A Systematic Way to Provide Security for Digital Signature Using Elliptic Curve Cryptography

被引:0
作者
Randhawa, Navneet [1 ]
Singh, Lolita [1 ]
机构
[1] Adesh Coll Engn & Technol, Comp Sci & Informat Technol Dept, Faridkot, Punjab, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 07期
关键词
Digital signature; E-commerce; cryptography; security; public key algorithm: RSA; Elliptic curve;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-Commerce [1] is an integral part of our lives now. It has boomed in popularity for both retailers and consumers and this trend is not going to stop anytime soon. The cost-benefits for businesses in overhead and the convenience for shoppers are strong motivators to continue the growth of e-commerce. While there are many benefits of e-Commerce, it is important to remember that there are definitive security challenges that businesses face in e-commerce. But, these are probably not enough to deter merchants (and customers) from engaging in online transactions; still they need to be paid careful attention in order to minimize the risk. Furthermore, E-Commerce is not only limited to a fixed computer it has become wire-free. In this paper the problem undertaken is" Security of Digital Signature in E-Commerce using Elliptic-Curve Cryptography". E-Commerce security strategies deal with two issues: Protecting the integrity of the Business network and its internal systems and with accomplishing transaction security between the customer and the business. We use the concept of RSA (by Rivest, Shamir and Adleman.) and Elliptic Curve Algorithms to implement Digital Signature.
引用
收藏
页码:154 / 158
页数:5
相关论文
共 16 条
[1]  
Barnes C., 2002, HACK PROOFING YOUR W
[2]  
CHAN H., 2001, ETAL E COMMERCE
[3]   Keeping e-business in perspective [J].
Coltman, T ;
Devinney, TM ;
Latukefu, AS ;
Midgley, DF .
COMMUNICATIONS OF THE ACM, 2002, 45 (08) :69-73
[4]  
Engelfriet Arnoud, 2004, ELLIPTIC CURVE CRYPT
[5]  
FIPS. 46-3 'Data Encryption Standard Federal Information Processing Standard (FIPS), 1999, USITC PUBL
[6]  
George S., ETHINKING E COMMERCE
[7]  
Gerard J., 2005, NEALON MASTERS PROJE
[8]  
Ghosh A. P., 1998, E COMMERCE SECURITY
[9]   A framework for analyzing e-commerce security [J].
Kesh, Someswar ;
Ramanujan, Sam ;
Nerur, Sridhar .
Information Management and Computer Security, 2002, 10 (04) :149-158
[10]  
Menezes A., 1996, HDB ELG TYP SIGN SCH