SlideShare ist ein Scribd-Unternehmen logo
1 von 51
1
Security in Electronic Commerce Keyvan vahidy Graduate student Collage nooretouba Stno:8861097 1389
abstract
mechanismsCryptography ,[object Object],Goals of Cryptography Privacy Authenticity Determines who can read the message Determines who can write the message ,[object Object]
 Prevent alteration
 Prevent eavesdropping
 Prevent tracing,[object Object]
Type Method Symmetric Cryptography  Symmetric  Key to encrypt, decrypt equal Method Symmetric  two type: Stream cipher Block cipher
Type Method Symmetric Block cipher Stream cipher
Type Method Symmetric Stream cipher a string of data to continuously receive the encrypted Stream advantages: Diffusion Immunity insertations & modifications Stream disadvantages.: Slow encryption Error propagation
Type Method Symmetric Block cipher Into every block of data to which the blocks are individually password Block advantages: Speed of transformation Low error propagation Block disadvantages.: Low diffusion Malicious insertations & modifications possible
Encryption algorithms for security Two kinds of widely known Encryption algorithms : DES AES
Data Encryption Standard (DES) Released by NBS in 1976, based on ‘Lucifer’ Combination of substitution and transposition 16 iterations with 56-bit key (64) Based on diffusion and confusion (Shannon) Supported then adopted by NSA Can be broken (in 22 hours, parallel attack) Key length dilemma, new algorithm to be AES
Data Encryption Standard (DES) Firstly the IP (explained below) is applied to the 64 bit plaintext. The result is then divided into two 32 bit halves, named L0 and R0. Then, the following happens 16 times: Key transformation number i (a permutation, but dropping 8 bits off - defined in the specification) is applied to the key to produce 48 bits. Apply the function f(Ri,Ki+1) (explained below) to produce a 32 bit output. Exclusive OR  Li and f(Ri,Ki+1), and call this Ri+1. Make Li+1 = Ri
Data Encryption Standard (DES)
RSA Encryption 1978. By Rivest-Shamir-Adelman ) is a popular asymmetric key encryption standard. Difficulty of determinating prime factors It is based on number theory (more specifically the difficulty in factorizing a large number). The key size ranges between 512 and 2048 bits. It is used in many e-commerce applications such as the Secure Electronic Transaction (SET) protocol for credit card payment.
RSA Encryption Picks two large prime numbers p and q Multiplies p and q to obtain n Chooses d, such that d and w=(p-1)(q-1)are relatively prime (no common factor). Chooses e such that 1 = d x e mod w Public key is: <e, n> Private key is: <d, n> Message code m, secret code c c = memod n m = cd mod n
Public Key Only the decryption key is kept secret. The encryption key is made public. Each user has two keys, one secret and one public. Public keys are maintained in a public directory. To send a message M to user B, encrypt using the public key of B. B decrypts using his secret key. Signing Messages For a user Y to send a signed message M to user X. Y encrypts M using his secret key. X decrypts the message using Y’s public key.
Public Key
Public Key Infrastructure(PKI) A set of technologies and procedures to enable electronic authentication Uses public key cryptography and digital certificates Certificate life-cycle management
Public Key Infrastructure(PKI) Many products from many vendors are available for certificate issuance and some management functions Interoperability is a big issue -- especially when it comes to policies Enabling the use of PKI in applications is limited today Building and managing policies is the least understood issue
Public Key Infrastructure(PKI) Authentication and registration of certificate applicants System administration and access to signing keys Application use and interfacing Trust between hierarchies Trust decisions to be made at different points within the application need different views Certificate fields, authorization and allowed use is really the hardest issue Authorization policies for management of CAs and RAs
Public Key Infrastructure(PKI)
Message authentication code (MAC)
Malicious programs
Viruses Unauthorized software being run Games Widely distributed software Shareware Freeware Distributed software
Trojan horse A Trojan horse, or Trojan, is  that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system
computer worm a computer worm is a self-replicating. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwith, whereas viruses almost always corrupt or modify files on a targeted computer
Firewalls A firewall is a barrier placed between the private network and the outside world. All incoming and outgoing traffic must pass through it. Can be used to separate address domains. Control network traffic. Cost: ranges from no-cost (available on the Internet) to $ 100,000 hardware/software system. Types: Router-Based Host Based Circuit Gateways
View of a Firewall
Firewall Types(Router-Based)
Firewall Types(Host-Based)
Secure Protocols How to communicate securely: SSL – “the web security protocols” IPSEC – “the IP layer security protocol” SMIME – “the email security protocol” SET – “credit card transaction security protocol” S-HTTP – “Secure Hypertext Transfer Protocol” Others …
SSL ,[object Object]
Mutual Authentication
Data Encryption
Data Integrity
Operates between application and transport layersWeb Applications HTTP NNTP FTP Telnet Future Apps Etc. SSL TCP/IP
SSL and Security Attacks
IP SEC
SMIME
SET SET standard two companies by VISA, Master card with the aim of ensuring security in the credit transaction year 1997 was introduced Privacy information: credit card numbers of buyers see the seller remains hidden (using DES) Cardholder authentication: digital signatures with certificates X.509v3 Authentication vendor: Digital signature certificate X.509v3
Goal SET Maintain confidentiality and purchase order payment information Owner authentication Azaynrvkh cardholder authentication of a legitimate user is using a credit card account Maintain the integrity of data transferred kidney Ensure the safety of data transferred all Seller to provide authentication for the transaction Ensure the best security techniques and systems designed to protect all existing laws on electronic commerce transactions
Dual Signature(SET)
S-HTTP Security on application layer Protection mechanism: Digital Signature Message authentication Message encryption Support private & public key cryptograph Enhanced HTTP data exchange
S-HTTP Operate on application layer Encryption and digital signature Work only with (HTTP) Application dependant More secure than SSL at end point even after data transfer No particular cryptographic system Multiple times encryption
Electronic Mail Security E-mail is the most widely used application in the Internet. Who wants to read your mail ? Business competitors Reporters,Criminals Friends and Family Two approaches are used: PGP: Pretty Good Privacy PEM: Privacy-Enhanced Mail
E-mail Security(PGP) Available free worldwide in versions running on: DOS/Windows Unix Macintosh Based on: RSA IDEA MD5
E-mail Security(PEM) A draft Internet Standard (1993). Used with SMTP. Implemented at application layer. Provides: Disclosure protection Originator authenticity Message integrity
Transaction Security
Agents participating in a Transaction

