An embedded DSP hardware encryption module for secure e-commerce transactions

نویسندگان

  • Jiankun Hu
  • Xuan Dau Hoang
  • Ibrahim Khalil
چکیده

Cryptography is one of the key elements in providing security for modern e-commerce systems. It is well known that software-based encryption has built-in security weaknesses due to storing and managing digital certificates/keys in a highrisk environment such as a local hard disk or software. This makes embedded hardware encryption a superior solution. However, most existing embedded hardware encryption modules need additional dedicated software in order to implement a secure e-commerce application, which increases cost as well as adds complexity. In this paper, a new embedded hardware DSP (digital signal processor) encryption module, using the RSA (Rivest, Shamir, and Adleman) algorithm, is developed for secure e-commerce transactions from the client side. The goal is to seamlessly integrate the embedded DSP hardware encryption module, which combines computational power and flexibility in programming, with a widely available web browser that provides the required e-commerce functions. The integrated system can store and process security sensitive data inside the plug-in hardware. The proposed scheme tries to maximize security strength while limiting overheads by utilizing a widely available web browser to perform e-commerce functions such as product searching, etc. A fully functional web e-commerce system has been developed as a proof of concept. Our major contribution is a design of a functional RSA plug-in encryptor which can store and encrypt sensitive information originated from the e-commerce process using standard web browsers. Implementation details addressing challenging issues such as big integer, large message, and communication components have been provided which have never been reported in the public literature. This can be very useful for real-life industry security applications. Copyright © 2010 John Wiley & Sons, Ltd.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DSP application in e-commerce security

This is a case study on using DSP board to construct an encryption/decryption module embedded in a E-Commerce web server. The idea of using DSP is to push beyond the key length limits of encryption/decryption algorithms and computational power in software environment while avoiding the heavy investment in dedicated hardware encryptor/encryptor. The low cost, high computational power, high flexi...

متن کامل

Securing Electronic Transactions to Support E-Commerce

Many reports regarding online fraud in varieties media create skepticism for conducting transactions online, especially through an open network such as the Internet, which offers no security whatsoever. Therefore, encryption technology is vitally important to support secure e-commerce on the Internet. Two well-known encryption representing symmetric and asymmetric cryptosystems as well as their...

متن کامل

Dynamically Evolvable Hardware-software Co-design Based Crypto System through Partial Reconfiguration

Cryptography establishes a secure channel for data communication between sender and receiver. Nowadays, millions of online transactions happen in seconds throughout the world like trading, banking, e-commerce, and social networking etc., exchanges data among users. Evolution in internet led to increase in number of hackers, cyber attacks over network, network security has become a major issue i...

متن کامل

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2011