Skip to main content
Log in

Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Electronic commerce is the buying and selling of goods and services, or the funds transfer between independent organizations and/or persons over an electronic wireless network, primarily the Internet. It focuses on the use of ICT to enable the external activities and relationship among the business and individuals, groups and other business. These business transactions occur in many formats such as business-to-business, business-to-consumer, consumer-to-consumer or consumer-to-business. It is the one type of trading in products or services using wireless networks like Internet or online social media networks etc. Here the computers, telephones, fax machines, barcode readers, credit cards, debit cards, ATM etc. are used for conducting business in e-commerce system. E-commerce includes the activities such as order entry, transaction processing, online payment, authentication, order fulfillment, inventory control, shipment, and customer support. At present most of the people are participating in e-commerce. In E-commerce system privacy and security of user’s information is the most crucial issue at present. Electronic record related to organization or person is sensitive in nature so, it is very significant to impose an advanced security protocol, technical solutions in the system. E-commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. In this paper we have focused on security issue like technical safeguards for e-commerce. Our technique proposes an LFSR, pell’s method and Linear congruence based security model for data security in e-commerce. Here two types of keys i.e., intermediate key, session key are used for encryption-decryption and authentication purpose. This new approach of key generation provides extra robustness in our technique. The different types of experiments on this technique and their results conforms that our technique is very secure and efficient for e-business, e-commerce.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2.
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Yasin, S., & Haseeb, K. (2012). Cryptography based e-commerce security: A review. IJCSI, 9(2), 132.

    Google Scholar 

  2. Biswajit Tripathy, B., & Mishra, J. (2013). Protective measures in ecommerce to deal with security threats arising out of social issues—A framework. IAEME, 4(1), 12–24.

    Google Scholar 

  3. Kaushik, D., Gupta, A., & Gupta, S. (2020). E-commerce security challenges: A review. In Proceedings of the international conference on innovative computing & communications (ICICC) 2020. SSRN: https://ssrn.com/abstract=3595304 or https://doi.org/10.2139/ssrn.3595304.

  4. Niranjanamurthy, M., Kavyashree, N., & Jagannath, S. (2012). Mcommerce: Security challenges issues and recommended secure payment method. IJMIE, 2(8), 374–393.

    Google Scholar 

  5. Das, A., & Veni Madhavan, C. E. (2004). Public-key cryptography: Theory and practice. Pearson Education.

    Google Scholar 

  6. Stallings, W. (2003). Cryptography and network security: Principles and practice. (3rd ed.). Prentice Hall.

    Google Scholar 

  7. Kahate, A. (2008). Cryptography and network security. New Delhi: Tata McGraw-Hill Publishing Company.

    Google Scholar 

  8. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In J. Kilian (Ed.), CRYPTO2001. (Vol. 2139, pp. 213–229). Heidelberg: Springer.

    Google Scholar 

  9. Oladipupo, E. T., & Alade, O. A. (2014). An approach to improve data security using modified XOR encryption algorithm. International Journal of Core Research in Communication Engineering, 1(2), 1834–1838.

    Google Scholar 

  10. Agrawal, A., Gorbunov, S., Vaikuntanathan, V., & Wee, H. (2013). Functional encryption: New perspectives and lower bounds. In R. Canetti & J. A. Garay (Eds.), CRYPTO 2013, Part II. (Vol. 8043, pp. 500–518). Heidelberg: Springer.

    Chapter  Google Scholar 

  11. Stinson, D. (2006). Cryptography: Theory and practice. (3rd ed.). Chapman & Hall.

    Google Scholar 

  12. Chaudhry, S. A., et al. (2017). An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications, 10(1), 1–15.

    Article  Google Scholar 

  13. Deb, S., Bhuyan, B., Gupta, N. C. (2018). Design and analysis of LFSR-based stream cipher. In: J. Mandal, G. Saha, D. Kandar, A. Maji (Eds.) Proceedings of the international conference on computing and communication systems. Lecture notes in networks and systems, vol. 24. Springer, Singapore. https://doi.org/10.1007/978-981-10-6890-4_6.

  14. Wu, G., et al. (2018). A lightweight and efficient encryption scheme based on LFSR. International Journal of Embedded System, 10(3), 225–232.

    Article  Google Scholar 

  15. Chakravorty, J. G., & Ghosh, P. R. (2018). Advanced higher algebra. U.N.Dhur and Sons Private Ltd.

    Google Scholar 

  16. Shockley, J. E. (1967). Introduction to number theory. New York: Holt, Rinehart and Winston.

    Google Scholar 

  17. Sangeetha, M. K., & Suchitra, R. (2016). The study of e-commerce security issues and solutions. International Journal of Engineering Research & Technology (IJERT) NCRIT, 4(27), 2885–2895.

