ArticlePDF Available

JSSecure: A Secured Encryption Strategy for Payment Gateways in E-Commerce

Authors:

Abstract

JSSecure is a framework for online payment systems over e-commerce websites. Payments made online using debit/credit cards have become familiar, and the users are shifting to a higher comfort level with this method of payment. Nowadays for any online transactions, a payment gateway is used which is a service that is provided by an e-commerce or by any bank that authorizes the details of the user for the secure transaction. This paper presents a frame format of JSSecure. For any transaction, there has to be a way in which the user details needs to be protected. Cryptography is one of the methods which is used for converting the information from its standard form to encrypted form or unreadable for the attackers. Using JSSecure, each user detail is encrypted individually to provide extra security against attackers. There are umpteen number of payment gateway methods like 3D Secure, SET, and MSET Protocols. Various algorithms help user securely enter his/her card details, some of them are Jumbling Salting (JS), Data Encryption Standard (DES), Advanced Encryption Standard (AES), etc. which are used for the encrypting the details securely. All these algorithms are symmetric key. JSSecure uses double encryption strategy for more security. We will be providing a fair comparison of Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Jumbling Salting (JS) algorithms. Since our major concern here is the performance of algorithms under different conditions, we will be comparing on the basis of speed, block size, and key size on the encryption time, decryption time, throughput and size of cipher text. This analysis will help in implementing the best-suited algorithm for the proposed payment gateway. It will be open source and hence it will be more cost efficient.
Copyright © 2017 Ramkrishna Oruganti et al. This is an open-access article
distributed under the terms of the Creative Commons Attribution License 4.0,
which permits unrestricted use, distribution, and reproduction in any medium,
provided the original author and source are credited.
Circulation in Computer Science
Vol.2, No.5, pp: (13-17), June 2017
https://doi.org/10.22632/ccs-2017-252-17
JSSecure: A Secured Encryption Strategy for
Payment Gateways in E-Commerce
Ramkrishna Oruganti
Computer Engineering,
SVKM’s NMIMS Mukesh Patel
School of Technology
Management and Engineering,
Mumbai, India.
Saurabh Shah
Computer Engineering,
SVKM’s NMIMS Mukesh Patel
School of Technology
Management and Engineering,
Mumbai, India.
Yohan Pavri
Computer Engineering,
SVKM's NMIMS Mukesh Patel
School of Technology
Management and Engineering,
Mumbai, India.
Neelansh Prasad
Computer Engineering,
SVKM’s NMIMS Mukesh Patel School of
Technology Management and Engineering,
Mumbai, India.
Prathamesh Churi
Assistant Professor, Computer Engineering,
SVKM's NMIMS Mukesh Patel School of
Technology Management and Engineering,
Mumbai, India.
ABSTRACT
JSSecure is a framework for online payment systems over e-
commerce websites. Payments made online using debit/credit
cards have become familiar, and the users are shifting to a
higher comfort level with this method of payment. Nowadays
for any online transactions, a payment gateway is used which
is a service that is provided by an e-commerce or by any bank
that authorizes the details of the user for the secure
transaction. This paper presents a frame format of JSSecure.
For any transaction, there has to be a way in which the user
details needs to be protected. Cryptography is one of the
methods which is used for converting the information from its
standard form to encrypted form or unreadable for the
attackers. Using JSSecure, each user detail is encrypted
individually to provide extra security against attackers. There
are umpteen number of payment gateway methods like 3D
Secure, SET, and MSET Protocols. Various algorithms help
user securely enter his/her card details, some of them are
Jumbling Salting (JS), Data Encryption Standard (DES),
Advanced Encryption Standard (AES), etc. which are used for
the encrypting the details securely. All these algorithms are
symmetric key. JSSecure uses double encryption strategy for
more security. We will be providing a fair comparison of Data
Encryption Standard (DES), Advanced Encryption Standard
(AES) and Jumbling Salting (JS) algorithms. Since our major
concern here is the performance of algorithms under different
conditions, we will be comparing on the basis of speed, block
size, and key size on the encryption time, decryption time,
throughput and size of cipher text. This analysis will help in
implementing the best-suited algorithm for the proposed
payment gateway. It will be open source and hence it will be
more cost efficient.
Keywords
JSSecure, Payment Gateway, E-Commerce, Cryptography,
Jumbling Salting, Encryption
1. INTRODUCTION
“Safety first is safety always”, this quote from Charles Hayes
has a profound meaning in today’s digital world. As
technology rises security and safety of data is of paramount
importance. Anyone using technology must ensure that their
data is secure and safe from unauthorized use.
