SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Cryptography and
Network Security
Third Edition
by William Stallings
Lecture slides by Omar Ghazi
Secure Electronic
Transaction (SET)
Agenda
-Introduction for Secure Electronic Transaction (SET( ?
-Requirement for SET
-Key Features of SET
-SET components
-SET Transaction
-Dual Signature
-Purchase Request
-Payment Gateway Authorization
-Payment Capture
-Reference
Secure Electronic Transaction (SET(
SET is an open encryption and security specification designed to
protect credit card transactions on the Internet. The current version,
SETv1, emerged from a call for security standards by MasterCard and
Visa in February 1996. A wide range of companies were involved in
developing the initial specification, including IBM, Microsoft,
Netscape, RSA, Terisa, and Verisign. Beginning in 1996, there have
been numerous tests of the concept, and by 1998 the first wave of
SET-compliant products was available. SET is not itself a payment
system. Rather it is a set of security formats and protocols like
(Secure Sockets Layer (SSL(, Microsoft's Secure Transaction
Technology (STT(, and Secure Hypertext Transfer Protocol (S-
HTTP(. SET uses so me but not all aspects of a public key
infrastructure (PKI( (that enables users to employ the existing credit
card payment infrastructure on an open network, such as the Internet,
in a secure fashion. In essence, SET provides three services:
Secure Electronic Transactions (SET(
(Cont’d(.
-Provides a secure communications amongst parties.
-Provides trust by the use of X.509v3 digital certificates.
-Ensures privacy the restricted info to those who need it.
Requirement for SET
-Provide confidentiality of payment and ordering information
-Ensure the integrity of all transmitted data
-Provide authentication that a cardholder is a legitimate user of a
credit card account
-Provide authentication that a merchant can accept credit card
transactions through its relationship with a financial institution
-Ensure the use of the best security practices and system design
techniques to protect all legitimate parties in an electronic
commerce transaction
-Create a protocol that neither depends on transport security
mechanisms nor prevents their use
-Facilitate and encourage interoperability among software and
network providers
Key Features of SET
 Confidentiality of information
 Integrity of data
 Cardholder account authentication
 Merchant authentication
SET Components
SET Transaction
We now look at some of the cryptographic details describe the sequence of
events that are required for a transaction.
1.The customer opens an account. The customer obtains a credit card
account, such as MasterCard or Visa, with a bank that supports electronic
payment and SET.
2.The customer receives a certificate. After suitable verification of identity,
the customer receives an X.509v3 digital certificate, which is signed by the
bank. The certificate verifies the customer's RSA public key and its expiration
date. It also establishes a relationship, guaranteed by the bank, between the
customer's key pair and his or her credit card.
3.Merchants have their own certificates. A merchant who accepts a certain
brand of card must be in possession of two certificates for two public keys
owned by the merchant: one for signing messages, and one for key exchange.
The merchant also needs a copy of the payment gateway's public-key
certificate.
4.The customer places an order. This is a process that may involve the
customer first browsing through the merchant's Web site to select items and
determine the price. The customer then sends a list of the items to be
purchased to the merchant, who returns an order form containing the list of
items, their price, a total price, and an order number.
5.The merchant is verified. In addition to the order form, the merchant sends
a copy of its certificate, so that the customer can verify that he or she is
dealing with a valid store.
SET Transaction(Cont’d(.
6.The order and payment are sent. The customer sends both order and
payment information to the merchant, along with the customer's certificate.
The order confirms the purchase of the items in the order form. The payment
contains credit card details. The payment information is encrypted in such a
way that it cannot be read by the merchant. The customer's certificate enables
the merchant to verify the customer.
7.The merchant requests payment authorization. The merchant sends the
payment information to the payment gateway, requesting authorization that the
customer's available credit is sufficient for this purchase.
8.The merchant confirms the order. The merchant sends confirmation of the
order to the customer.
9.The merchant provides the goods or service. The merchant ships the goods
or provides the service to the customer.
10.The merchant requests payment. This request is sent to the payment
gateway, which handles all of the payment processing.
Dual Signature
Dual Signature: The purpose of the dual signature is to link two
messages that are intended for two different recipients. In this
case, the customer wants to send the order information (OI) to
the merchant and the payment information (PI) to the bank. The
merchant does not need to know the customer's credit card
number, and the bank does not need to know the details of the
customer's order. The customer is afforded extra protection in
terms of privacy by keeping these two items separate. However,
the two items must be linked in a way that can be used to
resolve disputes if necessary. The link is needed so that the
customer can prove that this payment is intended for this order
and not for some other goods or service.
Construction of Dual Signature
Purchase Request
Before the Purchase Request exchange begins, the cardholder
has completed browsing, selecting, and ordering. The end of this
preliminary phase occurs when the merchant sends a completed
order form to the customer. All of the preceding occurs without
the use of SET. The purchase request exchange consists of four
messages:
-Initiate Request.
-Initiate Response.
-Purchase Request.
-Purchase Response.
Purchase Request – Customer
Purchase Request – Customer
The cardholder prepares the Purchase Request message and generates a one-
time symmetric encryption key, Ks. The message includes the following:
1. Purchase-related information. This information will be forwarded to the
payment gateway by the merchant and consists of
- The PI
- The dual signature, calculated over the PI and OI, signed with the customer's
private signature key
- The OI message digest (OIMD)
The (OIMD) is needed for the payment gateway to verify the dual signature, as
explained previously. All of these items are encrypted with Ks. The final item is
- The digital envelope. This is formed by encrypting Ks with the payment
gateway's public key-exchange key. It is called a digital envelope because this
envelope must be opened (decrypted) before the other items listed previously
can be read. The value of Ks is not made available to the merchant. Therefore,
the merchant cannot read any of this payment-related information.
Purchase Request – Merchant
Purchase Request – Merchant
When the merchant receives the Purchase Request message, it
performs the following actions
1. Verifies the cardholder certificates by means of its Certification
authority (CA) signatures.
2. Verifies the dual signature using the customer's public signature key.
This ensures that the order has not been tampered with in transit and
that it was signed using the cardholder's private signature key.
3. Processes the order and forwards the payment information to the
payment gateway for authorization (described later).
4. Sends a purchase response to the cardholder.
Payment Gateway Authorization
The payment authorization ensures that the transaction
was approved by the issuer. This authorization guarantees
that the merchant will receive payment; the merchant can
therefore provide the services or goods to the customer.
The payment gateway performs the following tasks:
1.verifies all certificates
2.decrypts digital envelope of authorization block to obtain
symmetric key & then decrypts authorization block
3.verifies merchant's signature on authorization block
4.decrypts digital envelope of payment block to obtain
symmetric key & then decrypts payment block
Payment Gateway Authorization(Cont’d(.
5. verifies dual signature on payment block
6. verifies that transaction ID received from merchant
matches that in PI received (indirectly) from customer
7. requests & receives an authorization from issuer
8. sends authorization response back to merchant
Payment Capture
• merchant sends payment gateway a payment capture request
• gateway checks request
• then causes funds to be transferred to merchants account
• notifies merchant using capture response
Reference
• Stallings, William. Cryptography and network
security: principles and practices. Pearson
Education India, 2006.
• LI, Yang; WANG, Yun. Secure Electronic
Transaction (SET protocol). 2014.
• http://searchfinancialsecurity.techtarget.com/definition
• https://en.wikipedia.org/wiki/Secure_Electronic_Transa
Secure electronic transactions (SET)

