SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. IV (Jan. - Feb .2016), PP 01-04
www.iosrjournals.org
DOI: 10.9790/2834-11140104 www.iosrjournals.org 1 | Page
Technical Review On Secure Banking Using RSAAnd AES
Encryptor Methodologies
Abhilesh S. Jadhao1
, Shital B. Kumbhalkar2
1
Dept. of Electronics and Communication Engineering, Ballarpur Institute of Technology, Bamni, Ballarpur
(M.S.), India
2
Dept. of Electronics and Communication Engineering, Assistant Professor, Ballarpur Institute of Technology,
Bamni, Ballarpur (M.S.), India
Abstract : One of the key challenges faced by the information communication network while sharing resources
is its security. Due to the increased online transactions, issue of data security became vital. This paper presents
a technical review on secure banking using RSA and AES encryption methodologies. We will discuss the data
communication security methods used between Auto teller machine and bank server during its financial
operations. Since multiple security attacks can be attempted during the transaction to gather the precious
information and gain unauthorized access, various data security levels and encryption standards are used for
secure banking transactions. This paper focuses on Rivest-Shamir-Adleman (RSA) and Advanced Encryption
Standard (AES), encryption standards used by the banks for secure data transactions.
Keywords: Auto Teller Machine, Authentication, Cryptography, Security, One Time Password.
I. Introduction
In the world of globalization, the demand for innovative products, and new technological
advancements, banking industry is no exception as far as competition is concerned. Auto Teller Machine is one
of the prime innovations for the banking industry which provides the facility for banking operations outside the
banking premises. One of the main functions of the ATM is withdrawal of money. Currently, security which has
been provided to the user for secure ATM transactions works on the principle of single Pin security. A three
way security is provided by the banks to protect ATMs. These are:
 Physical security
 Software security
 Communication Security
Physical security includes protection of physical aspects of the ATM machine like lock mechanism of
ATM Entrance door, CCTV surveillance, etc. Software Security includes protection to the operating system on
which ATM runs. Communication security follows the security to the online transactions pertaining to the
ATM. Multiple security attacks can be attempted during the ATM transactions to gain unauthorized access to
the precious information and use the same information against clients. In order to prevent such cybercrimes,
various data security levels and encryption standards are used for secure transactions.
We will discuss the data communication security methods used between Auto teller machine and bank
server during its financial operations. This paper focuses on Rivest-Shamir-Adleman (RSA) and Advanced
Encryption Standard (AES), encryption standards used by the banks for secure data transactions.
II. Literature Review
Sistu Sudheer Kumar, A. Srinivas Reddy (May-2015) [1] Authentication is a critical part of any
trustworthy computing system which ensures that only authorized individuals can log on to the system. Here,
ATM Security has always been one of the most prominent issues. ATM machines generally authenticates by
using ATM card and PIN number to perform transactions. This paper discusses design of ATM system that will
improve the authentication of customer while using ATM. Here is possible scenario that an individual’s ATM
card falling into wrong hands by knowing PIN number and forget ATM card is difficult to perform ATM
transaction. So to clear all these problems we are implementing this system using “One Time Password (OTP)”
and “Personal Identification Number (PIN)” combination in order to improve authentication of customer using
ATM machine to perform transaction without having any ATM cards.
Ezeofor C. J, Ulasi A. G. (December 2014) [2], this paper presents an analysis of network data
encryption and decryption techniques used in communication systems. In network communication systems,
exchange of information mostly occurs on networked computers, mobile phones and other internet based
electronic gadgets. Unsecured data that travels through different networks are open to many types of attack and
can be read, altered or forged by anyone who has access to that data. To prevent such an attack, data encryption
and decryption technique is employed. In order to visualize the effect and evaluate the performance of the
Technical Review on Secure Banking using RSA and AES EncryptorMethodologies
DOI: 10.9790/2834-11140104 www.iosrjournals.org 2 | Page
encryption and decryption of each technique used in communication systems, Visual Basic simulation program
that encrypt and decrypt data were developed, written and tested. Different data block sizes were captured and
plotted against total time response taken during data encryption using Microsoft Excel. The graph result shows
the superiority of RSA and AES algorithms over other algorithms in terms of the processing speed and time.
DES has worm holes in its security mechanism whereas Blowfish, AES, and RSA do not have any. Further
analysis was made based on the graph result obtained on each data encryption techniques.
