Get 20% off StudyMode
Page 1 of 14

Role of Multiple Encryption in Secure Electronic Transaction

Continues for 13 more pages »
Read full document

Role of Multiple Encryption in Secure Electronic Transaction

  • By
  • April 2013
  • 3115 Words
  • 2 Views
Page 1 of 14
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011

ROLE OF MULTIPLE ENCRYPTION IN SECURE
ELECTRONIC TRANSACTION
Himanshu Gupta
Senior Faculty Member,
Amity Institute of Information Technology, Amity University Campus, Sector – 125, Noida (Uttar Pradesh), India.
E-mail: himanshu_gupta4@yahoo.co.in

Vinod Kumar Sharma
Professor & Dean, Faculty of Technology,
Gurukula Kangri Vishwavidyalaya,
Haridwar, India
E-mail: vks_sun@ymail.com

ABSTRACT
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.

KEYWORDS
Secure Electronic Transaction ; Data Security; Multiple Encryption.

1. INTRODUCTION
Secure Electronic Transaction (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is a set of rules and regulations that enable users to perform financial transactions through existing payment system over insecure wireless network (internet) in much secure and reliable manner...