Open Access Open Access  Restricted Access Subscription or Fee Access

Intelligent Security Assurance System in Electronic Payment System using Public Key Cryptosystem

R.Vijaya Arjunan, Shahin Shahin

Abstract


The use of internet in the recent years gave a platform for conducting business by deploying business-to-business (B2B) and business-to-consumer (B2C) applications. However this payment related transactions in this regard have experienced skepticism among the users. Earlier literature confirms the use of Secure Sockets Layer (SSL) as the trusted protocol which is now proved to exhibit slower response time on the server side which is undesirable when low memory devices like personal digital assistant, mobile phones are being used. Based on past facts Elliptic Curve Cryptography (ECC) proves to be faster in terms of response to transaction requests and also occupies less memory when compared to few well known algorithms like RivestShamir Adelman (RSA). On practical verification using our proposed system for an e-payment system showed considerable improvement in the performance with the implementation of ECC over prime fields, GF(p). The proposed system is designed such that a server will use RSA for symmetric key exchange among its clients until it reaches a threshold of transaction requests from the end-users, and for the upcoming transactions it automates to use Elliptic Curve Diffie Hellman (ECDH)for the key exchange to reduce the response to transaction time taken by the server.


Keywords


Elliptic Curve Cryptography, E-Payment, Security, RSA, Public Key Cryptography.

Full Text:

PDF

References


Amar, S., and Moncef, A., (2011) Elliptic Curve Cryptography and its Applications, Seventh International Workshop on Systems, Signal Processing and their Applications, pp. 247-250, May 9-11, Tipaza.

Anita Jadhav and MeghaKolhekar, (2011) Implementation of elliptic curve cryptography on text and image, International Journal of Enterprise Computing and Business Systems, 1(2).

Biswal, P.K., Jena, J., Jena, S.K., Panigrahy, S.K., (2008) A novel protocol for smart card using ECDLP, First International Conference on Emerging Trends in Engineering and Technology, pp.838–843, July 16-18, Nagpur, Maharashtra.

Certicom, “Elliptic Curve Cryptography Tutorial”, [Online]. Available: http://www.certicom.com/index.php/ecc-tutorial

Chang, S., Sumit Gupta and Vipul Gupta, (2002) Performance Analysis of Elliptic Curve Cryptography for SSL, ACM.

Chen, L., Yanpu, C., and Zhengzhong, B. (2004) An implementation of fast algorithm for Elliptic Curve Cryptosystem over GF(p),Journal of Electronics, 21(4), 346–352.

NIST, (July 1999).Recommended Elliptic Curves For Federal Government Use, [Online]. Available:http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf

Palanivelu, T.G., and Vijayalakshmi, V., (2008) Secure localization using Elliptic Curve Cryptography in wireless sensor networks, International Journal of Computer Sciences and Network Security, 8(6), pp. 255–261.

Ramesh, S., Vivek, K., and Vivek S.A., (2008) Elliptic Curve Cryptography, ACM Ubiquity, 9(20), pp.1–8

Vincent, O.R., Folorunso, O. and Akinde, A.D., (2010)Improving e-payment security using Elliptic Curve Cryptosystem, Electronic Commerce Research, 10(1), pp. 27-41.

William Stallings, Cryptography and Network Security: Principles and practices. 4th ed. Pearson Education, 2006.


Refbacks

  • There are currently no refbacks.