Siva Kumar T, Gajjala Askok (August 2013) [3], the idea of designing and implementation of Security
Based ATM theft project is born with the observation in our real life incidents happening around us. This project
deals with prevention of ATM theft from robbery. So to overcome this drawback found in existing technology,
this project can be implemented. Here, vibration sensor is used which senses the vibrations produced by the
ATM machine. This system uses ARM controller based embedded system to process real time data collected
using the vibration sensor. Once the vibrations are sensed, various parameters start responding like the buzzer
starts sending signals in the form of beep, DC Motor starts closing the door of ATM and Stepper motor leaks the
gas inside the ATM to bring the thief to unconscious stage. Camera is always in processing and sending video
signals continuously to the observatory and will be saved in computer. Real Time Clock is used to capture the
robbery occur time and send the robbery occur time with the message to the nearby police station and
corresponding bank through the GSM. Here LCD display board is used for showing the output of the message
continuously. This will prevent the robbery and the person involving in the act can be easily caught. Keil tools
are used to implement the idea and obtaining the results. keil tools are also used for run the DC motor and
stepper motor for automatic door lock and leak the gas inside the ATM respectively.
Nentawe Y. Goshwe (July 2013) [4], one of the principal challenges of resource sharing on data
communication network is its security. This is premised on the fact that once there is connectivity between
computers sharing some resources, the issue of data security becomes critical. This paper presents a design of
data encryption and decryption in a network environment using RSA algorithm with a specific message block
size. The algorithmallows a message sender to generate a public keys to encrypt the message and the receiver is
sent with a generated private key using a secured database. An incorrect private key will still decrypt the
encrypted message but to a formdifferent from the original message.
Sneha K. Patel, Dr. D. C. Joshi (June 2013) [5], the present era of information and technology is
quickly revolutionizing the way of transactions. Human involvement in handling and authenticating day to day
activities is being increasingly replaced by electronic gadgets/systems. This growth in electronic transactions
results in a rise of demand for fast and accurate user identification and authentication system. A ccess codes for
buildings, banks accounts and computer systems often use PINs for identification and security clearances. When
credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.
Total security system may solve this problem since a face; speech; fingerprint; palm print etc. are undeniably
connected to its owner. This system can compare scans to the records stored in a central or local database or
even on a smart card. The main aim of this paper is to construct mathematical model based on cryptography for
total security systemusing qualitative and quantitative data of human.
Shun Wong (April 2005) [6] ATM also known as Automatic Teller Machine is simple and yet secure
banking service. The basic concept is that an ATM allows an authorized cardholder to conduct banking
transaction without visiting a branch. They are well known for its convenience to the customers, cost -
effectiveness to the bank and most importantly it is one of the secure banking methods. ATMs rely on
authorization of a transaction by the bank via a secure communications network. Encryption methods are built
into the communication network to prevent unauthorized transactions that could result in loses. This paper
focuses on Data Encryption Standard and Advanced Encryption Standard, these are the encryption standards
presently adopted by the banks across the globe.
III. Generalized Concept
RSA Algorithm
RSA is an internet encryption and authentication system that uses an algorithm developed in 1977 by
Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used encryption and
authentication algorithm and is included as part of the web browsers from Microsoft and Netscape. The
encryption system is owned by RSA security. The technologies are part of existing or proposed Web, Internet
and computing standards. The Rivest-Shamir-Adleman (RSA) algorithm is one of the most popular and secure
public key encryption methods. RSA RC4 is a Highly Secure, High Speed Algorithm The RC4 algorithm,
developed by RSA Data Security Inc., has rapidly become the de-facto international standard for high -speed
data encryption. Despite ongoing attempts by cryptographic researchers to "crack" the RC4 algorithm, the only
feasible method of breaking its encryption known today remains brute-force, systematic guessing, which is
generally infeasible. RC4 is a stream cipher that operates at several times the speed of DES, making it possible
to encrypt even large bulk data transfers with minimal performance consequences. RC4_56 and RC4_128 RC4
Technical Review on Secure Banking using RSA and AES EncryptorMethodologies
DOI: 10.9790/2834-11140104 www.iosrjournals.org 3 | Page
is a variable key-length stream cipher. The Oracle Advanced Security option release 8.1.5 for domestic use
offers an implementation of RC4 with 56 bit and 128 bit key lengths [7]. This provides strong encryption with