Weitere ähnliche Inhalte

Was ist angesagt?

Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authenticationchauhankapil
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transactionHarsh Mehta
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes SHUBHA CHATURVEDI
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 

Was ist angesagt? (20)

Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
S/MIME
S/MIMES/MIME
S/MIME
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Email security
Email securityEmail security
Email security
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 

Ähnlich wie Secure electronic transactions (SET)

Electronic transaction final
Electronic transaction finalElectronic transaction final
Electronic transaction finalShikhaLohchab1
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Ajmi Siraj
 
Online Payment Solutions UK
Online Payment Solutions UKOnline Payment Solutions UK
Online Payment Solutions UKNoirepay
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Payment gateway testing
Payment gateway testingPayment gateway testing
Payment gateway testingAtul Pant
 
electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfUjwalReddyPB
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryptionijcisjournal
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...CSCJournals
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Danail Yotov
 
Payment Integration A Comprehensive Guide to Payment Gateway
Payment Integration A Comprehensive Guide to Payment GatewayPayment Integration A Comprehensive Guide to Payment Gateway
Payment Integration A Comprehensive Guide to Payment GatewayInexture Solutions
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAFirst Atlantic Commerce
 

Ähnlich wie Secure electronic transactions (SET) (20)

Electronic transaction final
Electronic transaction finalElectronic transaction final
Electronic transaction final
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
E transaction
E transactionE transaction
E transaction
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Online Payment Solutions UK
Online Payment Solutions UKOnline Payment Solutions UK
Online Payment Solutions UK
 
