Open Access Open Access  Restricted Access Subscription Access

Elliptic Curve Cryptography on SET for E-Commerce

Po-Hsian Huang,
Der-Jiunn Deng,
Whe-Dar Lin,

Abstract


There are many threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network. The growth of the computer system and network makes the organizations and personal users to depend on the information that circulate in these systems more and more. This makes us be aware of that protecting the data and resources from leak, insuring the reliability of data and information, and protecting the system from suffering the hit from network are very important.Submit a cryptography that is affirmative by people to reach the demand on the safety of SET system. The algorithm submitted is public, and everyone can use and to verify its safety, using Elliptic Curve Cryptography to execute the key exchange and encryption decryption, and making sure its performance of SET is better while the safety of SET is same as before, and the overload of compute and transmission is yet lower.

Keywords


Elliptic Curve Cryptography; Secure Electronic Transaction; RSA Algorithm

Citation Format:
Po-Hsian Huang, Der-Jiunn Deng, Whe-Dar Lin, "Elliptic Curve Cryptography on SET for E-Commerce," Journal of Internet Technology, vol. 13, no. 5 , pp. 827-834, Sep. 2012.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com