no sacrifice in performance when compared to other key lengths of the same algorithm. The algorithm
capitalizes on the fact that there is no efficient way to factor very large (100-200 digit) numbers.
AES Algorithm
The National Institute of Standards and Technology (NIST) have created AES, which is a new Federal
Information Processing Standard (FIPS) publication that describes an encryption method. AES is a privacy
transform for IPSec and Internet Key Exchange (IKE) and has been developed to replace the Data Encryption
Standard (DES). AES is designed to be more secure than DES: AES offers a larger key size, while ensuring that
the only known approach to decrypt a message is for an intruder to try every possible key. AES has a variable
key length —the algorithm can specify a 128-bit key (the default), a 192-bit key, or a 256-bit key. AES able to
process sixtimes faster compared with the triple DES for the same processing capacity.
ATM (Automated Teller Machine)
The first ATM in Korea was installed by Korea exchange Bank in 1975, and once installation of ATM
by Shinhan Bank in 1982, the civilian will use the ATM of varied banks with beginning of operation of common
CD network that is controlled by Korea Financial Telecommunications & clearings institute. The quantity of put
in ATM machine has shown the trend of skyrocketing unceasingly with the high increasing quantitative relation
within the half of year 2000s, and gradual increase once the year. Particularly external ATM machine has been
accrued unceasingly.
An Automated Teller Machine (ATM) is used to electronically withdraw money from and deposit it to
your bank account [9]. ATM communicates with central host processor by Internet Service Provider has a
gateway where all ATM networks available to user. Here ATM machines connected to central host processor
are by telephone lines or normal phone line using modem. When customer wants to perform transaction provide
PIN details and ATM card. ATM machine forwards to central host processor, where ATM request to customer’s
bank. If customer request cash, central host processor initiates electronic funds transfer from customer bank to
ATM central host processor account. Once transfer complete to central host processor, it sends approval code to
ATM machine to dispense cash.
IV. ProposedMethodology
Authentication of ATM during transaction is unsecure because with help of clone of original cards by
replicas of ATM machine card slots with built-in magnetic strip readers. The reader capture data embedded in
the magnetic strip and store it. By placing small wireless surveillance cameras in ATM center to track the PIN to
cash withdrawal. To come up with stolen card and tracked PIN for cash withdrawal. To overcome this, I am
proposing ATM transaction using combination of One Time Password and PIN to authenticate the ATM during
transactions.
Fig.1. Basic block diagramof proposed system
Technical Review on Secure Banking using RSA and AES EncryptorMethodologies
DOI: 10.9790/2834-11140104 www.iosrjournals.org 4 | Page
Above figure consists of three nodes, one node is master which is connected to the personal computer
and other two nodes are the slave nodes connected with wireless module which is ZigBee & RFID.
V. Conclusion
The last few decades has witnessed various kinds of card and currency fraud. The security procedures
followed by the banks are archaic, thus making it less secure and leaves scope for possible attacks and frauds.
Implementation of varied kinds of encryption strategies like RSA and AES cryptography methodologies will not
only make the transactions secure but also increase the trust among the employees, clients and partners for the
banks and online transactions.
References
[1] Sistu Sudheer Kumar, A. Srinivas Reddy , May-2015, “ A survey on theft prevention during ATM transaction without ATM cards”,
eISSN: 2319-1163 | pISSN: 2321-7308 Volume: 04 Special Issue: 06 | NCEITCS-2015 | May-2015.
[2] Ezeofor C. J, Ulasi A. G., December 2014, “Analysis of Network Data Encryption & Decryption Techniques in Communication
Systems ” International Journal of Innovative Research in Science Engineering and Technology (An ISO 3297: 2007 Certified
Organization) Vol. 3, Issue 12, December 2014 ISSN: 2319-8753.
[3] Sivakumar T, Gajjala Askok, k. Sai Venuprathap, August 2013, “ Design and Implementation of Security Based ATM theft
Monitoring system”, International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 1
(August 2013) PP: 01-07.
[4] Nentawe Y. Goshwe , July 2013, “ Data Encryption and Decryption Using RSA Algorithm in a Network Environment” IJCSNS
International Journal of Computer Science and Network Security, VOL.13 No.7, July 2013.
[5] Sneha K. Patel, Dr. D. C. Joshi, June 2013, “Mathematical Model Based Total Security System with Qualitative and Quantitative
Data of Human”, Int Jr. of Mathematics Sciences & Applications Vol.3, No.1, January-June 2013 Copyright Mind Reader
Publications ISSN No: 2230-9888.
[6] Shun Wong, April 2005, “The Encryption Technology of Automatic Teller Machine Networks”, Software Engineering4C03 Winter
2005.
[7] Oracle Advanced Security Administrator's Guide Release 8.1.5 A67766-01
[8] RSA SecurID Authentication, A Better Value for a Better ROI.
[9] Http://www.ehow.com/how-does_4900119_how-atms-work.html.
[10] AES Encryption, AES Encryption and Related Concepts.

