Affiliation:
1. Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Nasiriyah 64001, Iraq
Abstract
Electronic-commerce (e-commerce) has become a provider of distinctive services to individuals and companies due to the speed and flexibility of transferring orders and completing commercial deals across far and different places. However, due to the increasing attacks on penetrating transaction information or tampering with e-commerce requests, the interest in protecting this information and hiding it from tamperers has become extremely important. In addition, hacking these deals can cause a huge waste of money and resources. Moreover, large numbers of connected and disconnected networks can cause significant disruption to the built-in security measures. In this paper, we propose to design a protocol to protect transaction information based on ElGamal, advanced encryption standard (AES) and Chinese remainder theorem (CRT) techniques. In addition, our protocol ensures providing scalability with high-performance security measures. We combine these algorithms with a robust methodology that supports the balance of performance and security of the proposed protocol. An analysis of our results proves that our protocol is superior to existing security protocols.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference42 articles.
1. Florea, N., Ionescu, C., Duică, M., ăpusneanu, S., Paschia, L., Stanescu, S.D., and Coman, M. (2022). Trends and perspectives of Romanian e-commerce sector based on mathematical simulation. Electronics, 11.
2. Cyber security threats: A never-ending challenge for e-commerce;Liu;Front. Psychol.,2022
3. Secure e-commerce scheme;Cebeci;IEEE Access,2022
4. Muhajjar, R., Flayh, N., and Al-Zubaidie, M. (2023). A perfect security key management method for hierarchical wireless sensor networks in medical environments. Electronics, 12.
5. Efficient and secure ECDSA algorithm and its applications: A survey;Zhang;Int. J. Commun. Netw. Inf. Secur. (IJCNIS),2019
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献