Elliptic Curve Cryptography for Securing Payment System
نویسنده
چکیده
Mobile payment system has made it easy for people to do financial transaction. However, its security is still a concern. It needs to protect the data transferred between parties involved in the system. In this paper, we investigate the possibility use of elliptic curve cryptography to secure the data transferred in a payment system.
منابع مشابه
A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملIssues and Challenges in Symmetric Key based Cryptographic Algorithm for Videos and Images
Modern era is fully dependent on internet communication. Through internet we can transfer data anywhere in the world. Through these various activities can be done such as online bill payment, shopping. The network is currently used for carrying personal information as well as financial data. Thus, it is necessary to secure the network, in order that unauthorized person cannot access personal in...
متن کاملAuthentication System Securing Index of Image using SVD and ECC
Abstract This paper presents a new approach to securing information stored in a database. It has three components including: an operation for indexing images using Singular Value Decomposition (SVD), which will constitute the reference images, asymmetric encryption operation using Elliptic Curve Cryptosystem (ECC), aiming to make confidential these reference images stored and a technique for co...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کامل