Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Design and Implementation of Secure Electronic Payment System (Client)
Authors: Pyae Pyae Hun
Abstract:
Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card numbers. The symmetric key cryptosystem RC5 can protect conventional transaction data such as account numbers, amount and other information. This process can be done electronically using RC5 encryption / decryption program written by Microsoft Visual Basic 6.0. There is no danger of any data sent within the system being intercepted, and replaced. The alternative is to use the existing network, and to encrypt all data transmissions. The system with encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results In order to be secure the system the communication between modules is encrypted using symmetric key cryptosystem RC5. The system will use simple user name, password, user ID, user type and cipher authentication mechanism for identification, when the user first enters the system. It is the most common method of authentication in most computer system.Keywords: A 128-bit block cipher, Microsoft visual basic 6.0, RC5 encryption /decryption algorithm and TCP/IP protocol.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1333054
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2371References:
[1] Ferche,A., Wrightson, G., Computer Money , Heidelberg: Dpunkt, 1996
[2]"Cheque system on line electronic payment " http://www.cict.dtu.dk/upload/centre/cict/publications/working%20pape rs/cti wp39.pdf
[3] "Achieving Electronic Privacy" htt://www.digicash.com/publish/sciam.html
[4] Date,C.J, "An introduction to Database System", ISBN 0-201- 824582,Seventh Edition, The System Programming Series, Addison- Wesley Publishing Company,1994
[5] Yin, Y. "The RC5 Encryption Algorithm: Two Years On. " Crypto Bytes, Winter 1997.
[6] Ben Mc Fadyen, UNICASH: A Digital Cash System , Department of Computer Science and Electrical Engineering, The University Queensland.
[7] Kaliski Jr, B.S. and Yin, Y. L., September 1998. "On the security of the RC5 Encryption Algorithm" , 2006.
[8] W. Stallings, 1998. "Cryptography and Network Security", Third Edition, 2006 .
[9] R.L.Rivest, R.March 1997. "The RC5 Encryption Algorithm" . MIT Laboratory for Computer Science, 545 Technology Sure, Cambridge, Mass, 1996.