ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Implementation of a Protocol for Secure E-Commerce Transactions?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 499-505

Keywords : Security; Encryption; Hybrid Cryptography; Symmetric and Asymmetric Algorithms; Authentication and Integrity;

Source : Downloadexternal Find it from : Google Scholarexternal


In today's fast moving age, most of the individuals want all things to happen easily and quickly, which led tremendous developments is the fields of communication technology and E-Commerce domain which holds a major impact on today's business. One of the major concerns now a days is the security of data being exchanged among the desired clients. Third party intervention has lead to new developments in the field of security specially related to networks like internet which are at a great risk. When the data is over the network there are more chances of attack. It is desired to communicate data with high security keeping these requirements in mind we propose to design a new security protocol using a combination of symmetric and asymmetric techniques to provide security to E-Commerce transactions. This protocol provides three cryptographic primitives ? Authentication, Integrity and Confidentiality using AES-Rijndael for encryption, public key cryptography (RSA) for authentication and RIPEMD-160 to check for integrity as well as checks for the authenticity of the data being received. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. A new security protocol is proposed for better security using a hybrid cryptographic scheme.

Last modified: 2014-07-22 20:39:31