More Related Content

What's hot

IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...ijctcm
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceIRJET Journal
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 

What's hot (18)

IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
120 i143
120 i143120 i143
120 i143
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
13_2
13_213_2
13_2
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
E0962833
E0962833E0962833
E0962833
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 

Viewers also liked

Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.
Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.
Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.Younis I Munshi
 
Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...
Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...
Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...IOSR Journals
 
Global Outsourcing: Recent Issues & Challenges in the Pharmaceutical Industry
Global Outsourcing: Recent Issues & Challenges in the Pharmaceutical IndustryGlobal Outsourcing: Recent Issues & Challenges in the Pharmaceutical Industry
Global Outsourcing: Recent Issues & Challenges in the Pharmaceutical IndustryWei Garofolo
 
Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...IOSR Journals
 
Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...
Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...
Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...IOSR Journals
 
Database Technology- ITM
Database Technology- ITMDatabase Technology- ITM
Database Technology- ITMNilofar Nilue
 
Drug discovery challenges and different discovery approaches
Drug discovery challenges and different discovery approachesDrug discovery challenges and different discovery approaches
Drug discovery challenges and different discovery approachesHitesh Soni
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSSupriya Radhakrishna
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapVikas Jagtap
 

Viewers also liked (20)

Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.
Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.
Evaluation of the anxiolytic effect of nepeta persica boiss. in mice.
 
Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...
Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...
Study of Sedation, Pre-anesthetic and Anti-anxiety Effects of Salix Aegyptiac...
 
J011137479
J011137479J011137479
J011137479
 
Global Outsourcing: Recent Issues & Challenges in the Pharmaceutical Industry
Global Outsourcing: Recent Issues & Challenges in the Pharmaceutical IndustryGlobal Outsourcing: Recent Issues & Challenges in the Pharmaceutical Industry
Global Outsourcing: Recent Issues & Challenges in the Pharmaceutical Industry
 
Herbal regulation
Herbal regulationHerbal regulation
Herbal regulation
 
G011134454
G011134454G011134454
G011134454
 
Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...
 
Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...
Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...
Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Propertie...
 
Database Technology- ITM
Database Technology- ITMDatabase Technology- ITM
Database Technology- ITM
 
Ms sql-server
Ms sql-serverMs sql-server
Ms sql-server
 
Drug discovery challenges and different discovery approaches
Drug discovery challenges and different discovery approachesDrug discovery challenges and different discovery approaches
Drug discovery challenges and different discovery approaches
 
Ch14
Ch14Ch14
Ch14
 
Clinical trial
Clinical trialClinical trial
Clinical trial
 
Adbms
AdbmsAdbms
Adbms
 
Liquisolid technology
Liquisolid technologyLiquisolid technology
Liquisolid technology
 
Sqlii
SqliiSqlii
Sqlii
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
 
Regulatory Control of Clinical Trials
Regulatory Control of Clinical TrialsRegulatory Control of Clinical Trials
Regulatory Control of Clinical Trials
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
 
Advanced DBMS presentation
Advanced DBMS presentationAdvanced DBMS presentation
Advanced DBMS presentation
 

Similar to Secure Banking Using RSA and AES Encryption

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesUvaraj Shan
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIESSURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIESvivatechijri
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
A survey on security measures implemented to detect burglary at the atm
A survey on security measures implemented to detect burglary at the atmA survey on security measures implemented to detect burglary at the atm
A survey on security measures implemented to detect burglary at the atmeSAT Journals
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 

Similar to Secure Banking Using RSA and AES Encryption (20)

