Skip to main content

Design on Mobile Secure Electronic Transaction Protocol with Component Based Development

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Abstract

Unlike SET(Secure Electronic Transaction) protocol. This paper proposes an MSET(Mobile Secure Electronic Transaction) protocol, which consists of ECC (Elliptic Curve Cryptosystem)[1, 2, 3], SHA(Secure Hash Algorithm) and 3BC(Block Byte Bit Cipher). It uses ECC(F2m not Fp) and 3BC instead of RSA and DES respectively. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are used in 3BC [5, 6] algorithm, which generates session keys for the data encryption. In particular, when ECC is combined with 3BC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the 3BC algorithm in this paper, the processing time can be reduced significantly. In addition, the use of multiple signature has some advantages of reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys. Finally, the object component technique in this paper can be used for encryption standardization and reusability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp. 48, 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  2. Miller, V.S.: Use of elliptic curve in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  3. Harper, G., Menezes, A., Vanstone, S.: Public-key Cryptosystem with very small key lengths. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 163–173. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  4. Ecommercenet, http://www.ezyhealthmie.com/Service/Editorial/set.htm

  5. Cho, I.S., Shin, D.W., Lee, T.C., Lee, B.K.: SSEP (Simple Secure Electronic Payment) Protocol Design. Journal of Electronic and Computer Science 4(1), 81–88 (2002)

    Google Scholar 

  6. Cho, I.S., Lee, B.K.: ASEP (Advanced Secure Electronic Payment) Protocol Design. In: Proceedings of International Conference of Information System, August 2002, pp. 366–372 (2002)

    Google Scholar 

  7. IEEE P1363 Working Draft, Appendices, p. 8, February 6 (1997)

    Google Scholar 

  8. Schneier, B.: Cryptography, security, and the future. Communications of the ACM 40(1), 138 (1997)

    Article  Google Scholar 

  9. Voas, J., Charron, F., McGraw, G., Miller, K., Friedman, M.: Predicting how badly good software can behave. IEEE Software 14(4), 73–83 (1997)

    Article  Google Scholar 

  10. Voas, J., McGraw, G., Ghosh, A., Miller, K.: Gluing together software components: How good is your glue? In: 1996 Proceedings of the Pacific Northwest Software Quality Conference (October 1996)

    Google Scholar 

  11. Voas, J., Michael, C., Miller, K.: Confidently assessing a zero probability of software failure. High Integrity Systems Journal 1(3), 269–275 (1995)

    Google Scholar 

  12. Voas, J., Miller, K.: Predicting software’s minimum-time-to-hazard and mean-time-tohazard for rare input events. In: Proc. of theInt’l Symp. on Software Reliability Eng., Toulose, France, October 1995, pp. 229–238 (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, HK., Kim, TH. (2004). Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics