Professional Documents
Culture Documents
Group 4 PN
Group 4 PN
Group 4 PN
RV College of
Engineering Department of Electronics & Telecommunication Engineering
Minor-Project (18TE64)
presentation on,
Presented By,
CONTENTS
• Introduction
• Literature review
• Problem definition
• Objectives
• Methodology
• Details
• Implementation (Customer Side)
• Implementation (Merchant Side)
• Expected Outcome
• References
• Schedule
09/06/2021 DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING
RV College of Go, change the world
Engineering
INTRODUCTION
• Digital forms of money have turned into the most discussed issue in the world economy due to probable
transmission of COVID-19 through coins and bank notes.
• Along with this, paper currency also has its shortcoming which needs to be overcome.
• The Indian government has implemented several promising initiatives, with the aim of making the Indian
economy less cash-based and gradually cashless.
• The fundamental advantage of digital forms of money use is that they make it easier to exchange assets
between two gatherings in an exchange.
• The disadvantage of digital forms of money is that it lacks anonymity and unavailability of offline mode of
transaction.
INTRODUCTION
• A digital money is an advanced technology that utilizes cryptographic techniques for security.
• However, in typical card-based payments, user divulge their details to merchant for payment that may lead
to fraud, customer profiling and impersonations.
• Mobile payments may lead to spend analysis by linking various purchases and tracing them to the customer.
• The banks and other monetary based organizations may analyze digital currencies as an option for the
monetary exchanges later if these limitations can be overcome.
• Combination of Blinding Protocol, Splitting Protocol and Commitment Protocol at different level of
transaction can ensure both security and privacy for the users
LITERATURE REVIEW
REFERENCE PAPER CONFERENCE/JOURNAL REMARKS
NO.
[1] D. Madhusudhana Rao, Subba Rao Peram, B. International Journal of Advanced • This paper address few challenges specifically
Premamayudu, “Analysis of Science and Technology, Volume 29, related to security domain of Bitcoin and other
Anonymity and Privacy of Crypto Currencies” Number 3, pp. 10800 - 10813, 2020. digital cash systems.
• Hidden address shuffling, data encryption and
data disintegration techniques were also used in
this paper to protect the privacy of the user.
[2] B. Rajendran, A. K. Pandey and B. S. 2017 IEEE SmartWorld, Ubiquitous • The paper proposed the use of digital tokens and
Bindhumadhava, "Secure and privacy Intelligence & Computing, Advanced detail the token generation, usage and
preserving digital payment" & Trusted Computed, Scalable redemption process.
Computing & Communications, • It also introduced an intermediary entity, DTE -
Cloud & Big Data Computing, Digital Token Exchange to facilitate the
Internet of People and Smart City transaction between Payer and Payee.
Innovation, San Francisco, CA, USA,
2017, pp. 1-5, 2017.
[3] H. Lin, Z. Yan, Y. Chen and L. Zhang, "A Survey IEEE Access, Volume 6, pp. 18345- • This paper has briefly introduced network
on Network Security-Related Data 18365, 2018. security-related data, including its definition and
Collection Technologies" characteristics, and the applications of network
data collection.
09/06/2021 DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING
RV College of
Engineering
Go, change the world
LITERATURE REVIEW
REFERENCE PAPER CONFERENCE/JOURNAL REMARKS
NO.
[4] M. C. Kus Khalilov and A. Levi, "A Survey on IEEE Communications Surveys & • This paper used zero knowledge proofs and ring
Anonymity and Privacy in Bitcoin- Tutorials, Voume 20, Number 3, pp. signatures improving anonymity and privacy of
Like Digital Cash Systems" 2543-2585, 2018. the user.
• Homomorphic commitments are used for hiding
transaction amounts as an alternative to zero
knowledge protocols.
[5] Maulid, Hariandi. “The Implementation of Blind International Journal of Applied • This paper proposed online RSA Blind
Signature in Digital Cash” Information Technology, Volume 3, Signatures digital cash scheme and offline
pp. 219-222, 2015. Brands Blind Signatures digital cash scheme.
[6] Liu Feng, Li Xueyong and Gao Guohong, "The International Conference On • This paper proposes an anonymous off-line
design of an e-cash system" Computer Design and Applications, electronic cash system based on the control
Qinhuangdao, China, Volume 2, pp. technology of group signature and blind
119-122, 2010. signature.