Payment gateway is a mediator between the bank, merchant
and the user. With the rise in technology and its user base, E-
payments are a common practice. The user enters his card
details, CVV number and expiry date which in turn is
encrypted by the payment gateway and sent to the bank. The
bank decrypts the user details, matches it with its database and
proceeds with the transaction. The payment gateway is a
secure mediator.
Figure 1. Working of Payment Gateway
The main idea behind securing data is encrypting it so that
attackers cannot access the sensitive data for unauthorized use.
Some algorithms that are used for encrypting the user details
are JS (Jumbling and Salting) [2,12], DES (Data Encryption
Standard) [1, 6], AES (Advanced Encryption Standard), etc.
These algorithms use symmetric key encryptions [1, 5, 6] i.e.
the same key is used to encrypt and decrypt the data. These
algorithms require frequent update of the key used which is
tedious to maintain. An overview and comparison of these
algorithms is presented in this paper. We have compared the
algorithms based on the following parameters: Cipher text
Size, Encryption Time, Decryption Time and Throughput [2].
We have proposed a new way to ensure security of
transactions by using JSSecure. JSSecure is designed in such a
way that it uses double encryption for securing the user details
from the attacks. It is based on the Jumbling-Salting algorithm
which is a symmetric key algorithm [2]. JS is based on two
steps first Jumbling and then Salting. During Jumbling process
Circulation in Computer Science, Vol.2, No.5, pp: (13-17), June 2017
www.ccsarchive.org
14
it undergoes three sub processes i.e. addition, selection and
reversing. During addition it calculates and generates a value
that needs to be added to the password. In selection it
randomly chooses the symbols and adds them to the string. In
reversal it reverses the new string of password that is formed.
In Salting process the jumbled string is taken as input and
some salt is added to it. The JS Algorithm uses randomized
processes which make the data even more secure by making it
difficult for attackers to predict the plaintext [2].
In this paper we have proposed JSSecure, a new strategy for
online transactions. We have also presented a comparison
between some of the existing algorithms and the JS algorithm.
2. RELATED WORK
2.1. Existing Algorithms
Any kind of information or data that is translate into a secret
code is encryption. It is one of the most effective way to
achieve security. To decrypt that data one must have access to
its secret key for decryption. The data that is not encrypted is
Plain Text and the data which is encrypted is called Cipher
Text.
2.1.1 DES
The Data Encryption Standard (DES) [1] is one of the oldest
algorithms that was used for encryption. It uses symmetric key
encryption strategy. For encryption and decryption it uses the
same key so the sender and receiver should have that key for
encrypting and decrypting.
It was introduced in the early 1970’s. It is a block cipher which
means that the encryption is applied to different blocks of data
rather than applying to just 1 bit at a time. DES uses the block
size of 64-bit. Each block is enciphered by applying
mathematical function i.e. permutation and substitution
permutation involves 16 rounds and though the key is 64-bit 8
keys are used for parity check so only 56 bits are effective. The
decryption process is also simple in which we inverse the
encryption. The steps are same as encryption but the order is
reversed in which keys are applied [1, 2].
Now one of the basic attacks that is observed for any cipher
text is Brute Force attack. In this kind of attack the right key is
obtained by trying all the possible keys. DES uses 64bit key
[5] but out of 64, 8 are used for parity check and thus left with
56 effective bits. Hence it would take 2^56 attempts by brute
force attack for finding out the correct key.
2.1.2 AES
The major problem observed with DES was its key size and
how it could be cracked by repetitive attacks. Advanced
Encryption Standard (AES) [1, 6] was designed to overcome
this drawback. It is one of the most popular and widely used
encryption strategy.
AES is an iterative algorithm. It is based on substitution,
permutations and linear transformations. Each of these
operations occurs in a single round. The plaintext is encrypted
a number of times based on the key size. For 128-bit key it
uses 10 rounds, for 192-bit 12 rounds and for 256-bit 16
rounds [1, 5, 6]. Each of the rounds uses a different key for
encryption of data.
The flow chart below shows the typical processes involved in
one round of the AES algorithms. Initially the plaintext is
encrypted with the first round key [1, 9]. There are 4 sub
processes [9] involved:
Figure 2. Block Diagram od AES Algorithm
i)SubBytes: This step performs the substitution of bytes by
looking up a fixed S-Box table. The S-Box is typically is
Rijndael S-Box. This provides non-linearity to the cipher. The
output of this step is a 4x4 matrix.
ii)ShiftRows: Each of the rows in the matrix is shifted to the
left. Each byte in the rows is shifted by some offset. The first
row is unchanged. The second row is shifted one position to
the left. The third row is shifted two positions and the final row
is shifted three positions. The output is a matrix with same
bytes but different positions with respect to each other.
iii)MixColumns: Each column is transformed using a
mathematical function. The four bytes in each column are
replaced by four new bytes. The output is a matrix with 16
new bytes. This step is not performed in the last round of the
algorithm.
iv)AddRoundKey: The 16 bytes of the matrix are considered
as 128 bits and another round is started with the same sub
processes. If it is the last round then the output is the
ciphertext.
2.1.3 JS Algorithm:
The Jumbling and Salting (JS) [2] is an algorithm which uses a
symmetric key encryption technique. It is implemented with
the AES i.e. Advanced Encryption Standard. the algorithm is
divided into two blocks that is jumbling block and Salting
block [2].
Jumbling block consists of three other sub blocks: Addition,
Selection and Reverse sub blocks [2]. A mathematical process
is performed on the process array which is given to the
jumbling block. Now as the process array is given to the
jumbling block the mathematical function modulus performs
some operation that is the characters from the character set is
chosen and jumbled. With the help of the modulus function the
remainder is obtained by the division process.
During the addition process the random value is generated and
the size of the process array is updated. So if the size of the
process array was i then the updated size will be i+ (random
value generated). In the selection process random characters
are chosen from the defined character set. The selection of the
character depends on the random value that was generated
Circulation in Computer Science, Vol.2, No.5, pp: (13-17), June 2017
www.ccsarchive.org
15
during the addition process. In the reverse process the entire
string or the process array is reversed. The reversing process is
done on the basis of a predefined mathematical condition [2].
Here the mathematical condition is that if the generated value
is even then the reversal process takes place but if the
generated value is odd then the process array remains as it was
after the selection process. The mathematical condition can be
changed as per the requirement of the application programmer
who is developing the JS algorithm [2].
Now the process array is given to the Salting block in which
the random string is added to the jumbled process array. The
adding of salt is based on the users sign up time stamp value
[2]. The salt is added to confuse the attacks so that it becomes
difficult for the attackers to obtain the original process block.
Now after the Jumbling and Salting is done the process block
is passed to the AES block. In this block the algorithm is
predefined for encryption and decryption [2].
2.1.4 Comparison of AES and JS
Table 1. Computational Complexity values of AES and JS
algorithm
Algorithm
Plain
Text
Cipher
Text
Decryption
Time
AES
16
44
19
33
21
20
20
JS
16
108
28
154
28
130
28
138
28
126
28
Figure 3. Comparsion Graph of JS and AES
Algorithm
2.2. Protocols
2.2.1 SET Protocol:
The Secure Electronic Transaction (SET) [7, 8] Protocol is the
most widely used protocol for transactions over an insecure
channel. The SET Protocol consists of 3 main parties:
customer, merchant and merchant’s bank. Digital Certificates
are employed by the SET Protocol to ensure authenticity and
verification of identity of the involved participants [7].
The principle features of the SET Protocol are:
All exchanged information between parties is
encrypted
It is mandatory for all parties to be authenticated
with certificates
The merchant will never see the customer details in
plain text
Figure 4. SET Protocol Working
Stages of SET transaction [3]:
i) Purchase initiate Request message: Wallet → Merchant:
Merchant opens the envelope of the message using his private
key to get the session key SK then the whole message and the
signature are decrypted. The hash of the received message is
compared with the hash of the originally signed message after
decrypting it using the wallet public key.
ii) Purchase initiate response message Merchant → Wallet:
The message contains a unique transaction identification
number, challenging string, and merchant digital certificate.
For the wallet to read and verify this, the public key decryption
algorithm is applied twice, and the symmetric key decryption
is applied once.
iii) Purchase Request message Wallet → Merchant: Purchase
request is a doubly signed message. The wallet partitions the
message into two sub messages. The first one contains the
Order information message where an envelope is created using
Merchant’s public key such that it can only read by Merchant.
