Font Size: a A A

Research Of Secure Technology In Electronic Payment

Posted on:2006-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:L WangFull Text:PDF
GTID:2168360155472947Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the increasing popularization and rapid development of the Internet, electronic commerce has also developed quickly. As the important part of electronic commerce, secure electronic payment has become the focus of more and more people. This paper analyzes and studies the applications of information secure technology in electronic payment. At first, the development, characteristic, content, effect of electronic commerce and the importance of electronic payment in electronic commerce are briefly introduced. Then the concept, general model, pattern, classification and secure demands of electronic payment are discussed. Some information secure technology related to electronic payment, such as firewall technique, VPN technique, data encryption technique and SSL, SET, are also introduced. Subsequently, the main works of this paper are organized as follows: â‘ The SSL, which is a network telecommunication protocol, and SET, which is a protocol for electronic business, are studied in detail; Their feature, security, trade flow, advantages and disadvantages are analyzed. In succession, detailed compares are made between SSL and SET. â‘¡Based on the sufficient comprehension of PayWord protocol, we expand and improve it to be suitable for WWW condition. Compared with original protocol, it is more practical, secure and fair. Moreover, it does not affect the performance of the system. And some further suggestions are proposed to improve PayWord protocol better. â‘¢We try to integrate chaotic cryptographic technique with traditional cryptographic technique, and apply them to practical transactions in electronic commerce. A chaotic encryption-hash algorithm with parallel property is designed, and a lot of experiments are made to verify the performance of the algorithm. Experimental results demonstrate that this algorithm has better hash performance, and it can complete the computation of encryption and hash simultaneously. Then an electronic payment scheme based on the algorithm is proposed, and some performance evaluations are made in detail. Finally, the research work of this paper is summarized and the future research direction is indicated.
Keywords/Search Tags:Electronic Commerce, Electronic Payment, Digital Cash, Micro-payment, Cryptographic Technique, Chaos
PDF Full Text Request
Related items