A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm

A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm

ByungKwan Lee, SeungHae Yang, Tai-Chi Lee
Copyright: © 2005 |Volume: 1 |Issue: 4 |Pages: 15
ISSN: 1548-0631|EISSN: 1548-064X|ISSN: 1548-0631|EISBN13: 9781615201747|EISSN: 1548-064X|DOI: 10.4018/jbdcn.2005100105
Cite Article Cite Article

MLA

Lee, ByungKwan, et al. "A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm." IJBDCN vol.1, no.4 2005: pp.66-80. http://doi.org/10.4018/jbdcn.2005100105

APA

Lee, B., Yang, S., & Lee, T. (2005). A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm. International Journal of Business Data Communications and Networking (IJBDCN), 1(4), 66-80. http://doi.org/10.4018/jbdcn.2005100105

Chicago

Lee, ByungKwan, SeungHae Yang, and Tai-Chi Lee. "A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm," International Journal of Business Data Communications and Networking (IJBDCN) 1, no.4: 66-80. http://doi.org/10.4018/jbdcn.2005100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Unlike SET (Secure Electronic Transaction) protocol, this paper proposes a SEEP (Security Enhanced Electronic Payment) protocol, which uses ECC (Elliptic Curve Cryptosystem with F2m not Fp) (Koblitz, 1987; Harper, Menezes, & Vanstone, 1993; Miller, 1986), SHA (Secure Hash Algorithm), and 3BC (Block Byte Bit Cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC and HECC (Hyper Elliptic Curve Cryptosystem) are used in 3BC (Cho & Lee, 2002; Cho, Shin, Lee, & Lee, 2002) algorithm, which generates session keys for the data encryption. In particular, when ECC and HECC are combined with 3BC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the 3BC algorithm in this paper, the processing time is reduced substantially. In addition, the use of multiple signatures has some advantages, such as reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.