The second message contains only the payment information
message and a digital envelope is created using Payment
Gateway’s public key such that it can only read by Payment
Gateway. Each message is signed by the wallet.
iv) Authorization Request message Merchant Payment
Gateway: Merchant sends the second message to the payment
gateway from Purchase request message with envelope using
the Payment Gateway’s public key and adds to it, the
additional information related to his financial institution and
his digital certificate to the Payment Gateway. The money
transfer from the issuer bank to the acquirer bank is done
through Electronic Fund Transfer Network (EFTN) and
Payment Gateway gets notified.
v) Authorization Response message Payment Gateway →
Merchant: After Payment Gateway checks availability, it sends
authorization response to the merchant.
vi) Purchase Response message Merchant → Wallet: After the
merchant gets the authorization from Payment Gateway, he
sends Purchase response message to W and this completes the
protocol. For the wallet to read and verify the message, the
Circulation in Computer Science, Vol.2, No.5, pp: (13-17), June 2017
www.ccsarchive.org
16
public key decryption algorithm is applied twice, and the
symmetric key decryption is applied once.
2.2.2 MSET Protocol:
Using SET protocol on GSM network involves heavy
computation. This slows down the network. To avoid this,
MSET protocol was born. This Modified SET protocol
replaces time consuming public key encryption and decryption
algorithms by symmetric key cryptography. This protocol
claimed about 50% reduction in computation, and 80%
reduction in communication overhead [3]. The protocol uses
the Transport Layer Security Protocol (TLS) and the Wireless
TLS (WTLS) in lower layers to reduce the number of required
signature generations within the protocol.
MSET keeps the privacy of the payment information of Wallet
away from Merchant and keeps the privacy of the order
information of Wallet away from the Payment Gateway.
MSET enables the Payment Gateway to verify that Merchant
does not alter the Purchase Request message during its
processing at Merchant. The only critical assumption made is
that the Payment Gateway is a Trusted Third Party.
MSET protocol replaces public key encryption by symmetric
key encryption. It is a two-step process. In step 1, the three
parties exchange their digital certificates. Three symmetric
keys are generated and exchanged. We assume that each party
has a lookup table that includes the digital certificate of all the
other parties associated with their symmetric keys.
The second step is the transaction step, which like the SET
protocol involves 6 steps. They perform the same task as SET,
only, they utilize symmetric ley encryption.
i) Purchase initiate Request message: Wallet → Merchant
ii) Purchase initiate response message Merchant → Wallet
iii) Purchase Request message Wallet → Merchant
iv)Authorization Request message Merchant → Payment
Gateway
v) Authorization Response message Payment Gateway →
Merchant
vi) Purchase Response message Merchant → Wallet
The above calculations show the improvement of MSET over
SET protocol.
Table 2. Literature Cited for SET and MSET protocol
Sr No.
Name
Limitations
Inferences
1
SET
It requires heavy
computation over
wireless networks
which slows down the
overall performance.
Adapting systems to
work with SET is
more complicated
The customer must
have a valid digital
certificate
The interacting
parties must be
isolated from
each other
Each party
must be able to
authenticate
itself with a
valid digital
certificate from
certificate
authority
Adaptation of
the protocol to
all systems is
key for it to be
a standard
2
MSET
Uses Symmetric key
encryption which is
considered to be less
secure as compared to
asymmetric.
A dishonest client can
buy goods from a
merchant without
paying the actual
price of the good.
MSET protocol uses a
certificate, having no
use once the
symmetric key is
distributed. This
causes
communication
overhead for the
mobile application.
As a result, the
protocol will be useful
only for mobiles with
high processing
power. This
contradicts its
assumption of being a
more viable
alternative.
The MSET protocol
does not provide the
non-repudiation
property which is
critical for any
transaction.
In MSET protocol the
payment gateway
does not verify
whether the payment
message sent by the
customer is genuine
one or not. Hence, the
customer can pay less
and get away without
it being a flawed
transaction.
The computational
time calculate for SET
and MSET were
shown to be highly
apart with SET having
a huge advantage.
Since during
calculations, the
computational time
for session key
generation and
distribution was
ignored, the
computational time of
has come very close
to that of SET. Here,
the improvement is
not as drastic as
shown to be.
Using a
combination of
symmetric and
asymmetric
keys is
important to
achieve a vastly
secure
algorithm.
Non-
Repudiation is a
key property to
avoid
fraudulent
transactions.
A payment
mediator must
have a balance
between
security and
backend
computation to
find any
application.
Amongst the
interacting
parties, none
can be
considered as
secure and be
ignored from a
proper check.
Circulation in Computer Science, Vol.2, No.5, pp: (13-17), June 2017
www.ccsarchive.org
17
3. PROPOSED WORK
JSSecure is a payment gateway that uses Jumbling and Salting
Algorithm for encrypting the user details. It is a symmetric key
encryption strategy. JSSecure is a payment gateway that is
more secure as it uses double encryption technique. In double
encryption the user details are encrypted and after the JS
Algorithm has encrypted the process array it again encrypts
that jumbled process array. The JS algorithm is implemented
with the RSA for better security. So that the asymmetric
encryption technique will be more efficient and it will be more
secure as it uses public key encryption strategy.
Figure 5. JSSecure Blocks
We intend to increase the cipher text to a limit where it is
impossible to crack for the attackers using brute force attack or
dictionary attack. The advantage of the JS algorithm is that is
uses random length variable to encrypt the plain text so the
cipher text varies every time. Adding to this the double
encryption strategy boosts the overall security of the system.
4. CONCLUSION AND FUTURE WORK
The rise of E-commerce has led to the development and
demand of sophisticated payment gateways. What we are
doing with JS Secure is creating an Encryption algorithm
which is better suited for the task at hand by using a symmetric
double encryption algorithm. It is better at performance than
the other already existing algorithms and more secure because
of the large cypher text used which protects it from cyber-
attacks using brute force or others. As security is our utmost
priority much thought and working has been dedicated towards
it. The algorithm is just a part of the payment gateway created.
One of its major functions is that it can be integrated
seamlessly with your website without the need for specialized
coding knowledge, which is what clients look at when they
specifically mean a payment gateway.
The Payment Gateway is up to the current security standards
and it is implemented in such a way that in future also no
problems will take place, however if such an exception takes
place We can update our work, it is flexible enough to be
updated up to the future standards.
5. REFERENCES
[1] Ramesh, Archana, and A. Suruliandi. "Performance
analysis of encryption algorithms for Information
Security." Circuits, Power and Computing Technologies
(ICCPCT), 2013 International Conference on. IEEE,
2013.
[2] Churi, Prathamesh P., Vaishali Ghate, and Kranti Ghag.
"Jumbling-Salting: An improvised approach for
password encryption." Science and Technology (TICST),
2015 International Conference on. IEEE, 2015.
[3] Shedid, Sabrina M., and Mohamed Kouta. "Modified
SET protocol for mobile payment: an empirical
analysis." Software Technology and Engineering
(ICSTE), 2010 2nd International Conference on. Vol. 1.
IEEE, 2010.
[4] Abdel-Hamid, Ayman, Ossama Badawy, and Shreif
Bahaa. "PA-SET: privacy-aware SET protocol."
Computer Theory and Applications (ICCTA), 2012 22nd
International Conference on. IEEE, 2012.
[5] Elminaam, Diaa Salama Abdul, Hatem Mohamed Abdul
Kader, and Mohie Mohamed Hadhoud. "Performance
evaluation of symmetric encryption algorithms." IJCSNS
International Journal of Computer Science and Network
Security 8.12 (2008): 280-286.
[6] Nadeem, Aamer, and M. Younus Javed. "A performance
comparison of data encryption algorithms." Information
and communication technologies, 2005. ICICT 2005.
First international conference on. IEEE, 2005.
[7] Guan, Hong-Jun. "The research of SET-based electronic
payment system model." E-Business and Information
System Security, 2009. EBISS'09. International
Conference on. IEEE, 2009.
[8] Zihao, Shen. "An improved SET protocol payment
system." 2010 International Conference on Computer
and Communication Technologies in Agriculture
Engineering.
[9] Yang, Zi-Heng, et al. "An Improved AES Encryption
Algorithm Based on Chaos Theory in Wireless
Communication Networks." Robot, Vision and Signal
Processing (RVSP), 2015 Third International Conference
on. IEEE, 2015.
[10] Zhang, Xuewang, and Linlin Wang. "Key technologies
for security enhancing of payment gateway." Electronic
Commerce and Security, 2008 International Symposium
on. IEEE, 2008.
[11] Kurniawan, Daniar Heri, and Rinaldi Munir. "Double
Chaining Algorithm: A secure symmetric-key encryption
algorithm." Advanced Informatics: Concepts, Theory
And Application (ICAICTA), 2016 International
Conference On. IEEE, 2016
[12] Churi, P., Kalelkar, M. and Save, B., 2014. JSH
Algorithm: A Password Encryption Technique using
Jumbling-Salting-Hashing. International Journal of
Computer Applications, 92(2).
CCS | 2017 | ISSN 2456-3692
Published by: CSL Press, USA
... According to Julian Assange [1] cryptography is the ultimate form of non-violent direct action. Cryptography is the process of encrypting data into some confusion form before transmission. ...
... • SET Protocol requires [1,7,10] heavy computation over wireless networks which slows down the overall performance. ...
... • Adapting systems to work with SET is more complicated and a valid digital certificate is must for the [1,7,10] customer. ...
