Skip to main content

Mobile Payment Security by Key Shuffle Mechanism in DES

  • Conference paper
Computational Intelligence and Information Technology (CIIT 2011)

Abstract

Wide spread use of handheld devices extend possibilities of using mobile devices as universal payment mode. However, some issues constrain the widespread acceptance of mobile payment; for example: privacy protection, limited capability of mobile devices, and limited bandwidth of wireless networks. Due to the fact that wireless channel is an open medium to intruders, encryption is a crucial process to assure secure message exchange in the mobile payment systems. Several standard symmetric cryptographic algorithms such as DES and AES are widely used to solve the problem of communication over the insecure wireless channel in mobile payment systems. But intruders and hackers are devising new methods to decrypt the data. The effective key length of the DES is 56 binary digits (bits) and the straight forward “work factor” of the algorithm is 256 (i.e., the number of keys that would have to be tried is 256 or approximately 7.6 × 1016 times), hence the intruders and hackers can easily cryptanalyze.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Beadle, H., Gonzalez, R., Safavi-Naini, R., Bakhtiari, S.: A Review of Internet Payments Schemes. In: Proceedings of the Australian Telecommunication Networks and Applications Conference (ATNAC 1996), Melbourne, Australia, pp. 486–494 (December 1996)

    Google Scholar 

  2. Kreyer, N., Pousttchi, K., Turowski, K.: Standardized Payment Procedures as Key Enabling Factor for Mobile Commerce. In: Proceedings of E-Commerce and Web Technologies: Third International Conference (2002)

    Google Scholar 

  3. Zibideh, W.Y., Matalgah, M.M.: Modified-DES Encryption Algorithm with Improved BER Performance in Wireless Communication. In: Proceedings of Radio and Wireless Symposium, RWS (2011)

    Google Scholar 

  4. Yang, K.-h., Niu, S.-j.: Data Safe Transmission Mechanism Based on Integrated Encryption Algorithm. In: Proceedings of International Conference on Computational Intelligence and Software Engineering, CiSE (2009)

    Google Scholar 

  5. Smid, M.E., Branstad, D.K.: The Data Encryption Standard Past and Future. In: Proceedings of the IEEE, vol. 76(5), pp. 550–559 (1988)

    Google Scholar 

  6. Eli, B., Adi, S.: Differential Cryptanalysis of DES-like Cryptosystems: The Weizmann Institute of Science. Department of Apllied Mathematics (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Navya, V.B., Aparna, R., Bhaskar, G. (2011). Mobile Payment Security by Key Shuffle Mechanism in DES. In: Das, V.V., Thankachan, N. (eds) Computational Intelligence and Information Technology. CIIT 2011. Communications in Computer and Information Science, vol 250. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25734-6_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25734-6_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25733-9

  • Online ISBN: 978-3-642-25734-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics