The use of crypto-analysis techniques for securing internet transactions – concepts and issues

  • B Ojeme

Abstract

Internet transactions are growing at a rapid rate and have broken the territorial and geographical barriers that characterized traditional commerce. Despite the great potentials of internet transactions, security issues constitute a major challenge to its growth. More people could have embraced it but are constrained by security concerns, such as their personal and credit card information being intercepted by unauthorized persons (crackers). In this paper, concepts on the use of crypto-analysis techniques for securing internet transactions were reviewed. In addition, some crypto-analysis techniques for securing internet transactions and applications were discussed and symmetric encryption techniques were recommended to be combined with other techniques, such as client-side software, data transaction protocols, web server software, and the network server operating system involved in handling e-commerce, for securing internet transaction. This recommendation will invariable ensure that internet transaction is secured.

Keywords: Cryptography, encryption, e-transactions, decryption, internet security protocol

International Journal of Natural and Applied Sciences, 6(1): 23-28, 2010

Author Biography

B Ojeme
Mathematics and Computer Science Department, Delta State University, Abraka, Nigeria
Section
Articles

Journal Identifiers


eISSN: 0794-4713