... A lesser-known algorithm known as the Jumbling-Salting (JS) encryption algorithm, which is based on the concept of randomization, has been used to encrypt passwords (Churi et al., 2014;Churi et al., 2015), electronic transactions (Oruganti et al., 2017;Prasad et al., 2018), DNS (Harsh et al., 2018), text files (Bali et al., 2018) and images (Vartak et al., 2019). As the algorithm uses the concept of randomization at every stage, it performed decently well in providing security and made the data less susceptible to attacks; hence, it was proposed to be used for file encryption in the cloud environment and the conceptualized algorithm was known as CloudJS (Gupta et al., 2020). ...
... The encryption and decryption throughput were marginally lower as compared to AES. In Oruganti et al. (2017), JS Algorithm was used to encrypt electronic transactions. It was used as an alternative to the AES algorithm commonly used in the SET protocol (Prasad et al., 2018). ...
Article
Full-text available
Purpose Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and applications that can be quickly retrieved and released. Despite its numerous merits, it faces setbacks in data security and privacy. Data encryption is one of the most popular solutions for data security in the cloud. Various encryption algorithms have been implemented to address security concerns. These algorithms have been reviewed along with the Jumbling Salting algorithm and its applications. The framework for using Jumbling Salting to encrypt text files in the cloud environment (CloudJS) has been thoroughly studied and improvised. The purpose of this paper is to implement the CloudJS algorithm, to discuss its performance and compare the obtained results with existing cloud encryption schemes. Design/methodology/approach The paper uses six research questions to analyze the performance of CloudJS algorithm in the cloud environment. The research questions are about measuring encryption time and throughput, decryption time and throughput, the ratio of cipher to the plain text of CloudJS algorithm with respect to other Cloud algorithms like AES and DES. For this purpose, the algorithm has been implemented using dockers-containers in the Linux environment. Findings It was found that CloudJS performs well in terms of encryption time, decryption time and throughput. It is marginally better than AES and undoubtedly better than DES in these parameters. The performance of the algorithm is not affected by a number of CPU cores, RAM size and Line size of text files. It performs decently well in all scenarios and all resultant values fall in the desired range. Research limitations/implications CloudJS can be tested with cloud simulation platforms (CloudSim) and cloud service providers (AWS, Google Cloud). It can also be tested with other file types. In the future, CloudJS algorithm can also be implemented in images and other files. Originality/value To the best of the knowledge, this is the first attempt to implement and analysis of a custom encryption algorithm (CloudJS) in the cloud environment using dockers-containers.
... C. Improvised E-commerce transaction security using JS Secure Algorithm [12] Security is a must and one of the key prioritized elements in an online transaction. To maintain this priority, various protocols and encryption algorithms are used. ...
... Initially, the Jumbling-salting algorithm was used for passwords [10,11], DNS Encryption [12], Payment gateway [13]. The random nature of jumbling salting algorithm proved that security is ubiquitous in nature. ...
... Both dealers and cardholders must firstly enrol with the Certificate Authority for selling or buying online. After the enrolment procedure is finished, the vendor and cardholder will begin trying dealings, which entail 9 basic stages of this easy procedure [15]. ...
Article
Full-text available
Cryptanalytic innovations are considered the most economical and useful method for guaranteeing information security across shared networks. Despite the tinier key magnitude of Elliptic Curve Cryptography (ECC) compared to common cryptanalysis schemes, the majority of scholars have employed cryptanalysis methods to deliver data reliability and verification. Besides, the computation attempt needed by Diffie Hellman-Elliptic Curve (DH-EC) for equal key dimensions is similar and delivers extra security advantages. The research offers a novel key arrangement procedure using DH-EC in the secure automatic transactions (SAT) setting (DHEC-SAT) to enhance data safety. The DHEC-SAT procedure effectively applied the keys in the SAT setting for online payment and was employed to decode and encode the validation data. The DHEC-SAT procedure is implemented for an entry of e-commerce payments to deliver great-degree security examination, fast verification, and the safety of the suggested Cryptanalytic scheme. The suggested DHEC-SAT generates highly secure systems regarding data size (168 bytes), computational period (4.34 ms), and communication costs (1271 bits), as contrasted to extant ECC procedures and PIN-enabled key arrangements.
... Keuntungan dari algoritma JS adalah menggunakan variabel panjang acak untuk mengenkripsi teks biasa sehingga teks sandi bervariasi setiap saat. Selain itu, strategi enkripsi ganda meningkatkan keamanan sistem secara keseluruhan [13]. ...