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
D0351022026
D0351022026D0351022026
D0351022026
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIESSURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
A survey on security measures implemented to detect burglary at the atm
A survey on security measures implemented to detect burglary at the atmA survey on security measures implemented to detect burglary at the atm
A survey on security measures implemented to detect burglary at the atm
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Enforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentEnforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-Payment
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 

More from IOSR Journals (20)

M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
I011136673
I011136673I011136673
I011136673
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 
B011120510
B011120510B011120510
B011120510
 
A011120104
A011120104A011120104
A011120104
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Secure Banking Using RSA and AES Encryption

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. IV (Jan. - Feb .2016), PP 01-04 www.iosrjournals.org DOI: 10.9790/2834-11140104 www.iosrjournals.org 1 | Page Technical Review On Secure Banking Using RSAAnd AES Encryptor Methodologies Abhilesh S. Jadhao1 , Shital B. Kumbhalkar2 1 Dept. of Electronics and Communication Engineering, Ballarpur Institute of Technology, Bamni, Ballarpur (M.S.), India 2 Dept. of Electronics and Communication Engineering, Assistant Professor, Ballarpur Institute of Technology, Bamni, Ballarpur (M.S.), India Abstract : One of the key challenges faced by the information communication network while sharing resources is its security. Due to the increased online transactions, issue of data security became vital. This paper presents a technical review on secure banking using RSA and AES encryption methodologies. We will discuss the data communication security methods used between Auto teller machine and bank server during its financial operations. Since multiple security attacks can be attempted during the transaction to gather the precious information and gain unauthorized access, various data security levels and encryption standards are used for secure banking transactions. This paper focuses on Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES), encryption standards used by the banks for secure data transactions. Keywords: Auto Teller Machine, Authentication, Cryptography, Security, One Time Password. I. Introduction In the world of globalization, the demand for innovative products, and new technological advancements, banking industry is no exception as far as competition is concerned. Auto Teller Machine is one of the prime innovations for the banking industry which provides the facility for banking operations outside the banking premises. One of the main functions of the ATM is withdrawal of money. Currently, security which has been provided to the user for secure ATM transactions works on the principle of single Pin security. A three way security is provided by the banks to protect ATMs. These are:  Physical security  Software security  Communication Security Physical security includes protection of physical aspects of the ATM machine like lock mechanism of ATM Entrance door, CCTV surveillance, etc. Software Security includes protection to the operating system on which ATM runs. Communication security follows the security to the online transactions pertaining to the ATM. Multiple security attacks can be attempted during the ATM transactions to gain unauthorized access to the precious information and use the same information against clients. In order to prevent such cybercrimes, various data security levels and encryption standards are used for secure transactions. We will discuss the data communication security methods used between Auto teller machine and bank server during its financial operations. This paper focuses on Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES), encryption standards used by the banks for secure data transactions. II. Literature Review Sistu Sudheer Kumar, A. Srinivas Reddy (May-2015) [1] Authentication is a critical part of any trustworthy computing system which ensures that only authorized individuals can log on to the system. Here, ATM Security has always been one of the most prominent issues. ATM machines generally authenticates by using ATM card and PIN number to perform transactions. This paper discusses design of ATM system that will improve the authentication of customer while using ATM. Here is possible scenario that an individual’s ATM card falling into wrong hands by knowing PIN number and forget ATM card is difficult to perform ATM transaction. So to clear all these problems we are implementing this system using “One Time Password (OTP)” and “Personal Identification Number (PIN)” combination in order to improve authentication of customer using ATM machine to perform transaction without having any ATM cards. Ezeofor C. J, Ulasi A. G. (December 2014) [2], this paper presents an analysis of network data encryption and decryption techniques used in communication systems. In network communication systems, exchange of information mostly occurs on networked computers, mobile phones and other internet based electronic gadgets. Unsecured data that travels through different networks are open to many types of attack and can be read, altered or forged by anyone who has access to that data. To prevent such an attack, data encryption and decryption technique is employed. In order to visualize the effect and evaluate the performance of the