E Payment
E PaymentE Payment
E Payment
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Payment gateway testing
Payment gateway testingPayment gateway testing
Payment gateway testing
 
electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdf
 
Mb2420032007
Mb2420032007Mb2420032007
Mb2420032007
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
Payment Integration A Comprehensive Guide to Payment Gateway
Payment Integration A Comprehensive Guide to Payment GatewayPayment Integration A Comprehensive Guide to Payment Gateway
Payment Integration A Comprehensive Guide to Payment Gateway
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
 

Mehr von Omar Ghazi

Genetic programming
Genetic programmingGenetic programming
Genetic programmingOmar Ghazi
 
Discovery methods for HCI
Discovery methods for HCIDiscovery methods for HCI
Discovery methods for HCIOmar Ghazi
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual RealityOmar Ghazi
 
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...Omar Ghazi
 
Hybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transformsHybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transformsOmar Ghazi
 
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization
Lossy Compression Using Stationary Wavelet Transform and Vector QuantizationLossy Compression Using Stationary Wavelet Transform and Vector Quantization
Lossy Compression Using Stationary Wavelet Transform and Vector QuantizationOmar Ghazi
 
Presentation of Lossy compression
Presentation of Lossy compressionPresentation of Lossy compression
Presentation of Lossy compressionOmar Ghazi
 

Mehr von Omar Ghazi (7)

Genetic programming
Genetic programmingGenetic programming
Genetic programming
 
Discovery methods for HCI
Discovery methods for HCIDiscovery methods for HCI
Discovery methods for HCI
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...
 
Hybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transformsHybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transforms
 
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization
Lossy Compression Using Stationary Wavelet Transform and Vector QuantizationLossy Compression Using Stationary Wavelet Transform and Vector Quantization
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization
 
Presentation of Lossy compression
Presentation of Lossy compressionPresentation of Lossy compression
Presentation of Lossy compression
 

Kürzlich hochgeladen

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxMadhavi Dharankar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 

Kürzlich hochgeladen (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 

Secure electronic transactions (SET)

