Develop an online e-commerce system

Assignment Help Web Project
Reference no: EM132127328

Secure Electronic Commerce Assignment -

Part A -

Based on your practices in labs, develop an online e-commerce (shopping) system using html, javascript and php. You can assume any products for sales.

Please create a folder called "assignment" under your student folder, and construct the website as three folders (same as previous labs), client, server and database.

Please add a readme.txt file to explain your website, such as how to register, how to login, ect.

1. Registration of your website

a. Keep username and plain password in the database.

b. Keep username and hashed password in the database.

2. Login to your website

a. Username and plain password are POSTed to server for check

b. Username and hashed password are POSTed to server for check

3. Shopping Cart page

a. Only successful login user can access to the shopping cart

b. The quantity of each item in the shopping cart can be updated

4. Post shopping cart information and credit card number to Server

a. Post plain information and display plain information

b. Post encrypted information and display plain information - RSA only:

i. Shopping cart information and credit card number are encrypted with RSA encryption algorithm.

ii. The server decrypts the information with RSA decryption algorithm and stores it in the database.

c. Post encrypted information and display plain information - RSA and DES:

i. A successful login user posts an encrypted DES key (chosen by the user) to the server with RSA encryption algorithm.

ii. The server retrieves the DES key with RSA decryption algorithm and keeps the DES key for this user.

iii. The user will encrypt the shopping cart and credit card number with DES encryption algorithm and DES key (shared between the user and the server) before POSTing to the sever, and the server decrypts the encrypted shopping cart and credit card number with DES decryption algorithm and the shared DES key and stores it in the database.

Part B - Practical Lab

Q1. Test the following codes to encrypt/decrypt a message using javascript RSA functions.

Q2. Test the following codes to encrypt/decrypt a message using php RSA functions.

Q3. Based on Q1, Q2, write a client.html and server.php to achieve the following: Create the folders/files.

Expected outcome: users' input will be encrypted (RSA encryption using public key) before submitting to server, and will be decrypted (RSA decryption using private key) on the server side, and store plaintext in the database.

Client-side:

1. Enter a message

2. Encrypt the message using javascript RSA encryption API

3. Submit the ciphertext

Server-side:

1. Retrieve the ciphertext from client-side

2. Retrieve the RSA private (decryption) key

3. Decrypt the ciphertext using php RSA decryption API

4. Save the decrypted value to database.

Note - All codes for part b in attached file.

Attachment:- Assignment Files.rar

Reference no: EM132127328

Questions Cloud

Explain why you would use the strategy : Identify an additional strategy you might use to apply your knowledge of the aging process to social work practice with older clients in general.
Cycles of reflection and reorganization : Continuous change. Organizations are expected to continue the cycles of reflection and reorganization.
Analyze the role of the social worker in helping : Submit a 2- to 4-page paper that analyzes the role of the social worker in helping to plan end-of-life care. Include possible consideration of palliative care.
Master for new supervisors is effective delegation : One of the most difficult skills to master for new supervisors is effective delegation.
Develop an online e-commerce system : INTE1070/1071 Secure Electronic Commerce Assignment - develop an online e-commerce (shopping) system using html, javascript and php
Compensatory justice provides a sufficient rationale : Do you think that compensatory justice provides a sufficient rationale for affirmative action programs in hiring or college admissions?
About the governance and ethics : The proliferation and ubiquity of technology has presented great advantages and great challenges.
People must clearly see where they are going : Stuart Black states in his book, that in order for leaders to see real "movement" during change initiatives, people must clearly see where they are going?
How might the suggestions address potential policy gaps : Critics suggest a comprehensive plan, which involves preventive services, as well as a continuum of care. However, there are few, if any.

Reviews

len2127328

9/30/2018 11:23:46 PM

NOTICE! Please use RSA encryption key and decryption key in Lab 8 of Week 9, all other necessary files, such as des.js, rsa.js, private.key, public.key, …, can be downloaded from the Canvas later. IMPORTANT: You can directly use the RSA public (encryption) key and private (decryption) key in javascript (refer to the fifth highlight part and the sixth highlight part in Q1) and in PHP (refer to the third highlight part the the fifth highlight part in Q2).

Write a Review

Web Project Questions & Answers

  Evaluating an ecommerce website

Create a check list that contains key point for evaluating an ecommerce website - Write a short, reflective report about website

  Gpc and runtime magic quotes

Create a script that lets you know whether Zeus or Helios has the GPC and Runtime Magic Quotes turned on or off. The output should have appropriate labels that define what output signified and should display 'ON' or 'OFF' depending on the setting.

  Creating functions through conditional operator

Use the conditional operator and the cal_days_in_month function, determine the number of days in the current month and output to browser whether it is normal month or a leap month.

  Web development projects with database

Since the vast majority of web-development projects involve a database, do you think that computational activities should be performed there, or do you think they belong in the XML page or stylesheet?

  Comparing shelf software packages

Required assistance with comparing and contrasting two main off the shelf software packages that could be implemented in an organization.

  Web based scams

Web phishing, pharming and vishing are popular web based scams. Talk about currently used tools and recommended measures to defeat this kind of attacks efficiently?

  Explanation of contextual links

The most powerful hypertext capabilities is the the contextual link. Wikipedia . com is a great example of a site that utilizes contextual links.

  How architectural and protocol changes occur

Discuss how architectural and protocol changes happen, the administrative organization that oversees the technical development of the Internet,

  Traditional approaches for training professionals

Webinars and other web conferencing techniques have proved most beneficial for the provision of affordable quality corporate training.

  Internet for business

Discuss how can a business use the Internet and give at least three examples with web links demonstrating your answer.

  It influences the behavior of organizations

Information technology influences the behavior of organizations. Name one effect of Information technology implementation and long-term usage you suppose having a positive contribution and one having a negative consequence.

  Importance of a guided navigation system

Explain the use and importance of a guided navigation system and shopping cart for a website designed for e-commerce and business purpose.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd