Abstract:
Payment request examination of some of the cryptography's most widely used encryption algorithms, with the goal of first identifying as many flaws and vulnerabilities as ...Show MoreMetadata
Abstract:
Payment request examination of some of the cryptography's most widely used encryption algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible, and then identifying the elements of these flaws that could have been avoided with proper implementation. The number of attacks on the Internet is flourishing. An encrypted communications algorithm was necessary to overcome these flaws. In this survey paper, we looked at the importance of existing mobile user payment encryption solutions and literature analysis of these algorithms. In cryptography, a mobile payment encryption technique is used. The algorithm converts data from a readable format into an unreadable, secure format.
Published in: 2021 4th International Conference on Recent Trends in Computer Science and Technology (ICRTCST)
Date of Conference: 11-12 February 2022
Date Added to IEEE Xplore: 27 May 2022
ISBN Information: