TY - GEN
T1 - Implementing Cryptographic Algorithms for Securing Online Transactions
AU - Bhuvana, J.
AU - Bhatt, Rahul
AU - Metre, Prakash B.
AU - Mishra, Awakash
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2025
Y1 - 2025
N2 - Cryptographic algorithms are critical in securing online transactions. They provide relaxed verbal exchange channels for fairly touchy statistics that wishes to be reliably transmitted among a couple of remote events. Cryptographic algorithms permit for at ease authentication, confidentiality, non-repudiation, and integrity amongst events for their virtual activities. Implementing those algorithms is a complex procedure, however, due to the ever-changing nature of security threats, acquiring an expertise of the way to properly implement cryptographic algorithms becomes critical. This paper makes a speciality of how to correctly enforce cryptographic algorithms for securing on-line transactions. Precise topics consist of excellent practices for deciding on an appropriate algorithms, fine techniques for key distribution, necessary gadget necessities for cozy on line communications, the process for implementing them, and the importance of securely storing encryption keys. Via expertise the specified procedures and strategies, developers and users might be capable of correctly and securely make on-line transactions.
AB - Cryptographic algorithms are critical in securing online transactions. They provide relaxed verbal exchange channels for fairly touchy statistics that wishes to be reliably transmitted among a couple of remote events. Cryptographic algorithms permit for at ease authentication, confidentiality, non-repudiation, and integrity amongst events for their virtual activities. Implementing those algorithms is a complex procedure, however, due to the ever-changing nature of security threats, acquiring an expertise of the way to properly implement cryptographic algorithms becomes critical. This paper makes a speciality of how to correctly enforce cryptographic algorithms for securing on-line transactions. Precise topics consist of excellent practices for deciding on an appropriate algorithms, fine techniques for key distribution, necessary gadget necessities for cozy on line communications, the process for implementing them, and the importance of securely storing encryption keys. Via expertise the specified procedures and strategies, developers and users might be capable of correctly and securely make on-line transactions.
UR - https://www.scopus.com/pages/publications/85208168773
UR - https://www.scopus.com/pages/publications/85208168773#tab=citedBy
U2 - 10.1007/978-981-97-8043-3_98
DO - 10.1007/978-981-97-8043-3_98
M3 - Conference contribution
AN - SCOPUS:85208168773
SN - 9789819780426
T3 - Lecture Notes in Electrical Engineering
SP - 626
EP - 631
BT - Proceedings of the 5th International Conference on Data Science, Machine Learning and Applications - ICDSMLA 2023
A2 - Kumar, Amit
A2 - Gunjan, Vinit Kumar
A2 - Senatore, Sabrina
A2 - Hu, Yu-Chen
PB - Springer Science and Business Media Deutschland GmbH
T2 - 5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
Y2 - 15 December 2023 through 16 December 2023
ER -