Secure Crypto currency Transaction using Elliptic Curve Digital Signature Algorithm for Storing Wallets

Authors

  • Dhilipkumar.S, Francis Jasper Terence Rex., Jerlin A, Viji Charles.

Keywords:

Hardware Crypto wallets; Crypto currency; Bitcoins; Block chain technology; Elliptic Curve DSA; SHA 256; Crypto attacks.

Abstract

Crypto currency has become a universal currency. Though certain countries restrict its usage and plans to create their own crypto currency, the prevalence of the existing crypto currencies such as Bitcoin and their values are remarkable. Crypto currencies along with blockchain technology enables the anonymity of users, decentralization but with security and reliability. The security of encrypted wallets is becoming increasingly important as the overall value of digital currency increases. The hardware only wallets are secure somehow but it is not likely to have convenience of software-based wallets. Similarly, the software wallets are handy but have cyber vulnerabilities. In this paper, a hardware based crypto wallet for storage and transaction purposes is proposed by using encryption techniques. The main objective is to build a safe, secure, and durable wallet for storing the crypto currency and to maintain a ledger of the transactions which in turn increases the wallet’s security and the convenience of using it for an average consumer. The remote access will be available when the wallet is online. Hence for authentication, we are using Elliptic Curve Digital Signature Algorithm (ECDSA). The authenticity of the data and credibility of user’s credential can be proved with this technique.

Downloads

Download data is not yet available.

References

S. Nakamoto, 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized business review pp.1-9,

Coindesk Bitcoin price websitehttps://www.coindesk.com/price/bitcoin/[Last Accessed 13th December 2023].

I. Miers, C. Garman, M. Green and A. D. Rubin, 2013. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 397-411.

Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, 2017. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, pp. 557-564.

M. Conti, E. Sandeep Kumar, C. Lal and S. Ruj, 2018. A Survey on Security and Privacy Issues of Bitcoin. IEEE Communications Surveys & Tutorials, 20(4), pp. 3416-3452, Fourthquarter doi: 10.1109/COMST.2018.2842460.

D. Rai, M.P. Shetty, G.L. Alva, A. Hedge and M. Shiran, 2018. Wallet for Bitcoin Cryptocurrency. International Research Journal of Engineering and Technology, 05(07), pp.2465-2467.

S. Ebrahimi, P. Hasanizadeh, S.M. Aghamirmohammadali and A. Akbari, 2021. Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges. 23, pp.1-13.16.

S. Suratkar, M. Shirole and S. Bhirud, 2020. Cryptocurrency Wallet: A Review. In 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, pp. 1-7.

H. Rezaeighaleh, 2020. Improving Security of Crypto Wallets in Blockchain Technologies. Electronic Theses and Dissertations.

M. Azman and K. Sharma, 2020. HCH DEX: A Secure Cryptocurrency e-Wallet & Exchange System with Two-way Authentication. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, pp. 305-310.

Diego Geroni, 2021 Different Types Of Crypto Wallets – Explained https://101blockchains.com/types-of-crypto-wallets/[Last Accessed 13th December 2023].

“Paper Wallet: A Crypto Relic or Still 一 Relevant?” 2022 Available: https://learn.bybit.com/crypto/crypto-paper-wallet/ [Last Accessed 13th December 2023].

M. Vasek, J. Bonneau, R. Castellucci, C. Keith, and T. Moor, 2017. The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. Lecture Notes in Computer Science, 10, pp.609-618.

Trezor, 2020. https://www.fxempire.com/crypto/wallets/trezor. [Last Accessed 13th December 2023].

M.S. Pedro, V. Servant, C. Guillemet, 2019. Practical side-channel attack on a security device, https://ieeexplore.ieee.org/document/9021685

V. Bhavsar, A. Kadlak and S. Sharma, 2018. Study on Phishing Attacks, International Journal of Computer Applications, 182, pp. 27-29. 10.5120/ijca2018918286.

G. Karame, E. Androulaki and S. Capkun, 2012. Double-spending fast payments in Bitcoin. Proceedings of the ACM Conference on Computer and Communications Security, pp. 906-917.

F. A. Aponte-Novoa, A. L. S. Orozco, R. Villanueva-Polanco and P. Wightman, 2021. The 51% Attack on Blockchains: A Mining Behavior Study. IEEE Access, 9, pp. 140549-140564, 2021, doi: 10.1109/ACCESS.2021.3119291.

A. G. Khan, A. H. Zahid, M. Hussain and U. Riaz, 2019. Security of Cryptocurrency Using Hardware Wallet And QR Code. In 2019 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, pp. 1-10, doi: 10.1109/ICIC48496.2019.8966739.

S. Aggarwal and N. Kumar, 2021. Chapter Twenty-Attacks on blockchain. Advances in Computers, Elsevier, 121, pp:399-410.

H. Rezaeighaleh and C. C. Zou, 2019. New Secure Approach to Backup Cryptocurrency Wallets. In 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, pp. 1-6.

“BlueWallet Crypto Wallet” Marco Monroy Robles, 2023 Available: https://money.com/bluewallet-crypto-wallet-review/ [Last Accessed 13th December 2023].

S. P. Gupta, K. Gupta and B. R. Chandavarkar, 2021. The Role of Cryptography in Cryptocurrency. In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), Jalandhar, India, pp. 273-278.

B.K. Kikwai, 2017. Elliptic Curve Digital Signatures and their application in the Bitcoin Crypt-currency transactions. International Journal of Scientific and Research Publications, 7(11).

SHA-2 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-2, www.itl.nist.gov/fipspuhs/fip180-2.htm

N. Sklavos and O. Koufopavlou, 2003. On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03., Bangkok, Thailand, pp. V-V, doi: 10.1109/ISCAS.2003.1206214.

M. Parmar, and H.J. Kaur, 2021. Comparative Analysis of Secured Hash Algorithms for Blockchain Technology and Internet of Things. International Journal of Advanced Computer Science and Applications. 12. 10.14569/IJACSA.2021.0120335.

KattniRembor, Adafruit ESP32 Feather V2, https://www.adafruit.com/product/3405 [Last Accessed 13th December 2023].

M. LeBlanc-Williams, Adafruit 2.9" eInk Display Breakouts and FeatherWings: Easy E-paper with built in memory. https://learn.adafruit.com/adafruit-2-9-eink-display-breakouts-and-featherwings [last updated on Sep 22, 2021].

Lady ada, (2022, Dec, 01), Adafruit eInk Display Breakouts and FeatherWings [Web]. Available: https://cdn-learn.adafruit.com/downloads/pdf/adafruit-eink-display-breakouts.pdf [Last Accessed 13th December 2023].

Understanding the xPub and address generation https://support.blockchain.com/hc/en-us/articles/4417077967508-Your-Wallet-Its-Master-Seed-How-do-they-work-[Last Accessed 13th December 2023].

Downloads

Published

24.03.2024

How to Cite

Dhilipkumar.S. (2024). Secure Crypto currency Transaction using Elliptic Curve Digital Signature Algorithm for Storing Wallets. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 2988–2997. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5889

Issue

Section

Research Article