Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Credit card number encryption using firework-based key generation

Credit card number encryption using firework-based key generation

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Swarm Intelligence -Volume 2: Innovation, new algorithms and methods — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Encryption of credit card numbers (CCNs) is essential since it is vulnerable to eavesdropping when stored in the database or during transfer in the network. Security of data is the necessity of the hour since communications over open network occur frequently. A novel algorithm termed credit card number encryption (CCE) is proposed to encrypt the CCN. The algorithm works in two phases. In the first phase, the CCN is represented as a binary image and the binary image is encoded as digits. The second phase involves the design of a stream cipher method to encrypt the encoded image using a fireworks key generation credit card number encryption (FWKGCNE) algorithm for key generation. One outstanding advantage of CCE algorithm is the reduction in the number of keys to be stored and distributed. Experimental results demonstrating encryption of CCNs using CCE algorithm and the comparison with the existing methods are presented. Simulation and analysis results show that CCE algorithm is greatly sensitive to the keys and the algorithm has a large space of keys. Security analysis of CCE algorithm was performed to demonstrate that the algorithm is resistant to image attacks.

Chapter Contents:

  • Abstract
  • 3.1 Introduction
  • 3.2 Related work
  • 3.3 Fireworks algorithm
  • 3.4 Credit card number encryption (CCE) algorithm
  • 3.4.1 Representing credit card number as a binary image
  • 3.4.2 Encoding the binary image
  • 3.4.3 Encrypting the credit card number image
  • 3.4.3.1 Fireworks key generation credit card number encryption algorithm
  • 3.4.3.2 Generation of mutated digit code table
  • 3.4.3.3 Key generation and encryption
  • 3.5 Case study
  • 3.6 Experimental results
  • 3.7 Comparison of CCE algorithm with existing methods
  • 3.7.1 Comparison of CCE algorithm with FFX mode
  • 3.7.2 Comparison of CCE algorithm with FPE from a prefix cipher
  • 3.7.3 Comparison of CCE algorithm with FPE from cycle walking
  • 3.7.4 Comparison of CCE algorithm with pseudorandom bit sequence generator for stream cipher based on elliptic curves
  • 3.7.5 Comparison of CCE algorithm with link encryption algorithm
  • 3.7.6 Comparison of CCE algorithm with RC4 method
  • 3.7.7 Comparison of CCE algorithm with Vernam cipher
  • 3.7.8 Comparison of CCE algorithm with chaos based image encryption
  • 3.7.9 Comparison of CCE algorithm with AKGBE algorithm
  • 3.8 Analysis of security of CCE algorithm
  • 3.8.1 Key space
  • 3.8.2 Attack model
  • 3.8.2.1 Cipher image only attack
  • 3.8.2.2 Known plain image attack
  • 3.8.3 Statistical analysis
  • 3.8.3.1 Histogram analysis
  • 3.8.3.2 Sensitivity analysis
  • 3.9 Conclusions
  • References

Inspec keywords: financial data processing; cryptography

Other keywords: FWKGCNE; image attacks; binary image; CCN; credit card numbers; fireworks key generation credit card number encryption algorithm; CCE algorithm; firework-based key generation

Subjects: Cryptography; Data security; Financial computing

Preview this chapter:
Zoom in
Zoomout

Credit card number encryption using firework-based key generation, Page 1 of 2

| /docserver/preview/fulltext/books/ce/pbce119g/PBCE119G_ch3-1.gif /docserver/preview/fulltext/books/ce/pbce119g/PBCE119G_ch3-2.gif

Related content

content/books/10.1049/pbce119g_ch3
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address