

Cryptography based e-commerce security: A review.

The different types of experiments on this technique and their results conforms that our technique is very secure and efficient for e-business, e-commerce. This new approach of key generation provides extra robustness in our technique. Here two types of keys i.e., intermediate key, session key are used for encryption-decryption and authentication purpose. Our technique proposes an LFSR, pell’s method and Linear congruence based security model for data security in e-commerce. In this paper we have focused on security issue like technical safeguards for e-commerce. E-commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Electronic record related to organization or person is sensitive in nature so, it is very significant to impose an advanced security protocol, technical solutions in the system. In E-commerce system privacy and security of user’s information is the most crucial issue at present. At present most of the people are participating in e-commerce. E-commerce includes the activities such as order entry, transaction processing, online payment, authentication, order fulfillment, inventory control, shipment, and customer support. are used for conducting business in e-commerce system. Here the computers, telephones, fax machines, barcode readers, credit cards, debit cards, ATM etc. It is the one type of trading in products or services using wireless networks like Internet or online social media networks etc. These business transactions occur in many formats such as business-to-business, business-to-consumer, consumer-to-consumer or consumer-to-business. It focuses on the use of ICT to enable the external activities and relationship among the business and individuals, groups and other business. Electronic commerce is the buying and selling of goods and services, or the funds transfer between independent organizations and/or persons over an electronic wireless network, primarily the Internet.
