Improving Confidentiality, Integrity, Authenticity in Mobile Wallet

Authors

  • Agrawal G Dept. of CSE and IT, Madhav Institute of Technology and Science, Gwalior, India
  • Sonker A Dept. of CSE and IT, Madhav Institute of Technology and Science, Gwalior, India

DOI:

https://doi.org/10.26438/ijcse/v5i9.181184

Keywords:

Android, Authenticity, Confidentiality, Demonetization, Integrity, Mobile Wallet

Abstract

Mobile Transactions have seen an emerging trends after Demonetization and emergence of Digital–wallets. However, Transaction through mobile wallets or payment applications is not secure due to breaching of sensitive information by the attacker. When confidential data is breached all the sensitive information is lost. Hence, it is required to secure transaction by encryption. This paper shows the comparision in time performance   of payment application using two Cryptographic Processes to enhance Confidentiality, integrity & Authenticity of private or confidential data. One Cryptographic Process includes combination of AES & ECC and Other Cryptographic process include RSA. In this paper, we have implemented using AES & ECC and compared the results with RSA

References

Z. Chuanrong, Z. Lianqing, X. Mingwen, Z. Yuqing, “ Secure Signcryption Scheme Based on a Hybrid Encryption”, vol. 978-0-7695-4297-3/10, IEEE Computer society in International Conference on Computational Intelligence and Security,2010

Z. Chuanrong, C. Long, Z. Yuqing, “Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA”, vol. 978-0-7695-4222-5/10 , IEEE in Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2010

N. Saxena, N.S. Chaudhari “Secure Encryption with Digital Signature .Approach for Short Message Service”, vol. 978-1-4673-4805-8/12, IEEE in World Congress on Information and Communication Technologies , 2012

N. Saxena, N. S. Chaudhari, G.L. Prajapati, “An Extended Approach for SMS Security using Authentication Functions”, vol. 978-1-4577-2119-9/12, IEEE in 7th IEEE Conference on Industrial Electronics and Applications (ICIEA),2012

S.Ariffin, R. Mahmod, R. Rahmat, N.A. Idris, “SMS Encryption using 3D-AES Block Cipher on Android Message Application”, vol. 978-1-4799-2758-6/13, IEEE in International Conference on Advanced Computer Science Applications and Technologies ,2013

H.A.B.A.Ulayee, Md.Mesbah-Ul-Awal, S.Newaj, “Simplified Approach towards Securing Privacy and Confidentiality of Mobile Short Messages”, vol. 978-1-4799-4910-6/14, IEEE in Fourth International Conference on Advanced Computing & Communication Technologies, 2014

R. Ullah, Nizamuddin, A.I. Umar, N. ul Amin, “Blind Signcryption Scheme Based on Elliptic Curves”, vol. 978-1-4799-5852-8/14, IEEE in Conference on Information Assurance and Cyber Security (CIACS),2014

T. Mantoro, Laurentinus, N. Agani, M. A. Ayu, “ Improving the Security Guarantees, Authenticity and Confidentiality in Short Message Service of Mobile Applications”, vol. 10.1109/CITSM.2016.7577592, IEEE in 4th International Conference on Cyber and IT Service Management, 2016

William Stallings , “ECC Diffie-Hellman Key Exchange” , Figure 7 , pp. 295 ,Cryptography and Network Security: principles and practice, Sixth Edition published by Pearson Education, 2014.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i9.181184
Published: 2025-11-12

How to Cite

[1]
G. Agrawal and A. Sonker, “Improving Confidentiality, Integrity, Authenticity in Mobile Wallet”, Int. J. Comp. Sci. Eng., vol. 5, no. 9, pp. 181–184, Nov. 2025.

Issue

Section

Research Article