Article
Full-text available
Sistem pembayaran elektronik telah menjadi semakin populer dalam beberapa tahun terakhir, dengan banyak orang beralih dari metode pembayaran tradisional seperti uang tunai dan cek. Namun, ini juga menimbulkan tantangan dalam hal keamanan informasi, karena transaksi yang dilakukan melalui sistem pembayaran elektronik rentan terhadap serangan siber. Artikel ini membahas tren keamanan informasi dalam sistem pembayaran elektronik, dengan fokus pada teknologi enkripsi dan blockchain. Teknologi enkripsi digunakan untuk mengamankan data yang ditransmisikan di antara pengguna dan penyedia layanan pembayaran. Algoritma enkripsi yang aman, seperti AES, dapat digunakan untuk mengenkripsi informasi sensitif, sehingga hanya pengguna yang memiliki kunci enkripsi yang tepat yang dapat membuka dan membaca informasi tersebut. Di sisi lain, teknologi blockchain digunakan untuk memastikan integritas transaksi dan menghindari penipuan dalam sistem pembayaran elektronik. Algoritma kriptografi seperti SHA-256 digunakan untuk mengamankan transaksi dan memastikan bahwa informasi yang ditambahkan ke blockchain tidak dapat dimanipulasi. Meskipun kedua teknologi tersebut dapat digunakan untuk meningkatkan keamanan sistem pembayaran elektronik, masing-masing memiliki kelebihan dan kekurangan. Enkripsi dapat membantu melindungi data pengguna dan informasi transaksi, tetapi tidak dapat memastikan integritas transaksi atau menghindari penipuan. Di sisi lain, blockchain dapat membantu mencegah penipuan dan manipulasi transaksi, tetapi tidak secara langsung melindungi data pengguna. Oleh karena itu, implementasi yang tepat dari teknologi keamanan yang sesuai untuk masing-masing kasus harus dipertimbangkan dengan hati-hati untuk meningkatkan keamanan sistem pembayaran elektronik secara keseluruhan.
Book
Tujuan penyusunan buku ini adalah untuk membantu para pembaca, memahami bahwa isi buku ini merupakan bagian tidak terpisahkan dan sangat penting dalam kelangsungan bisnis masa sekarang dan masa yang akan datang. Buku ini berisi materi yang dapat digunakan baik oleh tenaga pengajar maupun mahasiswa, serta para pembaca umumnya untuk menambah wawasan berpikir dan ilmu yang berkenaan dengan Ekonomi dan Bisnis. Buku ini terdiri dari 16 Bab yang membahas tentang: Bab 1 Pengenalan E-Commerce1. Bab 2 Infrastruktur dan Teknologi E-Commerce Bab 3 Model Bisnis E-Commerce: B2B Bab 4 Model Bisnis E-commerce: B2C Bab 5 Bisnis Model E-Commerce C2C Bab 6 Model Bisnis E-Commerce C2B Bab 7 E-Commerce Mobile (M-Commerce) Bab 8 Strategi Pemasaran Digital untuk E-commerce Bab 9 Pengelolaan dan Analitik Data E-Commerce Bab 10 Keamanan Informasi dan Privasi dalam E-Commerce Bab 11 Pengalaman Pengguna (User Experience) dalam E-commerce Bab 12 Pembayaran Online dan Gateway Bab 13 Manajemen Logistik dan Rantai Pasok Dalam E-Commerce Bab 14 E-Commerce dan Media Sosial Bab 15 Peraturan dan Kebijakan E-Commerce Bab 16 Inovasi dan Tren Terkini dalam E-Commerce Buku ini dapat terwujud dan diterbitkan hanya dengan modal semangat kolaborasi yang solid tim penulis yang berasal dari berbagai Perguruan Tinggi dan Instansi. Penyusunan buku ini juga merupakan implementasi Tri Dharma Perguruan Tinggi. Tim Penulis merasakan bahwa dukungan moral dan material dari berbagai pihak sangatlah membantu tersusunnya buku ini. Tim Penulis menyadari jika dalam penyusunan buku ini masih terdapat kekurangan, tetapi Tim Penulis selalu berkenan menerima kritik dan saran yang konstruktif demi penyempurnaan buku ini di kemudian hari. Semoga buku ini bermanfaat bagi para pembaca.