Weitere ähnliche Inhalte

Was ist angesagt?

Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
guestfbf635
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
Sejahtera Affif
 

Was ist angesagt? (20)

Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Websphere - Introduction to ssl part ii
Websphere - Introduction to  ssl part iiWebsphere - Introduction to  ssl part ii
Websphere - Introduction to ssl part ii
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
web security
web securityweb security
web security
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
Network Security Practices-Authentication application
Network Security Practices-Authentication applicationNetwork Security Practices-Authentication application
Network Security Practices-Authentication application
 
Pgp
PgpPgp
Pgp
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
SSl and certificates
SSl and certificatesSSl and certificates
SSl and certificates
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 

Andere mochten auch (8)

[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
W Lan Userguide
W Lan UserguideW Lan Userguide
W Lan Userguide
 
Chap5pp
Chap5ppChap5pp
Chap5pp
 
Supervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsSupervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisors
 
Penguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationPenguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public Administration
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 

Ähnlich wie Secrity project keyvan

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
drkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
 

Ähnlich wie Secrity project keyvan (20)

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Websphere - About Websphere ssl part ii
Websphere -  About Websphere ssl part iiWebsphere -  About Websphere ssl part ii
Websphere - About Websphere ssl part ii
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
security issue
security issuesecurity issue
security issue
 
E banking security
E banking securityE banking security
E banking security
 
Network Security
Network SecurityNetwork Security
Network Security
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 

