SURVEY OF CRYPTOGRAPHY IN NET SECURITY USED IN E-COMMERCE –A TOOL FOR SAFETY

Abstract

 Today the use of computers in every one life is a common and easy way to improve day to day life and to lead the community at large to nurture the benefits of modern technologies, but this common path needs security, in its operations. In the early part of 21st Century computer networks were used as a daily tool for a human being for sending e-mails, making online transactions, sharing devices. The art of secret writing is 'CRYPTOGRAPHY’, which enables a secured communication between two people over an insecure channel in such a way that the other opponents in the path cannot harm the communicators .This article throws light on process of sharing the information to a form that will be unintelligible to an unintended person by symmetric and asymmetric cryptography. It helps to understand the creation of basic 'CRYPTOSYSTEM’, and also focus on the difficulties and challenges in use of cryptography in network security ,with a suggested solution on the problem .The sender and recipient may use same key and encryption /decryption algorithm to encrypt /decrypt given data or may use different key in public key cryptography. All secure data transactions including defence, net payment, access control, business and e-commerce apply cryptography in their operations to safeguard their interests. The use of cryptography technique is the reliable modern tool to build a fair system of confidentiality, integrity and control access, availability & authentication of data. The art and science of concealing the message to introduce secrecy in information security is Cryptography. As the cipher text is public and attackers can get the information and in asymmetric cryptography it require more processing power and computational time we present ECC and quantum computational algorithm.

Authors and Affiliations

Aamir Khan*

Keywords

Related Articles

DYNAMICS AND FAULT DETECTION IN ROTOR BALL BEARING SYSTEM

The dynamics of high speed rotating machinery plays an important role in the modern world. In the design of complex mechanical components and rotating machines, such as turbines, compressors , electrical machines, c...

COMPARATIVE STUDY OF TWO STANDBY INNOVATIVE SYSTEMS WHERE OPERATION OF ALL STANDBY UNITS IS NECESSARY ON THE FAILURE OF MAIN UNIT

The present paper gives the comparative study with respect to profit between two models for boiler working in thermal power plant. The system consists of one high pressure boiler, which is a main unit and two/three low...

 Analysis of Geothermal Storage of Water

 Steady increase in the prices of fossil fuels and electricity has resulted in more and more use of alternate energy sources. Geothermal energy is one such option which ca present work was to see the usability of...

 QOS AWARE BANDWIDTH CONSTRAINED PRECEDENCE BASED ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

 A Mobile Ad-hoc network (MANETs) is a dynamically formed self-configured network by an autonomous system of mobile nodes connected by wireless links. With the advancements of wireless technology, the necessity...

 Temporal Association Rule Mining: A Survey In Fuzzy Framework

 Temporal data mining generate temporal association rule that encapsulate transaction of item with time that’s recorded in temporal data base. Now these days recent research has focused to generate efficient fuzzy...

Download PDF file
  • EP ID EP106859
  • DOI 10.5281/zenodo.48392
  • Views 58
  • Downloads 0

How To Cite

Aamir Khan* (30).  SURVEY OF CRYPTOGRAPHY IN NET SECURITY USED IN E-COMMERCE –A TOOL FOR SAFETY. International Journal of Engineering Sciences & Research Technology, 5(3), 917-924. https://europub.co.uk/articles/-A-106859