Open Access   Article Go Back

Confirming Secured E-Commerce Transaction Environment Supported by A New Symmetric Key Cryptographic Scheme

B. Biswas1 , A.K. Khan2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 414-423, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.414423

Online published on Aug 31, 2018

Copyright © B. Biswas, A.K. Khan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Biswas, A.K. Khan, “Confirming Secured E-Commerce Transaction Environment Supported by A New Symmetric Key Cryptographic Scheme,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.414-423, 2018.

MLA Style Citation: B. Biswas, A.K. Khan "Confirming Secured E-Commerce Transaction Environment Supported by A New Symmetric Key Cryptographic Scheme." International Journal of Computer Sciences and Engineering 6.8 (2018): 414-423.

APA Style Citation: B. Biswas, A.K. Khan, (2018). Confirming Secured E-Commerce Transaction Environment Supported by A New Symmetric Key Cryptographic Scheme. International Journal of Computer Sciences and Engineering, 6(8), 414-423.

BibTex Style Citation:
@article{Biswas_2018,
author = {B. Biswas, A.K. Khan},
title = {Confirming Secured E-Commerce Transaction Environment Supported by A New Symmetric Key Cryptographic Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {414-423},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2710},
doi = {https://doi.org/10.26438/ijcse/v6i8.414423}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.414423}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2710
TI - Confirming Secured E-Commerce Transaction Environment Supported by A New Symmetric Key Cryptographic Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - B. Biswas, A.K. Khan
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 414-423
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
340 206 downloads 113 downloads
  
  
           

Abstract

With the advances of the internet technology, people are more relying on the e-commerce transaction. However, due to security paucities, it is often subjected to many controversies. There are different existing cryptographic techniques to provide security for the transactions in e-commerce. Nevertheless, the enhancement in technology causes different attacks on the conventional cryptographic schemes, which resulted many security threats to the transactions. A new symmetric key cryptographic algorithm for e-commerce transaction has been proposed in this paper which can provide better security for the transactions over the internet. The new randomized key generation, substitution box generation and permutation box generation algorithms have been proposed for this cryptographic technique. This proposed algorithm has been proved as the cryptographic process with randomness as its avalanche effect is more than 50%. Additionally, correlation coefficient of this method is also better than the original AES. Moreover, the encryption and decryption time of this proposed algorithm is much less than the original AES. So, this proposed algorithm would ensure better security to the e-commerce transaction with less time to make the transaction more efficient.

Key-Words / Index Term

E-commerce, symmetric key cryptography, Substitution-Box, Permutation-Box, key generation

References

[1] S.Chatterjee and K.Gupta, ”A Comparative Study of Security in E-commerce:Review”, International Journal of Computer Sciences and Engineering,pp. 143-148,2016.
[2] R.C.Marchany and J.G.Tront, ”E-Commerce Security Issues”, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002, Big Island, HI, USA, pp. 2500-2508. IEEE,2002.
[3] H.Ortok , R. Haraty, and A. N. El-Kassar , ”Improving the Secure Socket Layer Protocol by modifying its Authentication Function”, World Automation Congress(WAC) , Budapest, Hungary, pp. 1-6. IEEE,2016.
[4] W.Stallings, ”Cryptography and Network Security”, 4/E. Pearson Education India, pp. 63-68, 2006.
[5] A.Alabaichi and A.I.Salih, “Enhanced Security of Advanced Encryption Standard Algorithm Based on Key-dependent S-Box”, In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference, Sierre, Switzerland, pp. 44-53. IEEE, 2015.
[6] E.P.Nugroho, R..R.J.Putra and I.M.Ramadhan, ”SMS Authentication Code Generated by Advanced Encryption Standard(AES) 256-bits Modification Algorithm and One Time Password(OTP) to Activate New Applicant Account”, 2nd International Conference on Science and Information Technology(ICSITech), Balikpapan, Indonesia, pp. 175-180 .IEEE, 2016.
[7] Dilna.V and C.Babu, ”Area Optimized and High Throughput AES Algorithm based on Permutation Data Scramble Approach”, In Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference , Chennai, India, pp. 3056-3060. IEEE, 2016.
[8] J.Mary and D.S.Kumar , ”An Implementation of Modified Lightweight Advanced Encryption Standard in FPGA”, Procedia Technology 25 (2016), pp. 582-589,2016.
[9] P.Kumar and S.B.Rana, “Development of Modified AES Algorithm for Data Security”, ScienceDirect, www.elsevier.de/ijleo, Optik-International Journal for Light and Electron Optics 127, no. 4 (2016), pp. 2341-2345,2016.
[10] M.Dara and K.Manochehri , “ Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES” , Information Security Journal: A Global Perspective 23, no. 1-2(2014), pp. 1-9,2014.
[11] S.Mondal and S.Maitra, “ Data Security-modified AES algorithm and its applications”, ACM SIGARCH Computer Architecture News 42, no. 2(2014),pp. 1-8, 2014.
[12] S.M.Wadi and.N.Zainal “ A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor”, Journal of Engineering Science and Technology 8, no. 4, pp. 406-415,2013.
[13] A.Khelifi, M. Aburrous,M.A.Talib and P. V. S. Shastry, ” Enhancing Protection Techniques of E-banking Security Services Using Open Source Cryptographic Algorithms”, In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2013 14th ACIS International Conference, Honolulu, HI, USA, pp. 89-95 . IEEE, 2013.
[14] C.P.Dewangan , S.Agarwal, A.K.Mandal and A.Tiwari, “Study of Avalanche Effect in AES Using Binary Codes”, IEEE Conference on Advanced Communication Control and Computing Technologies (ICACCCT), Ramnathapuram, India, pp. 23-25, 2012.
[15] D. O. Vadaviya and P. H. Tandel, “Study of Avalanche Effect in AES”, National Conference on Recent Advances in Engineering for Sustainability, 2015.
[16] A.Alabaichi, F.Ahmad and R.Mahmod, “Security Analysis of Blowfish Algorithm”, Informatics and Applications (ICIA), 2013 Second International Conference, Lodz, Poland, pp. 12-18. IEEE, 2013.