全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket

DOI: 10.4236/jis.2023.144024, PP. 437-453

Keywords: Application Programming Interface (API), Symmetric Cryptography, End-to-End Encryption

Full-Text   Cite this paper   Add to My Lib

Abstract:

Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers purchases. The computerization of these systems is common in supermarkets but the security of these transactions remains a mystery. This article presents an algorithm as an API based on symmetric cryptography that can enable end-to-end encryption of a monetary transaction in a supermarket. This algorithm is the first part of the complete supermarket management system which will be presented in the following article. The Python language and the Flask framework allow us to develop the algorithm as an independent component. Tests have been performed and our algorithm uses 98.49% less memory and 10.18% time saving than the AES algorithm.

References

[1]  Li, D. and Yang, Y. (2012) Enhance Value by Building Trustworthy Software-Reliant System of Systems from Software Product Lines. 2012 Third International Workshop on Product LinE Approaches in Software Engineering (PLEASE), Zurich, 04-04 June 2012, 13-16.
https://doi.org/10.1109/PLEASE.2012.6229761
[2]  Chess, B. and Arkin, B. (2011) Software Security in Practice. IEEE Security & Privacy, 9, 89-92.
https://doi.org/10.1109/MSP.2011.40
[3]  Joukov, N., Shorokhov, V. and Tantsuyev, D. (2014) Security Audit of Data Flows across Enterprise Systems and Networks. The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, 08-10 December 2014, 240-247.
https://doi.org/10.1109/ICITST.2014.7038813
[4]  Khande, R. and Patil, Y. (2014) Online Banking in India: Attacks and Preventive Measures to Minimize Risk. International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, 27-28 February 2014, 1-5.
https://doi.org/10.1109/ICICES.2014.7033940
[5]  Kherad, F.J., Naji, H.R., Malakooti, M.V. and Haghighat, P. (2010) A New Symmetric Cryptography Algorithm to Secure E-Commerce Transactions. 2010 International Conference on Financial Theory and Engineering, Dubai, United Arab Emirates, 18-20 June 2010, 234-237.
https://doi.org/10.1109/ICFTE.2010.5499388
[6]  Hu, Y., Wu, L., Wang, A. and Wang, B. (2014) Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC Card. 2014 Tenth International Conference on Computational Intelligence and Security, Kunming, China, 15-16 November 2014, 514-518.
https://doi.org/10.1109/CIS.2014.176
[7]  Ofosu, A.E., Kester, Q.-A. and Anyanewah, A.J.A. (2019) A Cryptographic Algorithm Based on Aes Cipher Andnondeterministic Algorithm Approach for Key Generation. 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), Coast, 27-29 March 2019, 105-1054.
https://doi.org/10.1109/ICCMA.2019.00024
[8]  Upadhyay, D., Zaman, M., Joshi, R. and Sampalli, S. (2022) An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems. IEEE Transactions on Network and Service Management, 19, 642-660.
https://doi.org/10.1109/TNSM.2021.3104531
[9]  Chiba, Z., Abghour, N., Moussaid, K., Omri, A.E. and Rida, M. (2018) A Hybrid Optimization Framework Based on Genetic Algorithm and Simulated Annealing Algorithm to Enhance Performance of Anomaly Network Intrusion Detection System Based on BP Neural Network. 2018 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Rabat, 21-23 November 2018, 1-6.
https://doi.org/10.1109/ISAECT.2018.8618804
[10]  Jones, G., et al. (2022) API Development Increases Access to Shared Computing Resources at Boston University. Journal of Software Engineering and Applications, 15, 197-207.
https://doi.org/10.4236/jsea.2022.156011
[11]  Hassan, B., Namir, K., Rachiq, A., Elhoussin, L. and Fouzia, B. (2018) MapReduce Programs Simplification Using a Query Criteria API. International Journal of Advanced Computer Science and Applications, 9.
https://doi.org/10.14569/IJACSA.2018.090607
[12]  Almotiri, S., Alosaimi, N. and Abdullah, B. (2021) Using API with Logistic Regression Model to Predict Hotel Reservation Cancellation by Detecting the Cancellation Factors. International Journal of Advanced Computer Science and Applications, 12.
https://doi.org/10.14569/IJACSA.2021.0120688
[13]  Vinoski, S. (2007) REST Eye for the SOA Guy. IEEE Internet Computing, 11, 82-84.
https://doi.org/10.1109/MIC.2007.22
[14]  Khare, R. and Taylor, R.N. (2004) Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems. Proceedings. 26th International Conference on Software Engineering, Edinburgh, UK, 28 May 2004, 428-437.
https://doi.org/10.1109/ICSE.2004.1317465
[15]  Ignatius Moses Setiadi, D.R., Faishal Najib, A., Rachmawanto, E.H., Atika Sari, C., Sarker, K. and Rijati, N. (2019) A Comparative Study MD5 and SHA1 Algorithms to Encrypt REST API Authentication on Mobile-based Application. 2019 International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, Indonesia, 24-25 July 2019, 206-211.
https://doi.org/10.1109/ICOIACT46704.2019.8938570
[16]  Masséand, M.H. and Massé, M. (2012) REST API Design Rulebook: Designing Consistent Restful Web Service Interfaces.
https://www.oreilly.com/library/view/rest-api-design/9781449317904/
[17]  Chandra, S., Paira, S., Alam, S.S. and Sanyal, G. (2014) A comparative survey of Symmetric and Asymmetric Key Cryptography. 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, Tamilnadu, India, 17-18 November 2014, 83-93.
https://doi.org/10.1109/ICECCE.2014.7086640
[18]  Shao, F., Chang, Z. and Zhang, Y. (2010) AES Encryption Algorithm Based on the High Performance Computing of GPU. 2010 Second International Conference on Communication Software and Networks, Singapore, 26-28 February 2010, 588-590.
https://doi.org/10.1109/ICCSN.2010.124
[19]  Radwan, A.G., AbdElHaleem, S.H. and Abd-El-Hafiz, S.K. (2016) Image Encryption Algorithms Using Non-Chaotic Substitutions and Permutations. 2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Chiang Mai, Thailand, 28 June-01 July 2016, 1-6.
https://doi.org/10.1109/ECTICon.2016.7561281
[20]  Chunguang, H., Hai, C., Yu, S. and Qun, D. (2015) Permutation of Image Encryption System Based on Block Cipher and Stream Cipher Encryption Algorithm. 2015 Third International Conference on Robot, Vision and Signal Processing (RVSP), Kaohsiung, Taiwan, 18-20 November 2015, 163-166.
https://doi.org/10.1109/RVSP.2015.46
[21]  Ismoyo, D.D. and Wardhani, R.W. (2016) Block Cipher and Stream Cipher Algorithm Performance Comparison in a Personal VPN Gateway. 2016 International Seminar on Application for Technology of Information and Communication (ISemantic), Semarang, Indonesia, 05-06 August 2016, 207-210.
https://doi.org/10.1109/ISEMANTIC.2016.7873839
[22]  Mandal, A.K., Parakash, C. and Tiwari, A. (2012) Performance Evaluation of Cryptographic Algorithms: DES and AES. 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Bhopal, India, 01-02 March 2012, 1-5.
https://doi.org/10.1109/SCEECS.2012.6184991
[23]  Eigelsreiter, R. (2022) CryptoJs 3.x AES Encryption/Decryption on Client Side with Javascript and on Server Side with PHP.
https://packagist.org/packages/brainfoolong/cryptojs-aes-php

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133