Improving Confidentiality, Integrity, Authenticity in Mobile Wallet
DOI:
https://doi.org/10.26438/ijcse/v5i9.181184Keywords:
Android, Authenticity, Confidentiality, Demonetization, Integrity, Mobile WalletAbstract
Mobile Transactions have seen an emerging trends after Demonetization and emergence of Digital–wallets. However, Transaction through mobile wallets or payment applications is not secure due to breaching of sensitive information by the attacker. When confidential data is breached all the sensitive information is lost. Hence, it is required to secure transaction by encryption. This paper shows the comparision in time performance of payment application using two Cryptographic Processes to enhance Confidentiality, integrity & Authenticity of private or confidential data. One Cryptographic Process includes combination of AES & ECC and Other Cryptographic process include RSA. In this paper, we have implemented using AES & ECC and compared the results with RSA
References
Z. Chuanrong, Z. Lianqing, X. Mingwen, Z. Yuqing, “ Secure Signcryption Scheme Based on a Hybrid Encryption”, vol. 978-0-7695-4297-3/10, IEEE Computer society in International Conference on Computational Intelligence and Security,2010
Z. Chuanrong, C. Long, Z. Yuqing, “Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA”, vol. 978-0-7695-4222-5/10 , IEEE in Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2010
N. Saxena, N.S. Chaudhari “Secure Encryption with Digital Signature .Approach for Short Message Service”, vol. 978-1-4673-4805-8/12, IEEE in World Congress on Information and Communication Technologies , 2012
N. Saxena, N. S. Chaudhari, G.L. Prajapati, “An Extended Approach for SMS Security using Authentication Functions”, vol. 978-1-4577-2119-9/12, IEEE in 7th IEEE Conference on Industrial Electronics and Applications (ICIEA),2012
S.Ariffin, R. Mahmod, R. Rahmat, N.A. Idris, “SMS Encryption using 3D-AES Block Cipher on Android Message Application”, vol. 978-1-4799-2758-6/13, IEEE in International Conference on Advanced Computer Science Applications and Technologies ,2013
H.A.B.A.Ulayee, Md.Mesbah-Ul-Awal, S.Newaj, “Simplified Approach towards Securing Privacy and Confidentiality of Mobile Short Messages”, vol. 978-1-4799-4910-6/14, IEEE in Fourth International Conference on Advanced Computing & Communication Technologies, 2014
R. Ullah, Nizamuddin, A.I. Umar, N. ul Amin, “Blind Signcryption Scheme Based on Elliptic Curves”, vol. 978-1-4799-5852-8/14, IEEE in Conference on Information Assurance and Cyber Security (CIACS),2014
T. Mantoro, Laurentinus, N. Agani, M. A. Ayu, “ Improving the Security Guarantees, Authenticity and Confidentiality in Short Message Service of Mobile Applications”, vol. 10.1109/CITSM.2016.7577592, IEEE in 4th International Conference on Cyber and IT Service Management, 2016
William Stallings , “ECC Diffie-Hellman Key Exchange” , Figure 7 , pp. 295 ,Cryptography and Network Security: principles and practice, Sixth Edition published by Pearson Education, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