Article
Full-text available
In this paper, secured online digital payment gateway model for e-commerce applications is intended and fabricated. This depicts a real time application scheme on Elliptic Curve Cryptography under the structure of SET protocol, which includes both digital signature and cryptosystem. The novelty in this gateway is dynamic password, which will be generated on again a dynamic PIN, which in turn is initiated by the customer for each transaction. This dynamic password finally completes the transaction. And also, this improvement includes two Confirmation algorithms for implementation of ECC that assures complexity and security. At the end, secure implementation of SET protocol over ECC for online payment gateway is presented, which ensures the validity, confidentiality, integrity and non-repudiation of transaction. Security analysis like attack on DLP, attack on Hash function is also given to strengthen the architecture.
Article
Full-text available
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types ,battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.
Conference Paper
Full-text available
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, the four of the popular secret key encryption algorithms, i.e., DES, 3DES, AES (Rijndael), and the Blowfish have been implemented, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms. The algorithms have been implemented in a uniform language, using their standard specifications, to allow a fair comparison of execution speeds. The performance results have been summarized and a conclusion has been presented. Based on the experiments, it has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation.
Conference Paper
Technology is a key of innovation in any aspect of this modern era. In every technology, data becomes the most important asset to be protected. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across platform. Encryption algorithms are classified into two groups: symmetric-key (also called secret-key) and asymmetric-key (also called public-key). Generally, asymmetric-key encryption is used along side symmetric-key encryption to get the best performance of data transfer. Earlier many researchers have proposed various encryption algorithms such as AES, DES, Blowfish, etc. However, as security level is increasing, the time and complexity of algorithm is also increasing. This is the major cause of decreasing the speed and efficiency of the encryption system. In this paper we have proposed a new encryption algorithm “Double Chaining Algorithm (DCA)” which enhances the security performance. The DCA is a symmetric-key encryption algorithm that uses 128–256 bits key size. This algorithm uses XOR operation for the chaining process so that it has small complexity and can be implemented easily in hardware mode to increase its encryption process. This paper is an attempt to invent a new encryption model which is secure and very fast. The average Avalanche Effect in this algorithm is 0.996 out of 1.00. Moreover, the experiment and analysis result gives further proof of the DCA's strength.
Conference Paper
Information Security has become an important issue in data communication. Encryption algorithms have come up as a solution and play an important role in information security system. On other side, those algorithms consume a significant amount of computing resources such as CPU time, memory and battery power. Therefore it is essential to measure the performance of encryption algorithms. In this work, three encryption algorithms namely DES, AES and Blowfish are analyzed by considering certain performance metrics such as execution time, memory required for implementation and throughput. Based on the experiments, it has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation.
Conference Paper
E-payment is considered a cornerstone in daily e-transactions. There are many proposed e-payment protocols but the majority of such protocols were designed just to satisfy the traditional flow of payment data which increases the users' risk because of security vulnerabilities and privacy leakage. The Secure Electronic Transaction protocol (SET), a de facto standard, is limited in application due to computation overhead and privacy leakage. In this paper, a new privacy-aware SET enhancement is proposed. The SET protocol is enhanced by hiding the payer's identity and providing transaction privacy during the whole e-payment process. Privacy protection is achieved for the payer while incurring acceptable overhead as demonstrated by performance evaluation experiments.
Conference Paper
The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.
Conference Paper
The wide spread of using handheld devices offers an opportunity for mobile devices to be used as a universal payment method. However, some issues impede the widespread acceptance of mobile payment; for example: privacy protection, limited capability of mobile devices, and limited bandwidth of wireless networks. In ecommerce payment, Secure Socket Layer (SSL) protocol has been used to establish a secure channel between customers and merchants to secure the payment and the order information. SSL has some disadvantages regarding customer privacy that the customer payment information is revealed to the merchant. Secure Electronic Transaction (SET) has resolved SSL protocol disadvantages by dividing order message into: 1) order information which is revealed to merchant M, 2) payment information which is revealed to Payment Gateway (PG). Both SSL and SET assume the existence of Public Key Infrastructure (PKI) where extensive computations are carried out. In mobile payment, the same protocols of ecommerce payment are used but their application is limited due to heavy computations over wireless and GSM networks. A Modified Secure Electronic Transaction (MSET) protocol is proposed to minimize the extensive computations of SET protocol through replacing time consuming public key encryption and decryption algorithms by symmetric key cryptography.
Jumbling-Salting: An improvised approach for password encryption
  • Prathamesh P Churi
  • Kranti Vaishali Ghate
  • Ghag
Churi, Prathamesh P., Vaishali Ghate, and Kranti Ghag. "Jumbling-Salting: An improvised approach for password encryption." Science and Technology (TICST), 2015 International Conference on. IEEE, 2015.