CFP last date
20 December 2024
Reseach Article

Analysis of Secured Cryptography Algorithms in M-Commerce

by Akanksha Srivastav, Ajeet Bhartee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 5
Year of Publication: 2016
Authors: Akanksha Srivastav, Ajeet Bhartee
10.5120/ijca2016911235

Akanksha Srivastav, Ajeet Bhartee . Analysis of Secured Cryptography Algorithms in M-Commerce. International Journal of Computer Applications. 147, 5 ( Aug 2016), 33-36. DOI=10.5120/ijca2016911235

@article{ 10.5120/ijca2016911235,
author = { Akanksha Srivastav, Ajeet Bhartee },
title = { Analysis of Secured Cryptography Algorithms in M-Commerce },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 5 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number5/25653-2016911235/ },
doi = { 10.5120/ijca2016911235 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:07.926614+05:30
%A Akanksha Srivastav
%A Ajeet Bhartee
%T Analysis of Secured Cryptography Algorithms in M-Commerce
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 5
%P 33-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today’s new technologies which allow mobile phone and handheld device to access the internet have made wireless transaction possible. Cryptography is the technique in which file is converted in unreadable format. In this file of unreadable format is send, after sending, receiving the file use some algorithms to decrypt the file and read the original data. Main factor to secure the medium is algorithms and use key size in their algorithms.RSA is the traditional method which provide secure medium. in most of the online transmission field. But here use RSA algorithms with ECC. Which provide more secure medium for transmission

References
  1. William Stallings: Cryptography and Network Security Principles and Practice, 5th Edition
  2. M. Junaid Arshad and M. Abrar “Securing DNS Using Elliptical Curve Cryptography: An Overview”
  3. Ram Ratan Ahirwal, Manoj Ahke, “Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network”, IJCSIT volume 4 (2) 2013
  4. S. Maria Celestin Vigila1, K. Muneeswaran2, “Elliptic Curve based Key Generation for Symmetric Encryption”, IEEE 2011
  5. Vishwa gupta, 2. Gajendra Singh ,3 .Ravindra Gupta, “Advance cryptography algorithm for improving data security” IJARCSSE 2012
  6. G.V.S. Raju and Rehan Akbani, Department of Computer Science The University of Texas at San Antonio. San Antonio, TX 78249-0669 “Elliptic Curve Cryptosystem and its Applications”
  7. “Visa Mobile 3D Secure Specification for Mcommerce Security”.
  8. Ram Ratan Ahirwal, Manoj Ahke, “Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network ”, IJCSIT volume 4 (2) 2013
  9. S. Maria Celestin Vigila1, K. Muneeswaran2, “Elliptic Curve based Key Generation for Symmetric Encryption”, IEEE 2011
  10. Batra, D. S., & Juneja, D. (2013, February). MCommerce in India: Emerging Issues. International Journal of Advanced Research in IT and Engineering, 2(2), 54-65.
  11. Y. Jing, G.-J. Ahn, Z. Zhao, and H. Hu, “Riskmon: Continuous and automated risk assessment of mobile applications,” in Proc. of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY’14), San Antonio, Texas, USA. ACM, March 2014, pp. 99–110.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography encryption decryption RSA ECC transmission