Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle

نویسنده

  • Viswanathan Kodaganallur
چکیده

oday almost all organizations use the Internet extensively for both intraand inter-organizational communications. The Internet is also the exclusive vehicle for E-commerce transactions involving customers and other business partners. This eliminates the significant infrastructure costs of private data communications networks and enables even small companies to participate in E-commerce. However, extensive use of public media for transferring sensitive data poses serious security challenges. One of the main weapons in overcoming these challenges is public key cryptography. Although public key cryptography is extensively used today, relatively few people (managerial and technical) understand its essence, preferring to leave that to the specialists. Although the intricate technical details are best left to the specialists, a solid understanding of the broad picture is necessary and well within the reach of everyone. This article sets out to convey just such an understanding. BASICS OF SECRET COMMUNICATIONS Perfectly secure communication is impossible in theory. It is always a possibility for any message to fall into the wrong hands. The practical approach is to reduce the likelihood of this happening to acceptably small levels. Nowadays encryption is the main approach to keeping communications secret. A message being communicated ( plaintext ) is encrypted in such a way that the encrypted message ( ciphertext ) can be understood only if it is decrypted. Clearly, the message is secret only to the extent that decrypting the ciphertext is difficult. A message can be encrypted in several ways. A procedure to encrypt a message is called a cipher . A trivial (and not very secure) example of a cipher is one that reverses the characters in a message. The recipient of the message, if aware of how the message has been encrypted, can decrypt it by reversing the characters in the ciphertext to recreate the plaintext. Another example is a substitution cipher, which works by substituting each character T CR YPTOGRAPHY

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review on Multi Level Identity Based Cryptography for Secure Digital Signature Authentication

Digital Signature authentication is widely used mechanism to transfer sensitive information over networks securely. Digital signature is an electronic signature used for authentication of identity of parties in applications like E-commerce which are frequently involved in monetary transactions. Identity based cryptography can secure digital signature authentication besides ensuring integrity, c...

متن کامل

Secure Communication: A Proposed Public Key Watermark System

The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integri...

متن کامل

A Novel Digital Envelope Approach for A Secure E-Commerce Channel

Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channels. To deal with these anxieties, various security etiquette related to symmetric and asymmetric key types have been framed. Digital Envelope is one of the practices to attain Privacy, Authentication, Integrity mainten...

متن کامل

A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography

The way people do the business and transactions are changing drastically with the advent of Information Technology. The customer wants to access information, goods and services any time and in any place on his mobile device. Receiving financial data, trade on stock exchanges, accessing balances, paying bills and transfer funds using SMS are done through mobile phones. Due to involvement of valu...

متن کامل

Trust and Public Key Infrastructure

In the current rocket-speed growing E-commerce market, certain infrastructure, which enables users to exchange information and money securely over the Internet, is essential. Unfortunately, Internet is mere a cloud of connections of nodes. There is no organization to operate and manage. So the Internet itself is not responsible for any malicious frauds and attacks, and failures caused by reliab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Systems Security

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2006