Abstract
Unlike SET(Secure Electronic Transaction) protocol. This paper proposes an MSET(Mobile Secure Electronic Transaction) protocol, which consists of ECC (Elliptic Curve Cryptosystem)[1, 2, 3], SHA(Secure Hash Algorithm) and 3BC(Block Byte Bit Cipher). It uses ECC(F2m not Fp) and 3BC instead of RSA and DES respectively. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are used in 3BC [5, 6] algorithm, which generates session keys for the data encryption. In particular, when ECC is combined with 3BC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the 3BC algorithm in this paper, the processing time can be reduced significantly. In addition, the use of multiple signature has some advantages of reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys. Finally, the object component technique in this paper can be used for encryption standardization and reusability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp. 48, 203–209 (1987)
Miller, V.S.: Use of elliptic curve in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Harper, G., Menezes, A., Vanstone, S.: Public-key Cryptosystem with very small key lengths. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 163–173. Springer, Heidelberg (1993)
Ecommercenet, http://www.ezyhealthmie.com/Service/Editorial/set.htm
Cho, I.S., Shin, D.W., Lee, T.C., Lee, B.K.: SSEP (Simple Secure Electronic Payment) Protocol Design. Journal of Electronic and Computer Science 4(1), 81–88 (2002)
Cho, I.S., Lee, B.K.: ASEP (Advanced Secure Electronic Payment) Protocol Design. In: Proceedings of International Conference of Information System, August 2002, pp. 366–372 (2002)
IEEE P1363 Working Draft, Appendices, p. 8, February 6 (1997)
Schneier, B.: Cryptography, security, and the future. Communications of the ACM 40(1), 138 (1997)
Voas, J., Charron, F., McGraw, G., Miller, K., Friedman, M.: Predicting how badly good software can behave. IEEE Software 14(4), 73–83 (1997)
Voas, J., McGraw, G., Ghosh, A., Miller, K.: Gluing together software components: How good is your glue? In: 1996 Proceedings of the Pacific Northwest Software Quality Conference (October 1996)
Voas, J., Michael, C., Miller, K.: Confidently assessing a zero probability of software failure. High Integrity Systems Journal 1(3), 269–275 (1995)
Voas, J., Miller, K.: Predicting software’s minimum-time-to-hazard and mean-time-tohazard for rare input events. In: Proc. of theInt’l Symp. on Software Reliability Eng., Toulose, France, October 1995, pp. 229–238 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, HK., Kim, TH. (2004). Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_57
Download citation
DOI: https://doi.org/10.1007/978-3-540-24707-4_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22054-1
Online ISBN: 978-3-540-24707-4
eBook Packages: Springer Book Archive