  • 2. Technical Review on Secure Banking using RSA and AES EncryptorMethodologies DOI: 10.9790/2834-11140104 www.iosrjournals.org 2 | Page encryption and decryption of each technique used in communication systems, Visual Basic simulation program that encrypt and decrypt data were developed, written and tested. Different data block sizes were captured and plotted against total time response taken during data encryption using Microsoft Excel. The graph result shows the superiority of RSA and AES algorithms over other algorithms in terms of the processing speed and time. DES has worm holes in its security mechanism whereas Blowfish, AES, and RSA do not have any. Further analysis was made based on the graph result obtained on each data encryption techniques. Siva Kumar T, Gajjala Askok (August 2013) [3], the idea of designing and implementation of Security Based ATM theft project is born with the observation in our real life incidents happening around us. This project deals with prevention of ATM theft from robbery. So to overcome this drawback found in existing technology, this project can be implemented. Here, vibration sensor is used which senses the vibrations produced by the ATM machine. This system uses ARM controller based embedded system to process real time data collected using the vibration sensor. Once the vibrations are sensed, various parameters start responding like the buzzer starts sending signals in the form of beep, DC Motor starts closing the door of ATM and Stepper motor leaks the gas inside the ATM to bring the thief to unconscious stage. Camera is always in processing and sending video signals continuously to the observatory and will be saved in computer. Real Time Clock is used to capture the robbery occur time and send the robbery occur time with the message to the nearby police station and corresponding bank through the GSM. Here LCD display board is used for showing the output of the message continuously. This will prevent the robbery and the person involving in the act can be easily caught. Keil tools are used to implement the idea and obtaining the results. keil tools are also used for run the DC motor and stepper motor for automatic door lock and leak the gas inside the ATM respectively. Nentawe Y. Goshwe (July 2013) [4], one of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption and decryption in a network environment using RSA algorithm with a specific message block size. The algorithmallows a message sender to generate a public keys to encrypt the message and the receiver is sent with a generated private key using a secured database. An incorrect private key will still decrypt the encrypted message but to a formdifferent from the original message. Sneha K. Patel, Dr. D. C. Joshi (June 2013) [5], the present era of information and technology is quickly revolutionizing the way of transactions. Human involvement in handling and authenticating day to day activities is being increasingly replaced by electronic gadgets/systems. This growth in electronic transactions results in a rise of demand for fast and accurate user identification and authentication system. A ccess codes for buildings, banks accounts and computer systems often use PINs for identification and security clearances. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Total security system may solve this problem since a face; speech; fingerprint; palm print etc. are undeniably connected to its owner. This system can compare scans to the records stored in a central or local database or even on a smart card. The main aim of this paper is to construct mathematical model based on cryptography for total security systemusing qualitative and quantitative data of human. Shun Wong (April 2005) [6] ATM also known as Automatic Teller Machine is simple and yet secure banking service. The basic concept is that an ATM allows an authorized cardholder to conduct banking transaction without visiting a branch. They are well known for its convenience to the customers, cost - effectiveness to the bank and most importantly it is one of the secure banking methods. ATMs rely on authorization of a transaction by the bank via a secure communications network. Encryption methods are built into the communication network to prevent unauthorized transactions that could result in loses. This paper focuses on Data Encryption Standard and Advanced Encryption Standard, these are the encryption standards presently adopted by the banks across the globe. III. Generalized Concept RSA Algorithm RSA is an internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used encryption and authentication algorithm and is included as part of the web browsers from Microsoft and Netscape. The encryption system is owned by RSA security. The technologies are part of existing or proposed Web, Internet and computing standards. The Rivest-Shamir-Adleman (RSA) algorithm is one of the most popular and secure public key encryption methods. RSA RC4 is a Highly Secure, High Speed Algorithm The RC4 algorithm, developed by RSA Data Security Inc., has rapidly become the de-facto international standard for high -speed data encryption. Despite ongoing attempts by cryptographic researchers to "crack" the RC4 algorithm, the only feasible method of breaking its encryption known today remains brute-force, systematic guessing, which is generally infeasible. RC4 is a stream cipher that operates at several times the speed of DES, making it possible to encrypt even large bulk data transfers with minimal performance consequences. RC4_56 and RC4_128 RC4
