Loading…

Enhancement of e-commerce security through asymmetric key algorithm

Electronic commerce offers reduced transaction costs and much convenient mode of business to all over global consumers. This paper explains asymmetric methods which uses electronic commerce transactions and other assisted algorithms of cryptography that are important in set up of electronic commerce...

Full description

Saved in:
Bibliographic Details
Published in:Computer communications 2020-03, Vol.153, p.125-134
Main Authors: P., Dijesh, Babu, SuvanamSasidhar, Vijayalakshmi, Yellepeddi
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Electronic commerce offers reduced transaction costs and much convenient mode of business to all over global consumers. This paper explains asymmetric methods which uses electronic commerce transactions and other assisted algorithms of cryptography that are important in set up of electronic commerce working. This study explains the essential security problems in electronic commerce. To avoid the issues of security certain secure conditions must be followed which offers sufficient security to transaction data for every entity in transaction of electronic commerce. In this study a multi-layer encryption algorithm namely RSA encryption algorithm and Fernet cipher encryption algorithm is proposed based on security. Multi-layer encryption algorithm is used to construct a sophisticated and complex approach of encryption. This algorithm integrates the strength of several techniques of encryption at the same time. This study reveals how much safe consumer and payment data order will be managed effectively by security-based approaches. Encryption technique discussed in this study is the major technique to make the transaction over internet secure. A better technology of encryption can decrease the fraudlent activities easily and effectively. This study proposes a multi-layer encryption algorithm and implemented it in order to enable delivery of messages through network in a secure way. This study will be helpful to control the decryption and encryption with the use of private and public key of receiver and sender.
ISSN:0140-3664
1873-703X
DOI:10.1016/j.comcom.2020.01.033