An embedded DSP hardware encryption module for secure e-commerce transactions

被引:4
|
作者
Hui, J. [1 ]
Hoang, X. D. [2 ]
Khalil, I. [1 ]
机构
[1] RMIT Univ, Sch Comp Sci & Informat Technol, Melbourne, Vic 3001, Australia
[2] PTIT, Dept Comp Sci, Hanoi, Vietnam
关键词
e-commerce security; RSA encryption; embedded hardware; web browser; ANOMALY INTRUSION DETECTION; SCHEME;
D O I
10.1002/sec.221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is one of the key elements in providing security for modern e-commerce systems. It is well known that software-based encryption has built-in security weaknesses due to storing and managing digital certificates/keys in a high-risk environment such as a local hard disk or software. This makes embedded hardware encryption a superior solution. However, most existing embedded hardware encryption modules need additional dedicated software in order to implement a secure e-commerce application, which increases cost as well as adds complexity. In this paper, a new embedded hardware DSP (digital signal processor) encryption module, using the RSA (Rivest, Shamir, and Adleman) algorithm, is developed for secure e-commerce transactions from the client side. The goal is to seamlessly integrate the embedded DSP hardware encryption module, which combines computational power and flexibility in programming, with a widely available web browser that provides the required e-commerce functions. The integrated system can store and process security sensitive data inside the plug-in hardware. The proposed scheme tries to maximize security strength while limiting overheads by utilizing a widely available web browser to perform e-commerce functions such as product searching, etc. A fully functional web e-commerce system has been developed as a proof of concept. Our major contribution is a design of a functional RSA plug-in encryptor which can store and encrypt sensitive information originated from the e-commerce process using standard web browsers. Implementation details addressing challenging issues such as big integer, large message, and communication components have been provided which have never been reported in the public literature. This can be very useful for real-life industry security applications. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:902 / 909
页数:8
相关论文
共 50 条
  • [31] Secured E-Commerce Transactions Through Choatic Map
    Mohideen, Bremnavas Ismail
    Mahendran, Anand
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [32] Evolving a "Wise'' integration system for e-commerce transactions
    Adiele, Chima
    Ehikioya, Sylvanus A.
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2007, 6 (02) : 219 - 232
  • [33] The application of model checking for securing e-commerce transactions
    Anderson, Bonnie Brinton
    Hansen, James V.
    Lowry, Paul Benjamin
    Summers, Scott L.
    COMMUNICATIONS OF THE ACM, 2006, 49 (06) : 97 - 101
  • [34] Multi-agent cooperative transactions for e-commerce
    Chen, QM
    Dayal, U
    COOPERATIVE INFORMATION SYSTEMS, PROCEEDINGS, 2000, 1901 : 311 - 322
  • [35] Knowledge, Attitude and Practices of Consumers in E-Commerce Transactions
    Abu Bakar, Elistina
    Chang, Lim Li
    Saidin, Aznan Zuhid
    2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M), 2013,
  • [36] SAFE: secure agent roaming for e-commerce
    Guan, SU
    Yang, Y
    COMPUTERS & INDUSTRIAL ENGINEERING, 2002, 42 (2-4) : 481 - 493
  • [37] The Research on Secure Payment System of E-Commerce
    He, Yongqiang
    Wei, Ping
    Shi, Yanrong
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 18 - 21
  • [38] Research on E-Commerce Secure Payment Protocols
    Zhu Jun-xuan
    Wu Zhong
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON PUBLIC ECONOMICS AND MANAGEMENT (ICPEM 2009), VOL 5: STATISTICS AND METHODOLOGY, 2009, : 430 - 433
  • [40] A secure anonymous authorisation architecture for e-commerce
    Au, WKR
    Choo, KKR
    Looi, M
    2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, Proceedings, 2005, : 106 - 111