  • 3. Technical Review on Secure Banking using RSA and AES EncryptorMethodologies DOI: 10.9790/2834-11140104 www.iosrjournals.org 3 | Page is a variable key-length stream cipher. The Oracle Advanced Security option release 8.1.5 for domestic use offers an implementation of RC4 with 56 bit and 128 bit key lengths [7]. This provides strong encryption with no sacrifice in performance when compared to other key lengths of the same algorithm. The algorithm capitalizes on the fact that there is no efficient way to factor very large (100-200 digit) numbers. AES Algorithm The National Institute of Standards and Technology (NIST) have created AES, which is a new Federal Information Processing Standard (FIPS) publication that describes an encryption method. AES is a privacy transform for IPSec and Internet Key Exchange (IKE) and has been developed to replace the Data Encryption Standard (DES). AES is designed to be more secure than DES: AES offers a larger key size, while ensuring that the only known approach to decrypt a message is for an intruder to try every possible key. AES has a variable key length —the algorithm can specify a 128-bit key (the default), a 192-bit key, or a 256-bit key. AES able to process sixtimes faster compared with the triple DES for the same processing capacity. ATM (Automated Teller Machine) The first ATM in Korea was installed by Korea exchange Bank in 1975, and once installation of ATM by Shinhan Bank in 1982, the civilian will use the ATM of varied banks with beginning of operation of common CD network that is controlled by Korea Financial Telecommunications & clearings institute. The quantity of put in ATM machine has shown the trend of skyrocketing unceasingly with the high increasing quantitative relation within the half of year 2000s, and gradual increase once the year. Particularly external ATM machine has been accrued unceasingly. An Automated Teller Machine (ATM) is used to electronically withdraw money from and deposit it to your bank account [9]. ATM communicates with central host processor by Internet Service Provider has a gateway where all ATM networks available to user. Here ATM machines connected to central host processor are by telephone lines or normal phone line using modem. When customer wants to perform transaction provide PIN details and ATM card. ATM machine forwards to central host processor, where ATM request to customer’s bank. If customer request cash, central host processor initiates electronic funds transfer from customer bank to ATM central host processor account. Once transfer complete to central host processor, it sends approval code to ATM machine to dispense cash. IV. ProposedMethodology Authentication of ATM during transaction is unsecure because with help of clone of original cards by replicas of ATM machine card slots with built-in magnetic strip readers. The reader capture data embedded in the magnetic strip and store it. By placing small wireless surveillance cameras in ATM center to track the PIN to cash withdrawal. To come up with stolen card and tracked PIN for cash withdrawal. To overcome this, I am proposing ATM transaction using combination of One Time Password and PIN to authenticate the ATM during transactions. Fig.1. Basic block diagramof proposed system
  • 4. Technical Review on Secure Banking using RSA and AES EncryptorMethodologies DOI: 10.9790/2834-11140104 www.iosrjournals.org 4 | Page Above figure consists of three nodes, one node is master which is connected to the personal computer and other two nodes are the slave nodes connected with wireless module which is ZigBee & RFID. V. Conclusion The last few decades has witnessed various kinds of card and currency fraud. The security procedures followed by the banks are archaic, thus making it less secure and leaves scope for possible attacks and frauds. Implementation of varied kinds of encryption strategies like RSA and AES cryptography methodologies will not only make the transactions secure but also increase the trust among the employees, clients and partners for the banks and online transactions. References [1] Sistu Sudheer Kumar, A. Srinivas Reddy , May-2015, “ A survey on theft prevention during ATM transaction without ATM cards”, eISSN: 2319-1163 | pISSN: 2321-7308 Volume: 04 Special Issue: 06 | NCEITCS-2015 | May-2015. [2] Ezeofor C. J, Ulasi A. G., December 2014, “Analysis of Network Data Encryption & Decryption Techniques in Communication Systems ” International Journal of Innovative Research in Science Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 12, December 2014 ISSN: 2319-8753. [3] Sivakumar T, Gajjala Askok, k. Sai Venuprathap, August 2013, “ Design and Implementation of Security Based ATM theft Monitoring system”, International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 1 (August 2013) PP: 01-07. [4] Nentawe Y. Goshwe , July 2013, “ Data Encryption and Decryption Using RSA Algorithm in a Network Environment” IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.7, July 2013. [5] Sneha K. Patel, Dr. D. C. Joshi, June 2013, “Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human”, Int Jr. of Mathematics Sciences & Applications Vol.3, No.1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888. [6] Shun Wong, April 2005, “The Encryption Technology of Automatic Teller Machine Networks”, Software Engineering4C03 Winter 2005. [7] Oracle Advanced Security Administrator's Guide Release 8.1.5 A67766-01 [8] RSA SecurID Authentication, A Better Value for a Better ROI. [9] Http://www.ehow.com/how-does_4900119_how-atms-work.html. [10] AES Encryption, AES Encryption and Related Concepts.