An embedded DSP hardware encryption module for secure e-commerce transactions

被引:3
|
作者
Hui, J. [1 ]
Hoang, X. D. [2 ]
Khalil, I. [1 ]
机构
[1] RMIT Univ, Sch Comp Sci & Informat Technol, Melbourne, Vic 3001, Australia
[2] PTIT, Dept Comp Sci, Hanoi, Vietnam
关键词
e-commerce security; RSA encryption; embedded hardware; web browser; ANOMALY INTRUSION DETECTION; SCHEME;
D O I
10.1002/sec.221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is one of the key elements in providing security for modern e-commerce systems. It is well known that software-based encryption has built-in security weaknesses due to storing and managing digital certificates/keys in a high-risk environment such as a local hard disk or software. This makes embedded hardware encryption a superior solution. However, most existing embedded hardware encryption modules need additional dedicated software in order to implement a secure e-commerce application, which increases cost as well as adds complexity. In this paper, a new embedded hardware DSP (digital signal processor) encryption module, using the RSA (Rivest, Shamir, and Adleman) algorithm, is developed for secure e-commerce transactions from the client side. The goal is to seamlessly integrate the embedded DSP hardware encryption module, which combines computational power and flexibility in programming, with a widely available web browser that provides the required e-commerce functions. The integrated system can store and process security sensitive data inside the plug-in hardware. The proposed scheme tries to maximize security strength while limiting overheads by utilizing a widely available web browser to perform e-commerce functions such as product searching, etc. A fully functional web e-commerce system has been developed as a proof of concept. Our major contribution is a design of a functional RSA plug-in encryptor which can store and encrypt sensitive information originated from the e-commerce process using standard web browsers. Implementation details addressing challenging issues such as big integer, large message, and communication components have been provided which have never been reported in the public literature. This can be very useful for real-life industry security applications. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:902 / 909
页数:8
相关论文
共 50 条
  • [1] Secure e-commerce transactions, modeling and implementation aspects
    Tang, J
    Fu, AW
    [J]. SEMANTIC ISSUES IN E-COMMERCE SYSTEMS, 2003, 111 : 53 - 67
  • [2] A Model to Secure E-Commerce Transaction using Hybrid Encryption
    Solanki, Devendra Singh
    Shiwani, Savita
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 642 - 645
  • [3] Certificate-based distributed firewalls for secure e-commerce transactions
    Djordjevic, I
    Phillips, C
    [J]. JOURNAL OF THE INSTITUTION OF BRITISH TELECOMMUNICATIONS ENGINEERS, 2001, 2 : 14 - 19
  • [4] COMPUTER LAW OF TUNISIA: PROMOTING SECURE E-COMMERCE TRANSACTIONS WITH ELECTRONIC SIGNATURES
    Blythe, Stephen E.
    [J]. ARAB LAW QUARTERLY, 2006, 20 (03) : 240 - 267
  • [5] E-commerce transactions in a virtual environment: virtual transactions
    Simon Scarle
    Sylvester Arnab
    Ian Dunwell
    Panagiotis Petridis
    Aristidis Protopsaltis
    Sara de Freitas
    [J]. Electronic Commerce Research, 2012, 12 : 379 - 407
  • [6] E-commerce transactions in a virtual environment: virtual transactions
    Scarle, Simon
    Arnab, Sylvester
    Dunwell, Ian
    Petridis, Panagiotis
    Protopsaltis, Aristidis
    de Freitas, Sara
    [J]. ELECTRONIC COMMERCE RESEARCH, 2012, 12 (03) : 379 - 407
  • [7] Fraud risks in e-commerce transactions
    Wopperer, W
    [J]. GENEVA PAPERS ON RISK AND INSURANCE-ISSUES AND PRACTICE, 2002, 27 (03): : 383 - 394
  • [8] Secure E-Commerce Scheme
    Cebeci, Sena Efsun
    Nari, Kubra
    Ozdemir, Enver
    [J]. IEEE ACCESS, 2022, 10 : 10359 - 10370
  • [9] Intelligent planning of e-commerce transactions
    Bodendorf, F
    Hofmann, O
    [J]. INFORMATION REUSE AND INTEGRATION, 2001, : 36 - 41
  • [10] E-commerce curriculum: is it secure?
    Yee, J
    Maj, SP
    Kohli, G
    [J]. 4TH BALTIC REGION SEMINAR ON ENGINEERING EDUCATION, SEMINAR PROCEEDINGS, 2000, : 58 - 61