The design and implementation of a crypto processor based on Cryptographic algorithms can be used in wide range of electronic devices, include PCs, PDAs, hardware security modules, web servers etc. The growing problem of breaches in information security in recent years has created a demand for earnest efforts towards ensuring security in electronic processors. The successful deployment of these electronic processors for ecommerce, Internet banking, government online services, VPNs, mobile commerce etc., are dependent on the effectiveness of the security solutions. These security concerns are further compounded when resource-constrained environments and real-time speed requirements have to be considered in next generation applications. Consequently, these IT and Network security issues have been a subject of intensive research in areas of computing, networking and cryptography these last few years. Computational methodologies, computer arithmetic, and encryption algorithms need deep investigation and research to obtain efficient integrations of crypto-processors, with desirable improvements and optimizations. Approaches on silicon achieve high values of speed and bandwidth.
In recent years, online payment activities and money transfer has been increased exponentially, and people are ready to accept the new way to do their transactions at any place any time. In this era of global connectivity, the security breaches through the viruses, hackers, eavesdropping, identity theft, Trojan horse, Denial of service, IP spoofing etc. E-commerce: Introduction, Technology, Cryptography provides the recent technology used to protect against the attacks on E-commerce websites. The description of the various symmetric and asymmetric key algorithms clearly inform the proper techniques to provide the authentication, confidentiality, Integrity and Non-repudiation service for the E-commerce. The content should help the person who are doing their online business, and should be especially useful to professionals in E-commerce fields.