Preview

CRYPTOGRAPHY

Powerful Essays
Open Document
Open Document
10720 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CRYPTOGRAPHY
CRYPTOGRAPHY

Implementing a Secure Electronic Transaction Platform with Data Encryption and Decryption Processes.

(A Case Study of an E-commerce web portal with an integrated payment system)

ABSTRACT

With the increasing popularity of internet, the e-commerce market where goods/products are being paid via an online medium has grown rapidly in recent past years, there is a glaring need for its payment information not to scrambled away or identified by unauthorised persons.
Encryption is the process of scrambling data within a communication system to make it unintelligible in such a way that the process can later be reversed by authorised people to reveal the original data by a data decryption process. Often the objective is to protect the confidentiality and integrity of data, because rarely a day goes by that one don’t hear of a data breach. Hospital records stolen, social media accounts hacked, bank details and information hacked and online credit card information stolen. Every industry, company and merchant is susceptible and at risk, that’s why the steady pace of breaches reinforces the need for an advanced encryption standard (AES) as a last line of defence.
In this proposed project, we shall be implementing a block level cipher encryption algorithm and technique where vital credit card payment information will be encrypted for a secure payment process and will be decrypted by an authorised administrator. An implementation of an online e-commerce portal where goods/products are showcase for purchase online, added to a shopping cart and checkout for payment via an integrated payment system.
This project showcases a real life scenario of an electronic transaction process with an encryption and decryption technique, and will be achieved within my limit as an undergraduate with limited programming capabilities and inexperienced analysis/design knowledge respectively.

CHAPTER ONE

1.0 INTRODUCTION
The

You May Also Find These Documents Helpful

  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    There are countless steps that can be taken to safeguard a company’s data systems against intrusions. The company can update POS (Point-of-Sales) systems to EMV (Euro pay, MasterCard, and Visa) technological standards, implementing “layering” encryption and tokenization, and utilizing outsourced penetration tests to access and report on company’s current information security strength.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are various types of electronic categories for the e-commerce system. The most popular type of electronic payment is the digital wallet. By using the digital wallet for paying purchases over the web more efficiently and by eliminating the need repeated information for each purchase. The digital wallet is more secure, and the owner’s information is saved automatically when the information is completed for a purchase. For example; the consumer would not have repeat credit-card information each time they purchase something. Example: Google Checkout.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 12 P6

    • 916 Words
    • 3 Pages

    Customers can be very concerned about payment security with transactions on the internet. Some of these concerns are from stories about hackers, identity theft and even fake…

    • 916 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In order to operate a successful and efficient E-Business, organizations must avoid legal problems by always operating by policies and procedures established by the company and the intellectual property laws and rights. Security is crucial on an online business to protect customer’s personal and financial information. In order to perform safely and responsibly, organization must keep operating systems updated, limit access of sensitive information to those who need to see it, and use encryption software to protect customers’ financial information from theft during…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Based on the security objectives in the following table, design an enterprise encryption strategy-a public key infrastructure (PKI) that supports internal employees, external business partners, and clients. Include the design and reasoning for using the selected encryption strategy.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Data Encryption Standard (DES), ROT13, and Enigma are all examples of algorithm for the encryption of electronic data…

    • 385 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This security survey is about Credential Solution. Credential Solution is a company that offers service to students to order and mails their official transcripts to a non-Queens College recipient. This service benefits CUNY as it allows 24/7 transcript ordering and it automates some of the processes the Registrar office needs to complete the official transcript order. Credential Solution is the only third party that works with CUNY when it comes to processing an official transcript.…

    • 1267 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Project risk management helps on risk identification and assessment to see which ones can be mitigated or corrected, and how to monitor if there is a probability of occurrence. In the case of outsourcing resources, risk mitigation is needed in order to look and review efficiency and cost of the services and equipment that will be outsourced. However, to be able to use the risk assessment matrix it is essential to ensure that risk is accurately measured. The project will evaluate the suitability and potential of outsourcing human capital, Information…

    • 3443 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    In conclusion, if a terminal patient lives in steady anguish, he or she should not be forbidden to peacefully end his or her life with a doctor’s aid. Living in pain and practically waiting for death to arrive is not the way a human should spend their last couple months of life. Citizens with an incurable disease that progressively worsens should be able to die with dignity. If not these patients will spend their last days with complete misery and worry that death is not near enough. States throughout the country and the government need to revise their beliefs about an assisted death and consider the amount of benefits it provides life-threatening patients. Overall, Physician-assisted suicide should be an option for patients in more than…

    • 131 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    HIPAA Research Paper

    • 564 Words
    • 3 Pages

    Strict polices and procedures should be followed to access the systems where the payment data is stored and access to those systems should be…

    • 564 Words
    • 3 Pages
    Satisfactory Essays