Mobile Payment Security by Key Shuffle Mechanism in DES
Wide spread use of handheld devices extend possibilities of using mobile devices as universal payment mode. However, some issues constrain the widespread acceptance of mobile payment; for example: privacy protection, limited capability of mobile devices, and limited bandwidth of wireless networks. Due to the fact that wireless channel is an open medium to intruders, encryption is a crucial process to assure secure message exchange in the mobile payment systems. Several standard symmetric cryptographic algorithms such as DES and AES are widely used to solve the problem of communication over the insecure wireless channel in mobile payment systems. But intruders and hackers are devising new methods to decrypt the data. The effective key length of the DES is 56 binary digits (bits) and the straight forward “work factor” of the algorithm is 256 (i.e., the number of keys that would have to be tried is 256 or approximately 7.6 × 1016 times), hence the intruders and hackers can easily cryptanalyze.
KeywordsM-commerce mobile payments key-shuffle permutation array DES
Unable to display preview. Download preview PDF.
- 1.Beadle, H., Gonzalez, R., Safavi-Naini, R., Bakhtiari, S.: A Review of Internet Payments Schemes. In: Proceedings of the Australian Telecommunication Networks and Applications Conference (ATNAC 1996), Melbourne, Australia, pp. 486–494 (December 1996)Google Scholar
- 2.Kreyer, N., Pousttchi, K., Turowski, K.: Standardized Payment Procedures as Key Enabling Factor for Mobile Commerce. In: Proceedings of E-Commerce and Web Technologies: Third International Conference (2002)Google Scholar
- 3.Zibideh, W.Y., Matalgah, M.M.: Modified-DES Encryption Algorithm with Improved BER Performance in Wireless Communication. In: Proceedings of Radio and Wireless Symposium, RWS (2011)Google Scholar
- 4.Yang, K.-h., Niu, S.-j.: Data Safe Transmission Mechanism Based on Integrated Encryption Algorithm. In: Proceedings of International Conference on Computational Intelligence and Software Engineering, CiSE (2009) Google Scholar
- 5.Smid, M.E., Branstad, D.K.: The Data Encryption Standard Past and Future. In: Proceedings of the IEEE, vol. 76(5), pp. 550–559 (1988)Google Scholar
- 6.Eli, B., Adi, S.: Differential Cryptanalysis of DES-like Cryptosystems: The Weizmann Institute of Science. Department of Apllied Mathematics (1990)Google Scholar