2023
DOI: 10.3390/app13127085
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography

Ghanima Sabr Shyaa,
Mishall Al-Zubaidie

Abstract: Electronic-commerce (e-commerce) has become a provider of distinctive services to individuals and companies due to the speed and flexibility of transferring orders and completing commercial deals across far and different places. However, due to the increasing attacks on penetrating transaction information or tampering with e-commerce requests, the interest in protecting this information and hiding it from tamperers has become extremely important. In addition, hacking these deals can cause a huge waste of money… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…ElGamal cryptography, known for being one of the earliest and well-known public key encryption methods, gained popularity in the 1980s due to its effectiveness and lack of patent restrictions [24]. It relies on the use of random integers during key generation, making it a relatively secure approach.…”
Section: Elgamal Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…ElGamal cryptography, known for being one of the earliest and well-known public key encryption methods, gained popularity in the 1980s due to its effectiveness and lack of patent restrictions [24]. It relies on the use of random integers during key generation, making it a relatively secure approach.…”
Section: Elgamal Algorithmmentioning
confidence: 99%
“…It relies on the use of random integers during key generation, making it a relatively secure approach. The ElGamal algorithm is recognized for its simplicity and efficiency in various cryptographic operations, providing protection against threats in computer networks, including e-apps, online websites, and cryptanalyst attacks [24,25]. As an asymmetric cryptography method, the ElGamal algorithm involves both public and private keys in the encryption and decryption processes.…”
Section: Elgamal Algorithmmentioning
confidence: 99%
See 1 more Smart Citation