PROMOTING ACCESS TO AFRICAN RESEARCH

International Journal of Natural and Applied Sciences

Log in or Register to get access to full text downloads.

Remember me or Register



DOWNLOAD FULL TEXT Open Access  DOWNLOAD FULL TEXT Subscription or Fee Access

The use of crypto-analysis techniques for securing internet transactions – concepts and issues

B Ojeme

Abstract


Internet transactions are growing at a rapid rate and have broken the territorial and geographical barriers that characterized traditional commerce. Despite the great potentials of internet transactions, security issues constitute a major challenge to its growth. More people could have embraced it but are constrained by security concerns, such as their personal and credit card information being intercepted by unauthorized persons (crackers). In this paper, concepts on the use of crypto-analysis techniques for securing internet transactions were reviewed. In addition, some crypto-analysis techniques for securing internet transactions and applications were discussed and symmetric encryption techniques were recommended to be combined with other techniques, such as client-side software, data transaction protocols, web server software, and the network server operating system involved in handling e-commerce, for securing internet transaction. This recommendation will invariable ensure that internet transaction is secured.

Keywords: Cryptography, encryption, e-transactions, decryption, internet security protocol

International Journal of Natural and Applied Sciences, 6(1): 23-28, 2010



AJOL African Journals Online