ROLE OF MULTIPLE ENCRYPTION IN SECURE
Senior Faculty Member,
Amity Institute of Information Technology, Amity University Campus, Sector – 125, Noida (Uttar Pradesh), India.
Vinod Kumar Sharma
Professor & Dean, Faculty of Technology,
Gurukula Kangri Vishwavidyalaya,
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.
Secure Electronic Transaction ; Data Security; Multiple Encryption.
Secure Electronic Transaction (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is a set of rules and regulations that enable users to perform financial transactions through existing payment system over insecure wireless network (internet) in much secure and reliable manner . SET is an application to provide various security services as confidentiality, data integrity and authenticity for all electronic transactions over the internet. Secure Electronic Transaction (SET) is essential for the successful electronic transaction over the wireless network; confidentiality is required to hide the sensitive data from unauthorized user, data integrity is required to ensure that whole information is transferred without any modification through intruder, and authentication is DOI : 10.5121/ijnsa.2011.3606
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
required to ensure the sender and receiver that the performed transaction is valid and authentic .
In electronic transaction over insecure wireless network as internet, various risk factors are analyzed: There is no option to see the product physically which we want to purchase, There is no guaranteed security of online transaction over wireless network, and A long time is required to deliver the ordered item to the customer. In fig 1, various risk factors by internet nonshoppers and shoppers can be seen through a survey.
Fig 1: Risk factors perceived by shoppers and non-shoppers
SET uses a security algorithm that generates a digital certificate as a substitute for the customer’s credit card number. This allows merchant to credit transaction amount from customer’s credit cards account without asking credit card number. SET use effective cryptographic techniques like as digital signature standard (DSS) to generate digital certificates and public key cryptographic algorithm to allow communicating parties to authenticate each other and exchange required information in secure manner . In Secure Electronic Transaction (SET), merchant’s website, secured web server and financial bank’s server for the verification of customer’s database makes an important role for successful transaction. Secure Electronic Transaction (SET) follows...