The process of marketing and selling over the Internet. It is either a Business to Business (B2B) or Business to Consumer (B2C) which is also known as E-business or E-tailing.
El Gamal Algorithm
An algorithm for asymmetric cryptography that was invented by Taher EL Gamal, founded on the challenge of calculating discrete logarithms and can be used for both encryption, like 128-bit encryption and SSL encryption, and Digital Signature, used in digital certificates like digital SSL certificates and 128-bit certificates for internet security and network security with secure authentication and secure SSL authentication.
Electronic codebook (ECB)
Block cipher mode that consists of simply applying the cipher to blocks of data in sequence, one block at a time. It does not use feedback, and is also considered the weakest form of block cipher.
Elliptic Curve Cryptography (ECC)
It represents a different way to do public-key cryptography - an alternative to the older RSA system - and also offers certain advantages. ECC devices will require less storage, less power, less memory and less bandwidth - ultimately a more efficient cryptosystem. This allows the implementation of cryptography in platforms that are constrained, such as wireless devices, handheld computers, smart cards and thin-clients. It also provides a big win in situations where efficiency is extremely important, such as on a bottlenecked SSL secure web server supporting e-commerce
Encryption is the process of changing data into a form that can be read only by the intended receiver. To decipher the message, the receiver of the encrypted data must have the proper decryption key. In traditional encryption schemes, the sender and the receiver use the same key to encrypt and decrypt data. Public-key encryption schemes use two keys: a public key, which anyone may use, and a corresponding private key, which is possessed only by the person who created it. See also SSL Encryption
Encryption at the point of origin in a network, followed by decryption at the destination
Introduced in early 2007, Extended Validation SSL certificates (EV SSL) are the next generation of high-assurance SSL certificate. Used with high-security Web browsers, they clearly identify a Web site's organizational identity. For example, if you use Internet Explorer 7.0, Firefox 3.0 or Opera 9.5, the address bar will turn green to identify this site as having an EV SSL Certificate.
Until the introduction of EV SSL Certificate, the average online customer could not easily tell the difference between SSL certificates that provide extensive identity authentication from certificates that provide only domain validation with virtually no identity verification. It became necessary to give consumers the means to do intelligent risk assessment of the online merchants with whom they were transacting. Consumers need to be able to verify the real world identity of online businesses, not just their domain names.
EV certificates require that organizations go through a rigorous validation process that meets the Extended Validation guidelines established by the CA/Browser Forum. In addition to confirming domain name ownership, the process includes verifying the authority of the contact person requesting the certificate, and validating the organization with government or third-party business registries, and confirming the legal and physical existence of the business.