Abstract

Often students have difficulties mastering cryptographic algorithms. For some time we have been developing with methods for introducing important security concepts for both undergraduate and graduate students in Information Systems, Computer Science and Engineering students. To achieve this goal, Sequence diagrams and spatial circuit derivation from equations are introduced to students. Sequence diagrams represent progression of events with time. They learn system security concepts more effectively if they know how to transform equations and high level programming language constructs into spatial circuits or special purpose hardware. This paper describes an active learning module developed to help students understand secure protocols, algorithms and modeling web applications to prevent attacks and both software and hardware implementations related to encryption. These course materials can also be used in computer organization and architecture classes to help students understand and develop special purpose circuitry for cryptographic algorithms.

Highlights

  • During the last decade Postal mail became E-mail, face-toface Banking became Online Banking and Commerce transformed to E-Commerce

  • Symmetric key cryptography consists of a private key that is used for both encryption and decryption

  • Offline authorization can reduce computational load. This can be done by not doing any online verification with the verification center until each individual transaction is grouped offline

Read more

Summary

INTRODUCTION

During the last decade Postal mail became E-mail, face-toface Banking became Online Banking and Commerce transformed to E-Commerce. Confidentiality, Integrity and Authentication is achieved through encryption of the message. Authentication is implemented through encryption, signatures and certificates [1]. The Kerberos authentication scheme consists of a client, Kerberos Authentication Server, Ticket Granting Service and a service provider. Encrypted keys and tickets help sharing symmetric keys. Non-repudiation makes sure of the security of the ECommerce transaction. The digital certificate, encryption www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 3, No.4, 2012 and signature methods are useful in this matter because each party can validate the sender of the message and information. It illustrates the working of dual signature.

E-COMMERCE TRANSACTIONS
SYMBOLIC REPRESENTATIONS AND ALGORITHMS TO SPATIAL CIRCUITS TRANSFORMATION
OTHER RELATED WORK
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call