Securing Transactions Using Hybrid Cryptography in E-commerce Apps
DOI:
https://doi.org/10.32792/jeps.v13i3.357Abstract
The development of technology at the present time leads to an increase in the use of electronic
commerce due to the increase in demand processes, whether selling or buying goods, products,
services, or payment requests, and that the transfer of information the merchants is sensitive and
important information, and this information or operations may be subject to penetration or attacks. In
this research, we designed a protocol that integrates the Fernet algorithm and the ElGamal algorithm,
and we use the Data Leakage Detection Technology (DLD) to safeguard e-commerce transaction
data. This protocol provid high security for information, and the integration of algorithms provides
high security and strong performance for information transactions that are difficult to hack. We
incorporate encryption algorithms to achieve a high level of security and performance. The proposed
protocol is higher in security and performance than the algorithms of previous studies.
References
[ 1] Asih, E. S., Nguyen, P. T., Lydia, E. L., Shankar, K., Hashim, W., & Maseleno, A.
(2019). Mobile E-commerce website for technology-based buying selling services.
[ 2] Al-Ayed, S. (2022). The impact of e-commerce drivers on e-customer loyalty: Evidence from
KSA. International Journal of Data and Network Science, 6(1), 73-80.
[ 3] Kumbhakar, D., Sanyal, K., & Karforma, S. (2023). An optimal and efficient data security
technique through crypto-stegano for E-commerce. Multimedia Tools and Applications, 1-14.
[ 4] Jintcharadze, E., & Iavich, M. (2020, September). Hybrid implementation of Twofish,
AES, ElGamal and RSA cryptosystems. In 2020 IEEE East-West Design & Test Symposium
(EWDTS) (pp. 1-5). IEEE.
[ 5] MALAU, H., & YOVIRA, V. (2022). REVIEW OF TEXT BASED PASSWORD AND
OTHER AUTHENTICATION METHODS FOR E-COMMERCE DATA PROTECTION.
Journal of Theoretical and Applied Information Technology, 100(6).
[ 6] Sidik, A. P., Efendi, S., & Suherman, S. (2019, June). Improving One-Time Pad Algorithm
on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms. In Journal
of Physics: Conference Series (Vol. 1235, No. 1, p. 012007). IOP Publishing.
[ 7] Ali, G., Dida, M. A., & Elikana Sam, A. (2021). A Secure and Efficient Multi-Factor
Authentication Algorithm for Mobile Money Applications. Future Internet, 13(12), 299.
[ 8] Tyagi, S. S. (2021). Enhancing Security of Cloud Data through Encryption with AES and
Fernet Algorithm through Convolutional-Neural-Networks (CNN). International Journal of
Computer Networks and Applications, 8(4), 288-299.
[ 9] Dong, Z. (2021). Construction of mobile E-commerce platform and analysis of its impact on
E-commerce logistics customer satisfaction. Complexity, 2021.
[ 10] Abdul Hussien, F. T., Rahma, A. M. S., & Abdul Wahab, H. B. (2021). A secure
environment using a new lightweight AES encryption algorithm for e-commerce websites.
Security and Communication Networks, 2021.
[ 11] Kota, C. (2022). Secure File Storage in Cloud Using Hybrid Cryptography. Available at
SSRN 4209511.
[ 12] Koppaka, A. K., & Lakshmi, V. N. (2022). ElGamal algorithm with hyperchaotic sequence
to enhance security of cloud data. International Journal of Pervasive Computing and
Communications, (ahead-of-print).
[ 13] Charles, V. B., Surendran, D., & SureshKumar, A. (2022). Heart disease databased
privacy preservation using enhanced ElGamal and ResNet classifier. Biomedical Signal
Processing and Control, 71, 103185.
[ 14] Ahmed, S., & Ahmed, T. (2022). Comparative Analysis of Cryptographic Algorithms in
Context of Communication: A Systematic Review.
[ 15] Parvathi, R., Girish, M., Sandeep, M. G., & Abhiram, K. (2022). Secured Blockchain
Technology for Agriculture Food Supply Chain. Journal of Pharmaceutical Negative Results,
-361.
[ 16] Asmah, A., & Inayah, A. I. (2023, January). Efficiency for E-Commerce Business Actors.
In 3rd International Conference on Business Law and Local Wisdom in Tourism (ICBLT
(pp. 185-193). Atlantis Press.
[ 17] He, H., & Zhang, B. (2023). Strategy Analysis of Multi-Agent Governance on the ECommerce
Platform. Journal of Theoretical and Applied Electronic Commerce Research,
(1), 1-18.
[ 18] Li, Z., Ren, L., Li, Z., Chen, J., Tian, X., & Zhang, Y. (2023). Price Dispersion,
Bargaining Power, and Consumers’ Online Shopping Experience in e-Commerce: Evidence
from Online Transactions. Mathematical Problems in Engineering, 2023.
[ 19] Sugito, P. (2023). Sales Multiplize Through E-Commerce Training for Batik Craftsman in
Paiton Probolinggo. Empowerment Society, 6(1), 9-16.
[ 20] De Feo, L., Poettering, B., & Sorniotti, A. (2021, November). On the (in) security of
ElGamal in OpenPGP. In Proceedings of the 2021 ACM SIGSAC Conference on Computer
and Communications Security (pp. 2066-2080).
