Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 9 Issue 10, October 2020

Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem

Srishti Sharma

Security of e-commerce transactions is a pre-requisite requirement nowadays as it is being used in almost every day to day lives. Large amounts of information are exchanged between users every time we do some online transaction. Active attacks like eavesdropping / replay attacks are threat to customer's money. Eavesdropping attack is the unauthorized interception of a private communication, such as phone call or message. Hence it is very much important that any good electronic commerce system should guarantee some basic securities such as authenticity, data protection, privacy and integrity. Elliptic curve cryptography (ECC) compared to RSA provides same cryptographic strength but with much shorter key size and also provides moderately fast encryption and decryption. Another issue with e-commerce transactions today is whether the two parties are authenticated. This becomes a weak link and leads to fraud and cyber thefts. To remove the above problem, we combine ECC with ElGamal encryption scheme. In this project, we suggest enhanced security model of cryptographic system using Elgamal encryption scheme with ECC. This mode can be used as a Secured electronic transaction set (SET) . It also gives better security with lesser key size.

Keywords: e-commerce, secured electronic transaction(SET), Elliptic Curve Cryptography (ECC), ElGamal, Diffie Hellman Key Exchange

Edition: Volume 9 Issue 10, October 2020

Pages: 12 - 16

Share this Article

How to Cite this Article?

Srishti Sharma, "Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20927075708, Volume 9 Issue 10, October 2020, 12 - 16

81 PDF Views | 64 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'e-commerce'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 893 - 898

Design New Security Protocol against Online Password Guessing Attacks

Nitin. R. Shinde, S. K. Sonkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2048 - 2051

An Efficient Product Aspect Ranking and its Application: A Review

Shahuraj Patil, Jyoti Raghatwan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Case Studies, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 530 - 534

Cybercrime in "Credit Card Systems": Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

Share this Article

Similar Articles with Keyword 'Elliptic Curve Cryptography ECC'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 203 - 208

Elliptic Curve Cryptography: An efficient approach for encryption & decryption of a data sequence

Ankita Soni, Nisheeth Saxena

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2058 - 2060

Considering Geo-Scattered Big Data in Progressed Schema of Map Reduce

Ashwini R S, Geetha.N.B

Share this Article

Similar Articles with Keyword 'ElGamal'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article
Top