• In this paper, the technology of group signature
mechanism is based on the ECC algorithm.
LITERATURE REVIEW
REFERENCE PAPER CONFERENCE/JOURNAL REMARKS
NO.
[7] Benoît Libert, San Ling, Fabrice Mouhartem, Advances in Cryptology – • This paper provides new tools enabling the
Khoa Nguyen, Huaxiong Wang, “Signature ASIACRYPT 2016, Volume 10032, design of anonymous authentication systems
Schemes with Efficient Protocols and Dynamic pp. 373-403, 2016. whereby new users can join the system at any
Group Signatures from Lattice Assumptions” time.
• It gives a signature scheme with efficient
protocols, which allows users to obtain a
signature on a committed value and
subsequently prove knowledge of a signature on
a committed message.
[8] N. R. Kisore and S. Sagi, "A secure SMS protocol International Conference on Advances • This paper propose a security protocol to secure
for implementing digital cash system" in Computing, Communications and SMS messages and develop a digital cash
Informatics (ICACCI), Kochi, India, system.
pp. 1883-1892, 2015. • Proposed SMS protocol based on ECMQV key
agreement protocol and AES encryption
algorithm
MOTIVATION
PROBLEM DEFINITION
“Implementation of digital cash system that offers both online and offline modes of transfer
of money with anonymity, fraud detection and prevention against double spending.”
OBJECTIVES
METHODOLOGY
The high-level overview for the implementation of Digital Cash system:
• Step 1: Customer/Payer sends digital cash request to bank.
• Step 2: Bank provides Customer/Payer with signed requested amount in digital cash.
• Step 3: Customer/Payer pay the digital cash to Merchant/Payee.
• Step 4: Merchant/Payee do the self-verification of the received digital cash.
• Step 5: After successful self-verification, Merchant/Payee deposits the received digital cash to
bank.
• Step 6: Bank verifies the deposited digital cash.
• Step 7: After successful verification by bank, receipt is generated by Merchant/Payee to
Customer/Payer.
09/06/2021 DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING
RV College of
Engineering
Go, change the world
1. Initiation 6. Verification
BANK
5. D
w ep o
dra sit
With
2.
4. Self Verification
3. Payment
CUSTOMER MERCHANT
7. Receipt
4. Verification
CUSTOMER 3. Sends blinding factors of k-1 money orders BANK
5. Signs the unverified money order
Figure 2: Blinding Protocol and Secret Splitting between Customer/Payer and Bank
In figure 2, r is the money order requested by Customer/Payer, e is public key of bank and b is the blinding factor applied by Customer/Payer.
Receipt after verification with the bank Verification status of the payment
Figure 3: Commitment Protocol between Customer/Payer and Merchant/Payee Figure 4: Verification between Merchant/Payee and Bank
DETAILS
This project will be implemented on Python. Different python libraries which will be used are:
• RSA
• HMAC
• PyCrypto
• BitVector
• Numpy
RSA
• The RSA algorithm is named after Ron Rivest, Adi Shamir, and Leonard Adleman.
• RSA algorithm is Public Key Cryptography algorithm.
• RSA is based on the fact that it is difficult to factorize a large integer.
• The public key consists of two numbers where one number is multiplication of two large prime
numbers.
• The private key is also derived from the same two prime numbers.
• Encryption strength totally lies on the key size and if we double or triple the key size, the
strength of encryption increases exponentially.
RSA
Figure 5: Key Generation by receiver/server Figure 7: Message (M) decryption by receiver/server using its own private key d
• HMAC is a message authentication code that uses a cryptographic key in conjunction with a
hash function.
• HMAC provides the server and the client each with a private key that is known only to that
specific server and that specific client.
• The client creates a unique HMAC, or hash, per request to the server by hashing the request data
with the private keys and sending it as part of a request.
• HMAC is more secure than Message Authentication Code (MAC) is that the key and the
message are hashed in separate steps.
SECRET SPLITTING
• The secret sharing is a method to protect confidentiality and integrity of the secret messages by
distributing the message shares into several packets.