    Google Scholar 

  18. Ghansela, S. (2013). Network security: Attacks, tools and techniques. IJARCSSE, 3(6), 419–421.

    Google Scholar 

  19. Alladi, T., Chamola, V., Parizi, R. M., & Choo, K. R. (2019). Blockchain applications for industry 4.0 and industrial IoT: A review. IEEE Access, 7, 176935–176951. https://doi.org/10.1109/ACCESS.2019.2956748.

    Article  Google Scholar 

  20. Abomhara, M., & Køien, G. M. (2014) Security and privacy in the internet of things: Current status and open issues. In International conference on privacy and security in mobile systems (PRISMS) (pp. 1–8). IEEE.

  21. Fu, C., Zhang, G.-Y., Zhu, M., Chen, Z., & Lei, W.-M. (2018). A new chaos-based color image encryption scheme with an efficient substitution key stream generation strategy. Security and Communication Networks. https://doi.org/10.1155/2018/2708532.

    Article  Google Scholar 

  22. Harmouch, Y. (2018). A chaotic key stream generation for stream cipher. In LOPAL '18: Proceedings of the international conference on learning and optimization algorithms: Theory and applications May 2018 Article No.: 14 (pp. 1–6). https://doi.org/10.1145/3230905.3230942.

  23. Sreelaja, N. K., & Pai, G. A. V. (2009). Design of stream cipher for text encryption using particle swarm optimization based key generation. Journal of Information Assurance and Security, 2, 30–41.

    Google Scholar 

  24. Dijesh, P., Babu, S. S., & Vijayalakshmi, Y. (2020). Enhancement of e-commerce security through asymmetric key algorithm. Computer Communications, 153, 125–134. https://doi.org/10.1016/j.comcom.2020.01.033.

    Article  Google Scholar 

  25. Ahmad, K., & Alam, M. S. (2016). E-commerce security through elliptic curve cryptography. Procedia Computer Science, 78, 867–873. https://doi.org/10.1016/j.procs.2016.05.549.

    Article  Google Scholar 

  26. Hassan, Md., Shukur, Z., & Hasan, M. (2020). An efficient secure electronic payment system for e-commerce. Computers, 9, 13. https://doi.org/10.3390/computers9030066.

    Article  Google Scholar 

  27. Oo, K. Z. (2019). Design and implementation of electronic payment gateway for secure online payment system. International Journal of Trend in Scientific Research and Development IJTSRD, 3(5), 1329–1334.

    Google Scholar 

  28. Kumar, V. (2015). Ontology based public healthcare system in Internet of Things (IoT). Procedia Computer Science, 50, 99–102. https://doi.org/10.1016/j.procs.2015.04.067.

    Article  Google Scholar 

  29. Zaidan, B., Zaidan, A., Al-Frajat, A., & Jalab, H. (2010). On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences, 10, 1650–1655.

    Article  Google Scholar 

  30. Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the Internet of things. In 2015 IEEE World Congress on Services (SERVICES) (pp. 21–28). IEEE.

  31. Kak, A. (2015). Lecture notes on computer and network security. Purdue University.

    Google Scholar 

  32. Maia, P., Batista, T., Cavalcante, E., Baffa, A., Delicato, F. C., Pires, P. F., & Zomaya, A. (2014). A web platform for interconnecting body sensors and improving health care. Procedia Computer Science, 40, 135–142. https://doi.org/10.1016/j.procs.2014.10.041.

    Article  Google Scholar 

  33. Joshi, C., & Singh, U. K. (2015). A review on taxonomies of attacks and vulnerability in computer and network system. International Journal of Advanced Research in Computer Science and Software Engineering (IJRCSSE), 5(1), 742–747.

    Google Scholar 

  34. Olivier, F., Carlos, G., & Florent, N. (2015). New security architecture for IoT network. Procedia Computer Science, 52, 1028–1033. https://doi.org/10.1016/j.procs.2015.05.099.

    Article  Google Scholar 

  35. Liang, W., Tang, M., Long, J., Peng, X., Xu, J., & Li, K. (2019). A secure FaBric Blockchain-based data transmission technique for industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 15(6), 3582–3592. https://doi.org/10.1109/TII.2019.2907092.

    Article  Google Scholar 

  36. Ajiniyazovna, S. (2020). Implementation of E-commerce security methods and tools. International Journal of Emerging Trends in Engineering Research, 8, 1545–1551. https://doi.org/10.30534/ijeter/2020/12852020.

    Article  Google Scholar 

  37. Chuang, M.-C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.

    Article  Google Scholar 

  38. Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 34–50.

    Article  Google Scholar 

  39. Hwang, Y. H. (2015). Iot security & privacy: Threats and challenges. In Proceedings of the 1st ACM workshop on IoT privacy, trust and security (pp. 1–1). ACM.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anirban Bhowmik.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhowmik, A., Karforma, S. Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce. Electron Commer Res 22, 1–21 (2022). https://doi.org/10.1007/s10660-021-09477-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-021-09477-w

Keywords

Navigation