NIGERIAN JOURNAL OF SCIENCE AND ENVIRONMENT
Journal of the Faculties of Science and Agriculture, Delta State University, Abraka, Nigeria
ISSN: 1119-9008
DOI: 10.5987/UJ-NJSE
Email: njse@universityjournals.org
THE USE OF CRYPTO-ANALYSIS TECHNIQUES FOR SECURING INTERNET TRANSACTIONS IN NIGERIA: CONCEPTS & ISSUES
DOI: 10.5987/UJ-NJSE.16.027.2 | Article Number: 666D9023 | Vol.12 (2) - September 2013
Author: Ojeme B.O
Keywords: Cryptography, Encryption, e-transactions, Decryption, Internet Security Protocol, symmetric encryption techniques, web server.
Internet Transactions is growing at a rapid rate and has broken the territorial and geographical barriers that characterized traditional commerce. Despite the great potentials of internet transactions, security issues in Nigeria constitute a major challenge to its growth. More people could have embraced it but are constrained by security concerns, such as their personal and credit card information being intercepted by unauthorized persons (hackers). In this paper, the use of crypto-analysis techniques for securing internet transactions and applications was considered, and symmetric encryption technique was recommended to combine with other techniques, such as client-side software, data transaction protocols, web server software, and the network server operating system involved in handling e-commerce, for securing internet transaction. This recommendation will invariable ensure that internet transaction is secured.
Chou, W. (2002). Inside SSL: The Secure
Sockets Layer Protocol, IEEE IT Professional
Journal 4 (4): 47 –52
Chou, W. (2002). Inside SSL: Accelerating
Secure Transactions, IEEE IT Professional
Journal 4 (5): 37–41
Ehikioya S.A. (2001). A Formal Characterization
of Electronic Commerce Transactions,
International Journal of Computer
and Information Science 2(3): 97
-117
Ghosh, A.K. (1998). E-commerce Security:
Weak Links, Best Defences, John
144
Nigerian Journal of Science and Environment, Vol. 12 (2) (2013)
Wiley, New York.
Khalid, H., Muhammad, A., Shoukat, A.
and Shazia, Y. (2011).
Secure E-Commerce Protocol. International
Journal of Computer Science
and Security (IJCSS), 5 (1): 132-142.
Menezes, A., Oorschot, P. V. and Vanstone,
S. (1998). Handbook of Applied Cryptography,
CRC Press, Boca Raton.
Niranjanamurthy, M. and Dharmendra, C
(2013). The study of E-Commerce Security
Issues and Solutions. International
Journal of Advanced Research
in Computer and Communication Engineering
2 (7): 2885-2895.
Rabah, K. (2004). Data Security and cryptographic
techniques – A review. Information
Technology Journal 3(1): 106-
132
Peter Schwabe (2011). High-Speed Cryptography
and Cryptanalysis. University
of Technology, Eindhoven.
Sommerville, I. (2007). Software Engineering,
8th Edition, Pearson Education
Ltd., New Jersey.
Schneider, G. (2002). New Perspectives on E
-commerce: Comprehensive, Course
Technology Publishers.