• The secret message could not be revealed unless the recipients collect all packets to reconstruct
the actual message.
• Even though the attacker obtain shares shadow during the share exchange, it would be
impossible for the attacker to understand the correct share.
• Further, packets (with unique identity data) can be XORed with random numbers to obtain more
security.
BLIND SIGNATURE
• Blind signature is a form of digital signature in which the content of a message is disguised
before it is signed.
• The resulting blind signature can be publicly verified against the original, unblinded message in
the manner of a regular digital signature.
• The blinded message is passed to a signer, who then signs it using a standard signing algorithm.
• The resulting message, along with the blinding factor, can be later verified against the signer's
public key.
• In some blind signature schemes, such as RSA, it is even possible to remove the blinding factor
from the signature before it is verified.
09/06/2021 DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING
RV College of
Engineering
Go, change the world
SPLITTING PROTOCOL
SPLITTING PROTOCOL
BLINDING PROTOCOL
COMMITMENT PROTOCOL
IMPLEMENTATION (T.B.D.)
• Banks’s public and private key is needed to be generated.
• Simulation of implemented customer and bank side needs to be done.
• Implementation of merchant side module needs to be done.
• Simulation of merchant side module needs to be done.
• Integration of all three modules needs to be done.
EXPECTED OUTCOME
• Digital cash transaction environment is established between customer and bank, customer and
merchant, and merchant and bank.
• Anonymity and privacy in transaction is available for customer and merchant.
• Digital cash generated cannot be double spend by customer or merchant.
• Digital cash storage will not required any specific digital wallet and can be stored easily.
REFERENCES
D. Madhusudhana Rao, Subba Rao Peram, B. Premamayudu, “Analysis of Anonymity and Privacy of Crypto
[1] Currencies”, International Journal of Advanced Science and Technology, Volume 29, Number 3, pp. 10800 -
10813, 2020.
B. Rajendran, A. K. Pandey and B. S. Bindhumadhava, "Secure and privacy preserving digital payment," 2017
[2] IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing
& Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, San
Francisco, CA, USA, 2017, pp. 1-5, 2017.
H. Lin, Z. Yan, Y. Chen and L. Zhang, "A Survey on Network Security-Related Data Collection Technologies,"
[3] IEEE Access, Volume 6, pp. 18345-18365, 2018.
M. C. Kus Khalilov and A. Levi, "A Survey on Anonymity and Privacy in Bitcoin- Like Digital Cash Systems,"
[4] IEEE Communications Surveys & Tutorials, Voume 20, Number 3, pp. 2543-2585, 2018.
REFERENCES
D. Madhusudhana Rao, Subba Rao Peram, B. Premamayudu, “Analysis of Anonymity and Privacy of Crypto
[5] Currencies”, International Journal of Advanced Science and Technology, Volume 29, Number 3, pp. 10800 -
10813, 2020.
B. Rajendran, A. K. Pandey and B. S. Bindhumadhava, "Secure and privacy preserving digital payment," 2017
[6] IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing
& Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, San
Francisco, CA, USA, 2017, pp. 1-5, 2017.
H. Lin, Z. Yan, Y. Chen and L. Zhang, "A Survey on Network Security-Related Data Collection Technologies,"
[7] IEEE Access, Volume 6, pp. 18345-18365, 2018.
M. C. Kus Khalilov and A. Levi, "A Survey on Anonymity and Privacy in Bitcoin- Like Digital Cash Systems,"
[8] IEEE Communications Surveys & Tutorials, Voume 20, Number 3, pp. 2543-2585, 2018.
SCHEDULE
Schedule From To
Discussion and finalization of topic 01-04-2021 08-04-2021
Literature review and synopsis preparation 10-04-2021 19-04-2021
Understanding the basic concepts involved in Digital Cash 20-04-2021 28-04-2021
Understanding and learning the working of Python and its libraries 29-04-2021 6-05-2021
Understanding and implementing Blinding Protocol and Splitting Protocol 7-05-2021 15-05-2021
Understanding and implementing Commitment Protocol 16-05-2021 23-05-2021
Understanding and implementing the bank’s side functionalities 24-05-2021 09-06-2021
Understanding and implementing the customer/payer’s side functionalities 10-06-2021 18-06-2021
THANK YOU