[ 21] Asri, R., Nasution, M. K., & Suherman, S. (2019, June). Modification of chipper text
Elgamal algorithm using split merge. In Journal of Physics: Conference Series (Vol. 1235,
No. 1, p. 012054). IOP Publishing.
[ 22] Sari, P. P., Nababan, E. B., & Zarlis, M. (2020, June). Comparative study of luc, elgamal
and RAS algorithms in encoding texts. In 2020 3rd International Conference on Mechanical,
Electronics, Computer, and Industrial Technology (MECnIT) (pp. 148-151). IEEE.
[ 23] Arboleda, E. R. (2019). Secure and fast chaotic Elgamal cryptosystem. Int. J. Eng. Adv.
Technol, 8(5), 1693-1699.
[ 24] Harjito, B., Setyowati, T., & Wijayanto, A. (2022). Comparative Analysis between
Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic
Certificate. International journal of electrical and computer engineering systems, 13(9), 729-
[ 25] Ismail, E. G., CHAHBOUN, A., & RAISSOUNI, N. (2020). FERNET SYMMETRIC
ENCRYPTION METHOD to GATHER MQTT E2E SECURE COMMUNICATIONS for
IoT DEVICES.
[ 26] Prashanth, C., Teja, D. B. S., & Lavanya, V. (2022). Securing the Data in Cloud Using
Fernet Technique (No. 9237). EasyChair.
[ 27] Habibu, T., Luhanga, E. T., & Sam, A. E. (2019). Developing an algorithm for securing
the biometric data template in the database.
[ 28] Singh, A., Ikuesan, R. A., & Venter, H. (2022). Secure Storage Model for Digital Forensic
Readiness. IEEE Access, 10, 19469-19480.
[ 29] Gupta, I., & Singh, A. K. (2022). A Holistic View on Data Protection for Sharing,
Communicating, and Computing Environments: Taxonomy and Future Directions. arXiv
preprint arXiv:2202.11965.
[ 30] Patil, R. C., Kumar, A., Narmadha, T., Suganthi, M., Rao, A. V. S. R., & Rajesh, A.
(2022). Data Leakage Detection in Cloud Computing Environment Using Classification
Based on Deep Learning Architectures. International Journal of Intelligent Systems and
Applications in Engineering, 10(2s), 281-285.
[ 31] Verma, R., Gautam, V., Yadav, C. P., Gupta, I., & Singh, A. K. (2020, May). A Survey
on Data Leakage Detection and Prevention. In Proceedings of the International Conference on
Innovative Computing & Communications (ICICC).
[ 32] https://www.wordtemplatesonline.net/payment-receipt-templates/free e-commerce
form.
[ 33] Badotra, S., & Sundas, A. (2021). A systematic review on security of E-commerce systems.
International Journal of Applied Science and Engineering, 18(2), 1-19.
[ 34] Alqassab, A., & Hikmat Ismael, Y. (2022). EMV Electronic Payment System and its
Attacks: A Review. AL-Rafidain Journal of Computer Sciences and Mathematics, 16(1), 23-
[ 35] Xiao, Y., Zhou, C., Guo, X., Song, Y., & Chen, C. (2022). A Novel Decentralized ECommerce
Transaction System Based on Blockchain. Applied Sciences, 12(12), 5770.
[ 36] Kaushik, D., Gupta, A., & Gupta, S. (2020, May). E-commerce security challenges: A
review. In Proceedings of the international conference on innovative computing &
communications (ICICC).
[ 37] Liu, X., Ahmad, S. F., Anser, M. K., Ke, J., Irshad, M., Ul-Haq, J., & Abbas, S. (2022).
Cyber security threats: A never-ending challenge for e-commerce. Frontiers in psychology,
, 4863.
[ 38] Odunze, D. (2018). Cyber victimization by hackers: A criminological analysis. Public Policy
and Administration Research, 8(01), 08-15.
[ 39] Roy, S., Sharmin, N., Acosta, J. C., Kiekintveld, C., & Laszka, A. (2022). Survey and
taxonomy of adversarial reconnaissance techniques. ACM Computing Surveys, 55(6), 1-38.
[ 40] Weichbroth, P., Wereszko, K., Anacka, H., & Kowal, J. (2023). Security of
Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments.
Sensors, 23(6), 3155.
[ 41] Awan, I. A., Shiraz, M., Hashmi, M. U., Shaheen, Q., Akhtar, R., & Ditta, A. (2020).
Secure framework enhancing AES algorithm in cloud computing. Security and
communication networks, 2020, 1-16.
[ 42] Al-gohany, N. A., & Almotairi, S. (2019). Comparative study of database security in cloud
computing using AES and DES encryption algorithms. Journal of Information Security and
Cybercrimes Research, 2(1), 102-109.
[ 43] Devassy, N. (2023). Research Project Questions (Doctoral dissertation, Dublin, National
College of Ireland).
[ 44] SYLFANIA, D. Y., JUNIAWAN, F. P., & PRADANA, H. A. (2020, May). Blowfish–RSA
Comparison Analysis of the Encrypt Decrypt Process in Android-Based Email Application. In
Sriwijaya International Conference on Information Technology and Its Applications
(SICONIAN 2019) (pp. 113-119). Atlantis Press.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Journal of Education for Pure Science- University of Thi-Qar
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The Authors understand that, the copyright of the articles shall be assigned to Journal of education for Pure Science (JEPS), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (JEPS), University of Thi-Qar.
Journal of education for Pure Science (JEPS), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (JEPS), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.