An Encrypting Electronic Payments Based on Kerberos Cryptography Protocol
Hasan Abdal-Azal Abdulrazzaq Alsaiqal
International Journal of Computational and Electronic Aspects in Engineering
Volume 5: Issue
3, September 2024, pp 90-97
Author's Information
Hasan Abdal-Azal Abdulrazzaq Alsaiqal 1
Corresponding Author
1Ministry of Finance, Iraq
Hasanalsaiqal77@gmail.com
Abstract:-
At present, the prevalence of mobile phones in the country and the availability of capabilities such as encryption, key generation, and authentication present an appropriate opportunity for a variety of payment platforms. The preparation of equipment and a comprehension of the technical possibilities and difficulties in this field are necessary to achieve this capability. This paper introduces a secure electronic payment system that utilizes the Kerberos cryptography protocol to guarantee authentication, integrity, and confidentiality. The system ensures secure transactions between users and merchants by utilizing the ticket-granting mechanisms of Kerberos and symmetric key encryption. It mitigates the risk of unauthorized access and fraud by guaranteeing that all parties are authenticated prior to the exchange of any payment information. This method addresses critical challenges in the digital financial environments of today by improving the trust and privacy of electronic payments. The proposed model effectively safeguards sensitive financial data while simultaneously ensuring user convenience. The experimental results demonstrate that the proposed method maintains robust security characteristics while simultaneously achieving high quality and low computing complexity.Index Terms:-
Mobile; Kerberos; Electronic Payments; Authentication; CryptographicREFERENCES
- N. Singh, “Impact of e-banking: Prior and after effects on banking activities,” Journal of Pharmaceutical Negative
Results, pp. 310–317, 2023.
- A. T. Oyewole, C. C. Okoye, O. C. Ofodile, and C. E. Ugochukwu, “Cybersecurity risks in online banking: A detailed
review and preventive strategies applicatio,” World Journal of Advanced Research and Reviews, vol. 21, no. 3, pp.
625–643, 2024.
- H. Akbar, M. Zubair, and M. S. Malik, “The security issues and challenges in cloud computing,” International Journal
for Electronic Crime Investigation, vol. 7, no. 1, pp. 13–32, 2023.
- E. E. Archibong, B. U.-A. Stephen, and P. Asuquo, “Analysis of Cybersecurity Vulnerabilities in Mobile Payment
Applications,” Archives of Advanced Engineering Science, pp. 1–12, 2024.
- T. Wang, T. Liu, and H. Zhu, “Cybersecurity Challenges in Mobile Payment Systems: A Case Study of Alipay in Chinese
Cities,” Innovation in Science and Technology, vol. 3, no. 1, pp. 51–58, 2024.
- A. Mohamed, “Intelligent Blockchain-Based Secure Framework for Transaction in Mobile Electronic Payment System.,”
International Journal of Interactive Mobile Technologies, vol. 17, no. 4, 2023.
- M. Sinha, H. Majra, J. Hutchins, and R. Saxena, “Mobile payments in India: the privacy factor,” International
Journal of Bank Marketing, vol. 37, no. 1, pp. 192–209, 2019.
- I. Downnard, “Public-key cryptography extensions into Kerberos,” IEEE Potentials, vol. 21, no. 5, pp. 30–34, 2003.
- B. C. Neuman and T. Ts’o, “Kerberos: An authentication service for computer networks,” IEEE Communications magazine,
vol. 32, no. 9, pp. 33–38, 1994.
- M. M. Hasan, N. A. M. Ariffin, and N. F. M. Sani, “Efficient mutual authentication using Kerberos for resource
constraint smart meter in advanced metering infrastructure,” Journal of Intelligent Systems, vol. 32, no. 1, p.
20210095, 2023.
- A. Kousaridas, G. Parissis, and T. Apostolopoulos, “An open financial services architecture based on the use of
intelligent mobile devices,” Electronic Commerce Research and Applications, vol. 7, no. 2, pp. 232–246, 2008.
- S. Zhou, Y., Tang, Y., & Li, “Secure Mobile Payment Systems Based on Kerberos,” International Journal of Computer
Science and Network Security, vol. 11, no. 9, pp. 1–7, 2011.
- R. L. Rivest, “Symmetric Encryption for Secure Transactions in Financial Systems,” Journal of Cryptography, vol. 1,
no. 1, pp. 21–33, 1990.
- Y. Patel, N. Chovatia, and H. Kaur, “Securing Payment Transactions: A Comprehensive Review of Smart Cards and
Contactless Payments with Cryptographic Methods,” in 2024 11th International Conference on Computing for Sustainable
Global Development (INDIACom), 2024, pp. 785–790.
- M. S. Abdalzaher, M. M. Fouda, A. Emran, Z. M. Fadlullah, and M. I. Ibrahem, “A survey on key management and
authentication approaches in smart metering systems,” Energies, vol. 16, no. 5, p. 2355, 2023.
- M. Shagam and E. Ronen, “Windows into the Past: Exploiting Legacy Crypto in Modern {OS’s} Kerberos Implementation,”
in 33rd USENIX Security Symposium (USENIX Security 24), 2024, pp. 6651–6668.
- W. Lazarov, A. Bohacik, D. Kohout, and R. Fujdiak, “Training Scenario for Security Testing of the Kerberos
Protocol,” in International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems,
2024, pp. 56–67.
- J. Gong, T. Men, S. Feng, and D. Yu, “An Analysis and Improvement Scheme for the Weakness of Kerberos V5
Authentication,” Journal of Electrical Systems, vol. 20, no. 2, pp. 1955–1960, 2024.
- Y. Begimbayeva, Z. Ospanov, L. Gorlov, R. Ibrayev, and O. Ussatova, “Approaches to Developing Key Distribution
Protocols Based on Quantum Key Distribution,” Journal of Electrical Systems, vol. 20, no. 7s, pp. 2323–2330, 2024.
- Z. Qin, J. Sun, A. Wahaballa, W. Zheng, H. Xiong, and Z. Qin, “A secure and privacy-preserving mobile wallet with
outsourced verification in cloud computing,” Computer Standards & Interfaces, vol. 54, pp. 55–60, 2017.
- Y.-Y. Chen, M.-L. Tsai, and F.-J. Chang, “The design of secure mobile coupon mechanism with the implementation for
NFC smartphones,” Computers & Electrical Engineering, vol. 59, pp. 204–217, 2017.
- Hayder Talib Jawad Al-Sammak “Propose an Object Detection Optimization Algorithm by Using Particle Swarm Optimization (PSO) Based-on Exploration Ability of Grey Wolf Optimizer (GWO)”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 5, Issue 2, pp. 54-60, 2024.
- Mohammed Fareed Mahdi “Revolutionizing the Future Investigating the Role of Smart Devices In IOT”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 5, Issue 1, pp. 1-15, 2024.
- Rohini Pochhi, Sandeep Thakre, Balwant Bansod “Using wireless sensor network for monitoring and controlling of farm”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 2, issue 1, pp. 22-25, 2021.
- Samyak S. Nagrare, Payal N. Kanchanwar, Prashant V. Patle, Varsha V. Ambule“Real-Time Smart Face Security Estimation”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 2, issue 2, pp. 18-23, 2021.
- Sanjana Awachat, Ashwini Chahande, Sakshi Gadge, Snehal Shastrakar, Karishma Gajbhiye“A Secure Cloud Based Chatting Application with Hybrid Cryptography”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 2, issue 2, pp. 42-45, 2021.
To view full paper, Download here