A Novel M-Commerce Data Security Mechanism using Elliptic Curve Cryptography
Balasubramanian Prabhu Kavin1, Sannasi Ganapathy2
1Balasubramanian Prabhu kavin, School of Computing Science and Engineering, VIT University-Chennai Campus, Chennai, India.
2Sannasi Ganapathy, School of Computing Science and Engineering, VIT University-Chennai Campus, Chennai, India.
Manuscript received on 02 July 2019 | Revised Manuscript received on 08 July 2019 | Manuscript published on 30 August 2019 | PP: 498-501 | Volume-8 Issue-10, August 2019 | Retrieval Number: J90390881019/2019©BEIESP | DOI: 10.35940/ijitee.J9039.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cryptography is a mathematical science which permits only the authorized users to access the data. Today, it is necessary for our routine life to safeguard online data like credit card numbers, bank transactions, etc. Many cryptographic algorithm-based data security mechanisms have been introduced by various researchers for protecting the online / M-Commerce data. Even though, no data security algorithms achieved the required security level with less time. For overcoming these issues, we propose a new data security algorithm called Elliptic-Curve Cryptography and Diffie-Hellman based data security algorithm for securing the M-Commerce data. Here, the key size of the Elliptic Curve Cryptography is less than RSA that will be helpful to improve the efficiency and reduce the storage space. This algorithm is able to establish a secure session key through a server over an insecure channel and also handle various illegitimate users. In addition, this new algorithm is more secure, efficient and suitable for mobile commerce environments than existing data security algorithms. For evaluating the data security mechanism, many experiments conducted with M-Commerce data that are collected from the Internet which are freely available and also proved the efficiency of the data security algorithm.
Keywords: Cryptography, Encryption, Decryption, Elliptic Curve Cryptography (ECC), Diffie-Hellman, Private Key, Public Key.
Scope of the Article: Cryptography and Applied Mathematics