IJMEMES logo

International Journal of Mathematical, Engineering and Management Sciences

eISSN: 2455-7749 . Open Access


An Innovative Multi-Party Authentication and Cyber Attacks Prevention Technique to Enhance the Security on Key and Data Transformation

An Innovative Multi-Party Authentication and Cyber Attacks Prevention Technique to Enhance the Security on Key and Data Transformation

Bilas Haldar
Department of Artificial Intelligence & Machine Learning, St. Thomas’ College of Engineering & Technology, 700023, Kolkata, West Bengal, India.

Partha Kumar Mukherjee
Department of Computer Science and Engineering, The Neotia University, Sarisha, 743368, South 24 Parganas, West Bengal, India.

Himadri Nath Saha
Department of Computer Science, Surendranath Evening College, Calcutta University, Kolkata, West Bengal, India.

DOI https://doi.org/10.33889/IJMEMS.2026.11.2.037

Received on May 08, 2025
  ;
Accepted on December 28, 2025

Abstract

The increasing reliance on online infrastructure and the expansion of distributed network systems have made digital communication that is an indispensable part of modern life. However, this dependence has also attracted malicious attackers’ intent on intrusion, eavesdropping and compromising the security of sensitive information. This work presents an innovative approach to enhance the security in key generation, distribution and data transformation by developing a robust multi-party authentication technique. The work proposed a Modified Elliptic Curve Cryptography (MECC) technique to enhance the security for the key. The suggested approach leverages a combination of classical cryptography methods and innovative cyber attack prevention strategies to protect against unauthorized access and malicious threats. Additionally, the work introduces a novel encryption and decryption methodology for the secure transformation of key and data files using the MECC technique. Furthermore, a comparative analysis is conducted that benchmarks the performance of the proposed methodology against the traditional Elliptic Curve Cryptography (ECC) methodology. Experimental results show that MECC achieves encryption times ranging from 120.00 to 1376.99 seconds for files sized 10 to 100 MB. It is offering up to 28% faster performance and enhanced resistance to cryptographic attacks compared to traditional ECC. The applications of the suggested methodology are particularly suitable for E-banking systems that demand secure communication and real-time transactions. Furthermore, this work explores security defense strategies against Local File Inclusion (LFI) attacks in the financial sector, reinforcing the resilience of digital systems against emerging cyber threats.

Keywords- Encryption, Decryption, Modified elliptic curve cryptography, Security strategy, Local file inclusion attack, Pattern analysis attack, Chosen ciphertext attack.

Citation

Haldar, B., Mukherjee, P. K. & Saha, H. N (2026). An Innovative Multi-Party Authentication and Cyber Attacks Prevention Technique to Enhance the Security on Key and Data Transformation. International Journal of Mathematical, Engineering and Management Sciences, 11(2), 896-919. https://doi.org/10.33889/IJMEMS.2026.11.2.037.