NIGERIAN JOURNAL OF SCIENCE AND ENVIRONMENT
Journal of the Faculties of Science and Agriculture, Delta State University, Abraka, Nigeria

ISSN: 1119-9008
DOI: 10.5987/UJ-NJSE
Email: njse@universityjournals.org


THE USE OF CRYPTO-ANALYSIS TECHNIQUES FOR SECURING INTERNET TRANSACTIONS IN NIGERIA: CONCEPTS & ISSUES

DOI: 10.5987/UJ-NJSE.16.027.2   |   Article Number: 666D9023   |   Vol.12 (2) - September 2013

Author:  Ojeme B.O

Keywords: Cryptography, Encryption, e-transactions, Decryption, Internet Security Protocol, symmetric encryption techniques, web server.

Internet Transactions is growing at a rapid rate and has broken the territorial and geographical barriers that characterized traditional commerce. Despite the great potentials of internet transactions, security issues in Nigeria constitute a major challenge to its growth. More people could have embraced it but are constrained by security concerns, such as their personal and credit card information being intercepted by unauthorized persons (hackers). In this paper, the use of crypto-analysis techniques for securing internet transactions and applications was considered, and symmetric encryption technique was recommended to combine with other techniques, such as client-side software, data transaction protocols, web server software, and the network server operating system involved in handling e-commerce, for securing internet transaction. This recommendation will invariable ensure that internet transaction is secured.

Chou, W. (2002). Inside SSL: The Secure

Sockets Layer Protocol, IEEE IT Professional

Journal 4 (4): 47 52

Chou, W. (2002). Inside SSL: Accelerating

Secure Transactions, IEEE IT Professional

Journal 4 (5): 3741

Ehikioya S.A. (2001). A Formal Characterization

of Electronic Commerce Transactions,

International Journal of Computer

and Information Science 2(3): 97

-117

Ghosh, A.K. (1998). E-commerce Security:

Weak Links, Best Defences, John

 144

Nigerian Journal of Science and Environment, Vol. 12 (2) (2013)

Wiley, New York.

Khalid, H., Muhammad, A., Shoukat, A.

and Shazia, Y. (2011).

Secure E-Commerce Protocol. International

Journal of Computer Science

and Security (IJCSS), 5 (1): 132-142.

Menezes, A., Oorschot, P. V. and Vanstone,

S. (1998). Handbook of Applied Cryptography,

CRC Press, Boca Raton.

Niranjanamurthy, M. and Dharmendra, C

(2013). The study of E-Commerce Security

Issues and Solutions. International

Journal of Advanced Research

in Computer and Communication Engineering

2 (7): 2885-2895.

Rabah, K. (2004). Data Security and cryptographic

techniques A review. Information

Technology Journal 3(1): 106-

132

Peter Schwabe (2011). High-Speed Cryptography

and Cryptanalysis. University

of Technology, Eindhoven.

Sommerville, I. (2007). Software Engineering,

8th Edition, Pearson Education

Ltd., New Jersey.

Schneider, G. (2002). New Perspectives on E

-commerce: Comprehensive, Course

Technology Publishers.