International Journal of Computer Applications (0975 8887) Volume 147 No.5, August 2016 33 Analysis of Secured Cryptography Algorithms in M- Commerce Akanksha Srivastav Department of Computer Science Galgotia’s college of Engineering & Technology, Gr Noida Ajeet Bhartee Assistant Prof. Department of Computer Science Galgotia’s college of Engineering & Technology, Gr Noida ABSTRACT Today’s new technologies which allow mobile phone and handheld device to access the internet have made wireless transaction possible. Cryptography is the technique in which file is converted in unreadable format. In this file of unreadable format is send, after sending, receiving the file use some algorithms to decrypt the file and read the original data. Main factor to secure the medium is algorithms and use key size in their algorithms.RSA is the traditional method which provide secure medium. in most of the online transmission field. But here use RSA algorithms with ECC. Which provide more secure medium for transmission General Terms Cryptography Keywords Cryptography, encryption, decryption, RSA, ECC, transmission 1. INTRODUCTION Mobile commerce, known as m-commerce, is discussed with the use , application, integration of WTT( wireless telecommunication technique). In 1960, the proliferation of computer and communication system, brought with demand from the private sector for means to protect information in digital form. Work of feistel at IBM in early 1970’s and culminating in 1977 with the adoption as a US federal information processing standard for encrypting unclassified information , DES , the DATA ENCRYPTION STANDARD. 1976 diffie Hellman published new direction of cryptography In 1978 rivest, Shamir, Adelman discovered the first practical public key, encryption and signature scheme, now referred to as RSA. In 1991 the first international standard for digital signature (ISO/IEC 9796) was adopted, it is based on RSA public key scheme. 1994 the us government adopted the digital standard, a mechanism based on the ElGamal public key scheme, Mobile commerce (3G) technologies was first introduced in JAPAN 2001 and then spread in Europe and USA in 2002. And continuously day by day work on this field for proper security in this field. Fig-1 2. M-COMMERCE SECURITY CONCERN M-COMMERCE needs several layer of security i) Device security ii) Language security iii) Wireless security iv) Cryptography security 1. Device Security Design of mobile device there are number of high quality security features- a) A build in password mechanism which will lock after several mistyped attempts b) An industry approved, tamper-proof smart card known as SIM ( subscriber identification module) 2. Language Security- Java execution is feasible for PDA, smart phones, laptop and other platform. Server side java technology, java-2 enterprise editions (J2EE) platform.