IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm

A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm
View Sample PDF
Author(s): Byung Kwan Lee (Kwandong University, Republic of Korea), Seung Hae Yang (Kwandong University, Republic of Korea)and Tai-Chi Lee (Saginaw Valley State University, USA)
Copyright: 2008
Pages: 15
Source title: Information Security and Ethics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Hamid Nemati (The University of North Carolina at Greensboro, USA)
DOI: 10.4018/978-1-59904-937-3.ch049

Purchase

View A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm on the publisher's website for pricing and purchasing information.

Abstract

Unlike SET (Secure Electronic Transaction) protocol, this paper proposes a SEEP (Security Enhanced Electronic Payment) protocol, which uses ECC (Elliptic Curve Cryptosystem with F2m not Fp) (Koblitz, 1987; Harper, Menezes, & Vanstone, 1993; Miller, 1986), SHA (Secure Hash Algorithm), and 3BC (Block Byte Bit Cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC and HECC (Hyper Elliptic Curve Cryptosystem) are used in 3BC (Cho & Lee, 2002; Cho, Shin, Lee, & Lee, 2002) algorithm, which generates session keys for the data encryption. In particular, when ECC and HECC are combined with 3BC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the 3BC algorithm in this paper, the processing time is reduced substantially. In addition, the use of multiple signatures has some advantages, such as reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom