• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 37, Pages: 3148-3158

Original Article

Secure Transaction of Digital Currency through Fuzzy Based Cryptography

Received Date:14 June 2023, Accepted Date:30 August 2023, Published Date:09 October 2023


Objective: Internet technology is growing at a very fast rate around the globe and many of the countries are performing currency transaction through online mode. Due to increment of transaction of currency in an exponential manner, there is a need to include proper security features so that hackers or intruders could not hack the digital transaction carrying out between the two parties. Method: A new model using Unified Modeling Language (UML) is proposed which is developed in the hybrid mode with a combination of fuzzy rule-based computation, fingerprint authentication, Hash and Elgamal cryptography. The hybrid method is applied for secure transaction of the digital currency. The fuzzy rule based computation is used with Triangular Membership Function (TMF), which is based on current date and time. Fuzzy value creates a secret key and encrypts through Hash algorithm. Elgamal cryptosystem is used for encryption and decryption. The results obtained through hybrid method are tested through the concept of Finite State Machine (FSM) by generating the various test cases. Findings: The results obtained through hybrid method are tested through the concept of FSM by generating the various test cases. Novelty: In this work, mutual authentication as well as time stamp is also considered and the presented hybrid approach is based upon two-way authentication between client and user which is found to be very effective and may be used by the software industries for the customers especially related to the banking sectors.

Keywords: Fuzzy; Hash Algorithm; Cryptosystem; FSM; Test Cases and Validation


  1. Navamani TM. A Review on Cryptocurrencies Security. Journal of Applied Security Research. 2023;18(1):49–69. Available from: https://doi.org/10.1080/19361610.2021.1933322
  2. Swain S, Tiwari RK. Cloud Security Research- A Comprehensive survey. International Journal of Electronics Engineering and Applications. 2020;8(2):29–39. Available from: https://doi.org/10.30696/IJEEA.VIII.II.2020.29.39
  3. Kumar J, Saxena V. Hybridization of Cryptography for Security of Cloud Data. International Journal of Future Generation Communication and Networking. 2020;13(4):4007–4014. Available from: http://sersc.org/journals/index.php/IJFGCN/article/view/34754/19261
  4. Jintcharadze E, Iavich M. Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. 2020 IEEE East-West Design & Test Symposium (EWDTS). 2020;p. 1–5. Available from: https://doi.org/10.1109/EWDTS50664.2020.9224901
  5. Pittalia PP. A Comparative Study of Hash Algorithms in Cryptography. International Journal of Computer Science and Mobile Computing. 2019;8(6):147–152. Available from: https://www.academia.edu/download/ 59869343/V8I6201928.pdf
  6. Valdes-Ramirez D, Medina-Perez MA, Monroy R, Loyola-Gonzalez O, Rodriguez J, Morales A, et al. A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation. IEEE Access. 2019;7(1):48484–48499. Available from: https://doi.org/10.1109/ACCESS.2019.2909497
  7. Hindi A, Dwairi MO, Alqadi Z. Analysis of Procedures Used to Build an Optimal Fingerprint Recognition System. International Journal of Computer Science and Mobile Computing. 2020;9(2):21–37. Available from: https://ijcsmc.com/docs/papers/February2020/V9I2202008.pdf
  8. Mohan M, Kavithadevi MK, V. JP. Improved ElGamal Cryptosystem for Secure Data Transfer in IoT Networks. 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). 2020;p. 295–302. Available from: https://doi.org/10.1109/I-SMAC49090.2020.9243407
  9. Azam MH, Hasan MH, Hassan S, Abdulkadir SJ. Fuzzy Type-1 Triangular Membership Function Approximation Using Fuzzy C-Means. 2020 International Conference on Computational Intelligence (ICCI). 2020;p. 115–120. Available from: https://doi.org/10.1109/ICCI51257.2020.9247773
  10. Bian W, Gope P, Cheng Y, Li Q. Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme. Future Generation Computer Systems. 2020;109:45–55. Available from: https://doi.org/10.1016/j.future.2020.03.034
  11. Irshad A, Usman M, Chaudhry SA, Bashir AK, Jolfaei A, Srivastava G. Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server. IEEE Transactions on Reliability. 2021;70(3):1014–1025. Available from: https://doi.org/10.1109/tr.2020.3021794
  12. Xiao R, Wu Z, Wang D. A Finite-State-Machine model driven service composition architecture for internet of things rapid prototyping. Future Generation Computer Systems. 2019;99:473–488. Available from: https://doi.org/10.1016/j.future.2019.04.050
  13. Andrea R, Wijayanti S, Nursobah. Finite State Machine Model in Jungle Adventure Game an Introduction to Survival Skills. International Journal of Information Engineering and Electronic Business. 2021;13(4):55–61. Available from: https://doi.org/10.5815/ijieeb.2021.04.05
  14. Gope P, Das AK, Kumar N, Cheng Y. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Transactions on Industrial Informatics. 2019;15(9):4957–4968. Available from: https://doi.org/10.1109/TII.2019.2895030
  15. Maitra T, Obaidat MS, Giri D, Dutta S, Dahal K. ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications. IET Networks. 2019;8(5):289–298. Available from: https://doi.org/10.1049/iet-net.2019.0004


© 2023 Saxena & Kumar. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)


Subscribe now for latest articles and news.