and all small scale shop. ACKNOWLEDGEMENT We are very grateful to Department of Computer Engineering and Networks, Jazan University to give us opportunity to work on Cryptography. Next, We would like to express my special gratitude to honorable Dean Dr. Mohammad Y Aalsalem as well as my supervisor PrakashKuppuswamy and who gave me the opportunity to do this wonderful research article on the topic of my favorite subject Cryptography techniques, which also helped me in doing a lot of Research and I came to know about so many new things. REFERENCES 1) C.H.Meyer, S.M.Mat.yas,R.E.Lennon, Required Cryptographic Authentication criteria for Electronic Funds Transfer System, CH1629-5/81/089, IEEE, in 1981. 2) Dan Zhu, Security control in Inter-Bank Fund Transfer, Journal of Electronic Commerce Research, VOL. 3, NO. 1, 2002. 3) Q.V. Lawande, B. R. Ivan, S. D. Dhodapkar, Chaos Based Cryptography: A New Approach to secure Communications,Asian aerosol conference (AAC) No. 258,July 2005. 4) Mintu Philip,Asha Das, Survey: Image Encryption using Chaotic Cryptography Schemes, IJCA Special Issue on Computational Science - New Dimensions & Perspectives NCCSE, 2011. 5) Palmer, J. W. and Griffith, D. A. An Emerging Model of Web Site Design for Marketing, Communication of the ACM, Vol. 41, No.3, pp. 45-51, 1998. Vol. 3 No. 4 April 2014 www.garph.co.uk IJARIE 15

6) Mohammed AbdallahMdAysan, Fareed Hassan Almalki, Abdullah Mohammed Almalki, New Symmetric key cryptography algorithm using simple logarithm and binary digits, International Journal of Multidisciplinary Research Academy, Vol.4 issue 6, (in printing) Accepted in March 2014. 7) Johnson, J. Z. Network Security Programs: Process and Metrics for the Real-World, White paper, Internet SecuritySystems, Inc, 1998. 8) Kalakota R., A. Whinston, Frontiers of Electronic Commerce, Addision Wesley, MA, 1996. 9) Ki HyoungKo, Sang Jin Lee, Jung HeeCheon, Jae Woo Han, Ju-sung Kang, and Choonsik Park, New Public-KeyCryptosystem Using Braid Groups, Advances in cryptology, 20th annual International CryptologyConference, Santa Barbara, California, USA, August 20-24, 2000. Vol. 3 No. 4 April 2014 www.garph.co.uk IJARIE 16