  • 1. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Omar Ghazi
  • 3. Agenda -Introduction for Secure Electronic Transaction (SET( ? -Requirement for SET -Key Features of SET -SET components -SET Transaction -Dual Signature -Purchase Request -Payment Gateway Authorization -Payment Capture -Reference
  • 4. Secure Electronic Transaction (SET( SET is an open encryption and security specification designed to protect credit card transactions on the Internet. The current version, SETv1, emerged from a call for security standards by MasterCard and Visa in February 1996. A wide range of companies were involved in developing the initial specification, including IBM, Microsoft, Netscape, RSA, Terisa, and Verisign. Beginning in 1996, there have been numerous tests of the concept, and by 1998 the first wave of SET-compliant products was available. SET is not itself a payment system. Rather it is a set of security formats and protocols like (Secure Sockets Layer (SSL(, Microsoft's Secure Transaction Technology (STT(, and Secure Hypertext Transfer Protocol (S- HTTP(. SET uses so me but not all aspects of a public key infrastructure (PKI( (that enables users to employ the existing credit card payment infrastructure on an open network, such as the Internet, in a secure fashion. In essence, SET provides three services:
  • 5. Secure Electronic Transactions (SET( (Cont’d(. -Provides a secure communications amongst parties. -Provides trust by the use of X.509v3 digital certificates. -Ensures privacy the restricted info to those who need it.
  • 6. Requirement for SET -Provide confidentiality of payment and ordering information -Ensure the integrity of all transmitted data -Provide authentication that a cardholder is a legitimate user of a credit card account -Provide authentication that a merchant can accept credit card transactions through its relationship with a financial institution -Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction -Create a protocol that neither depends on transport security mechanisms nor prevents their use -Facilitate and encourage interoperability among software and network providers
  • 7. Key Features of SET  Confidentiality of information  Integrity of data  Cardholder account authentication  Merchant authentication
  • 9. SET Transaction We now look at some of the cryptographic details describe the sequence of events that are required for a transaction. 1.The customer opens an account. The customer obtains a credit card account, such as MasterCard or Visa, with a bank that supports electronic payment and SET. 2.The customer receives a certificate. After suitable verification of identity, the customer receives an X.509v3 digital certificate, which is signed by the bank. The certificate verifies the customer's RSA public key and its expiration date. It also establishes a relationship, guaranteed by the bank, between the customer's key pair and his or her credit card. 3.Merchants have their own certificates. A merchant who accepts a certain brand of card must be in possession of two certificates for two public keys owned by the merchant: one for signing messages, and one for key exchange. The merchant also needs a copy of the payment gateway's public-key certificate. 4.The customer places an order. This is a process that may involve the customer first browsing through the merchant's Web site to select items and determine the price. The customer then sends a list of the items to be purchased to the merchant, who returns an order form containing the list of items, their price, a total price, and an order number. 5.The merchant is verified. In addition to the order form, the merchant sends a copy of its certificate, so that the customer can verify that he or she is dealing with a valid store.
  • 10. SET Transaction(Cont’d(. 6.The order and payment are sent. The customer sends both order and payment information to the merchant, along with the customer's certificate. The order confirms the purchase of the items in the order form. The payment contains credit card details. The payment information is encrypted in such a way that it cannot be read by the merchant. The customer's certificate enables the merchant to verify the customer. 7.The merchant requests payment authorization. The merchant sends the payment information to the payment gateway, requesting authorization that the customer's available credit is sufficient for this purchase. 8.The merchant confirms the order. The merchant sends confirmation of the order to the customer. 9.The merchant provides the goods or service. The merchant ships the goods or provides the service to the customer. 10.The merchant requests payment. This request is sent to the payment gateway, which handles all of the payment processing.
  • 11. Dual Signature Dual Signature: The purpose of the dual signature is to link two messages that are intended for two different recipients. In this case, the customer wants to send the order information (OI) to the merchant and the payment information (PI) to the bank. The merchant does not need to know the customer's credit card number, and the bank does not need to know the details of the customer's order. The customer is afforded extra protection in terms of privacy by keeping these two items separate. However, the two items must be linked in a way that can be used to resolve disputes if necessary. The link is needed so that the customer can prove that this payment is intended for this order and not for some other goods or service.
  • 12. Construction of Dual Signature
  • 13. Purchase Request Before the Purchase Request exchange begins, the cardholder has completed browsing, selecting, and ordering. The end of this preliminary phase occurs when the merchant sends a completed order form to the customer. All of the preceding occurs without the use of SET. The purchase request exchange consists of four messages: -Initiate Request. -Initiate Response. -Purchase Request. -Purchase Response.
  • 15. Purchase Request – Customer The cardholder prepares the Purchase Request message and generates a one- time symmetric encryption key, Ks. The message includes the following: 1. Purchase-related information. This information will be forwarded to the payment gateway by the merchant and consists of - The PI - The dual signature, calculated over the PI and OI, signed with the customer's private signature key - The OI message digest (OIMD) The (OIMD) is needed for the payment gateway to verify the dual signature, as explained previously. All of these items are encrypted with Ks. The final item is - The digital envelope. This is formed by encrypting Ks with the payment gateway's public key-exchange key. It is called a digital envelope because this envelope must be opened (decrypted) before the other items listed previously can be read. The value of Ks is not made available to the merchant. Therefore, the merchant cannot read any of this payment-related information.
  • 17. Purchase Request – Merchant When the merchant receives the Purchase Request message, it performs the following actions 1. Verifies the cardholder certificates by means of its Certification authority (CA) signatures. 2. Verifies the dual signature using the customer's public signature key. This ensures that the order has not been tampered with in transit and that it was signed using the cardholder's private signature key. 3. Processes the order and forwards the payment information to the payment gateway for authorization (described later). 4. Sends a purchase response to the cardholder.
  • 18. Payment Gateway Authorization The payment authorization ensures that the transaction was approved by the issuer. This authorization guarantees that the merchant will receive payment; the merchant can therefore provide the services or goods to the customer. The payment gateway performs the following tasks: 1.verifies all certificates 2.decrypts digital envelope of authorization block to obtain symmetric key & then decrypts authorization block 3.verifies merchant's signature on authorization block 4.decrypts digital envelope of payment block to obtain symmetric key & then decrypts payment block
  • 19. Payment Gateway Authorization(Cont’d(. 5. verifies dual signature on payment block 6. verifies that transaction ID received from merchant matches that in PI received (indirectly) from customer 7. requests & receives an authorization from issuer 8. sends authorization response back to merchant
  • 20. Payment Capture • merchant sends payment gateway a payment capture request • gateway checks request • then causes funds to be transferred to merchants account • notifies merchant using capture response
  • 21. Reference • Stallings, William. Cryptography and network security: principles and practices. Pearson Education India, 2006. • LI, Yang; WANG, Yun. Secure Electronic Transaction (SET protocol). 2014. • http://searchfinancialsecurity.techtarget.com/definition • https://en.wikipedia.org/wiki/Secure_Electronic_Transa