Design and Implementation of Online Shopping Mall System Based on MTI Protocol
Abstract
the key to safeguard users' funds and private data. However, existing systems still have obvious deficiencies in resisting man-in-the-middle
attacks and ensuring the forward security of session keys. To address the above problems, this paper proposes an online shopping mall system
based on authentication key negotiation protocol, which constructs a secure and trustworthy transaction environment through asymmetric
cryptography.
??Taking the Matsumoto-Takashima-Imai (MTI) protocol as an example, the paper systematically describes the application architecture of
the authentication Diffie-Hellman protocol in e-commerce scenarios, and realizes the bidirectional authentication between the client side and
the server side. On this basis, combined with the actual needs of the online shopping mall system, the paper completes the system requirements analysis, overall architecture design and the design of each functional module, and at the same time, the database structure is designed
to ensure the efficient access and security of the data. Facing the payment scenario, the system designs a full-process security scheme including initial authentication, key negotiation, and encrypted transmission of payment instructions, which enhances the security of the online
shopping mall system to a certain extent and provides a solid guarantee for the healthy development of e-commerce.
Keywords
Full Text:
PDFReferences
[1] Shi Min, Ye Weiwei, Ou Qingyu. Identity-based authenticated key agreement protocol without bilinear pairing[J]. Netinfo Security,
2016, (10): 21-27.
[2] Wang Xiao, Zhang Jianbiao, Zeng Zhiqiang. Construction method of trusted virtual execution environment based on trusted platform
control module[J]. Journal of Beijing University of Technology, 2019, 45(6): 554-565.
[3] Hu Ruhui. Identity authentication key agreement protocol based on trusted third party[J]. Journal of Guizhou University of Engineering
Science, 2020, 38(3): 29-34.
[4] Chen Haihong, Li Junyi. New identity-based authenticated group key agreement protocol[J]. Computer Engineering and Applications,
2017, 53(21): 103-109.
[5] Wu Kun, Hu Xiangang, Zhang Xuechao. Design of bidirectional authentication and key agreement scheme for WSN[J]. Communication
Technology, 2023, 56(11): 1289-1295.
DOI: http://dx.doi.org/10.70711/aitr.v2i12.8078
Refbacks
- There are currently no refbacks.