作者: Ayodeji Oluwatope , Bamidele Ojo , G. Adesola Aderounmu , Matthew Adigun
DOI: 10.28945/3032
关键词:
摘要: Introduction With the awareness that world is fast becoming a global village due to increased application of internet especially in area e-commerce and m-commerce, information security an issue cannot be overemphasized. Since onset mid 90s, statistics have it expected generate total sales about $105 billion United States alone by 2007. Statistics further shows as 2001, over $700million has been lost online (Holcombe, 2006). Most often times, ecommerce customers are concerned authenticity trader they dealing with (data origin authenticity) more importantly, privacy their confidentiality); such credit card details, which being used for transaction. Based on these statistics, become very important improve techniques security. New developed newer evolving. Cryptography one ensure It would pertinent seek ways improving this technique adversaries daily developing breaking systems. this, information. Data encryption using cryptographic means achieving this. Furthermore, respect already our laboratory- (the [M.sub.2] agent stock market) (Oluwatope, Aderounmu, Akande, & Adigun, 2004), aspect yet added data traversing network. The mobile market traverses Internet searching deals based certain criteria set broker. When met, reports back static agent. Whenever reporting agent, carrying along can intercepted altered if proper scheme not put place. will out-of-place mention proposed algorithm applicable digital signal processing (DSP) (Tang et al, 2003). In DSP, coding digitised signals optimised transmission, higher bandwidth utilisation efficient processor-time highly desirable. outcome work form baseline input into algorithms decoding DSP. communication presence (Rivest, 1990). reason cryptography unsecured channel. Some objectives include privacy, confidentiality, integrity, authentication, entity non-repudiation Basically, seeks address theory practice. defined study mathematical related aspects authentication (Menezes, Van Oorschot, Vanstone, 1997). Motivation As mentioned earlier, course trying achieve information, some tools used. These transform encrypted becomes meaningless adversary. transformation process involves execution computational steps. also observed speed public-key cryptosystems modular exponentiation algorithm, when considering schemes RSA, Rabin EIGamal. fact part systems use large integers range 1024bits above, usually requires enormous amount processor time complete …