Secrity project keyvan

  • 1. 1
  • 2. Security in Electronic Commerce Keyvan vahidy Graduate student Collage nooretouba Stno:8861097 1389
  • 4.
  • 7.
  • 8. Type Method Symmetric Cryptography Symmetric Key to encrypt, decrypt equal Method Symmetric two type: Stream cipher Block cipher
  • 9. Type Method Symmetric Block cipher Stream cipher
  • 10. Type Method Symmetric Stream cipher a string of data to continuously receive the encrypted Stream advantages: Diffusion Immunity insertations & modifications Stream disadvantages.: Slow encryption Error propagation
  • 11. Type Method Symmetric Block cipher Into every block of data to which the blocks are individually password Block advantages: Speed of transformation Low error propagation Block disadvantages.: Low diffusion Malicious insertations & modifications possible
  • 12. Encryption algorithms for security Two kinds of widely known Encryption algorithms : DES AES
  • 13. Data Encryption Standard (DES) Released by NBS in 1976, based on ‘Lucifer’ Combination of substitution and transposition 16 iterations with 56-bit key (64) Based on diffusion and confusion (Shannon) Supported then adopted by NSA Can be broken (in 22 hours, parallel attack) Key length dilemma, new algorithm to be AES
  • 14. Data Encryption Standard (DES) Firstly the IP (explained below) is applied to the 64 bit plaintext. The result is then divided into two 32 bit halves, named L0 and R0. Then, the following happens 16 times: Key transformation number i (a permutation, but dropping 8 bits off - defined in the specification) is applied to the key to produce 48 bits. Apply the function f(Ri,Ki+1) (explained below) to produce a 32 bit output. Exclusive OR Li and f(Ri,Ki+1), and call this Ri+1. Make Li+1 = Ri
  • 16. RSA Encryption 1978. By Rivest-Shamir-Adelman ) is a popular asymmetric key encryption standard. Difficulty of determinating prime factors It is based on number theory (more specifically the difficulty in factorizing a large number). The key size ranges between 512 and 2048 bits. It is used in many e-commerce applications such as the Secure Electronic Transaction (SET) protocol for credit card payment.
  • 17. RSA Encryption Picks two large prime numbers p and q Multiplies p and q to obtain n Chooses d, such that d and w=(p-1)(q-1)are relatively prime (no common factor). Chooses e such that 1 = d x e mod w Public key is: <e, n> Private key is: <d, n> Message code m, secret code c c = memod n m = cd mod n
  • 18. Public Key Only the decryption key is kept secret. The encryption key is made public. Each user has two keys, one secret and one public. Public keys are maintained in a public directory. To send a message M to user B, encrypt using the public key of B. B decrypts using his secret key. Signing Messages For a user Y to send a signed message M to user X. Y encrypts M using his secret key. X decrypts the message using Y’s public key.
  • 20. Public Key Infrastructure(PKI) A set of technologies and procedures to enable electronic authentication Uses public key cryptography and digital certificates Certificate life-cycle management
  • 21. Public Key Infrastructure(PKI) Many products from many vendors are available for certificate issuance and some management functions Interoperability is a big issue -- especially when it comes to policies Enabling the use of PKI in applications is limited today Building and managing policies is the least understood issue
  • 22. Public Key Infrastructure(PKI) Authentication and registration of certificate applicants System administration and access to signing keys Application use and interfacing Trust between hierarchies Trust decisions to be made at different points within the application need different views Certificate fields, authorization and allowed use is really the hardest issue Authorization policies for management of CAs and RAs
  • 26. Viruses Unauthorized software being run Games Widely distributed software Shareware Freeware Distributed software
  • 27. Trojan horse A Trojan horse, or Trojan, is that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system
  • 28. computer worm a computer worm is a self-replicating. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwith, whereas viruses almost always corrupt or modify files on a targeted computer
  • 29. Firewalls A firewall is a barrier placed between the private network and the outside world. All incoming and outgoing traffic must pass through it. Can be used to separate address domains. Control network traffic. Cost: ranges from no-cost (available on the Internet) to $ 100,000 hardware/software system. Types: Router-Based Host Based Circuit Gateways
  • 30. View of a Firewall
  • 33. Secure Protocols How to communicate securely: SSL – “the web security protocols” IPSEC – “the IP layer security protocol” SMIME – “the email security protocol” SET – “credit card transaction security protocol” S-HTTP – “Secure Hypertext Transfer Protocol” Others …
  • 34.
  • 38. Operates between application and transport layersWeb Applications HTTP NNTP FTP Telnet Future Apps Etc. SSL TCP/IP
  • 39. SSL and Security Attacks
  • 41. SMIME
  • 42. SET SET standard two companies by VISA, Master card with the aim of ensuring security in the credit transaction year 1997 was introduced Privacy information: credit card numbers of buyers see the seller remains hidden (using DES) Cardholder authentication: digital signatures with certificates X.509v3 Authentication vendor: Digital signature certificate X.509v3
  • 43. Goal SET Maintain confidentiality and purchase order payment information Owner authentication Azaynrvkh cardholder authentication of a legitimate user is using a credit card account Maintain the integrity of data transferred kidney Ensure the safety of data transferred all Seller to provide authentication for the transaction Ensure the best security techniques and systems designed to protect all existing laws on electronic commerce transactions
  • 45. S-HTTP Security on application layer Protection mechanism: Digital Signature Message authentication Message encryption Support private & public key cryptograph Enhanced HTTP data exchange
  • 46. S-HTTP Operate on application layer Encryption and digital signature Work only with (HTTP) Application dependant More secure than SSL at end point even after data transfer No particular cryptographic system Multiple times encryption
  • 47. Electronic Mail Security E-mail is the most widely used application in the Internet. Who wants to read your mail ? Business competitors Reporters,Criminals Friends and Family Two approaches are used: PGP: Pretty Good Privacy PEM: Privacy-Enhanced Mail
  • 48. E-mail Security(PGP) Available free worldwide in versions running on: DOS/Windows Unix Macintosh Based on: RSA IDEA MD5
  • 49. E-mail Security(PEM) A draft Internet Standard (1993). Used with SMTP. Implemented at application layer. Provides: Disclosure protection Originator authenticity Message integrity
  • 51. Agents participating in a Transaction
  • 52. Agents participating in a Transaction Financial Audit Institute (Acquirer): A financial institution required with the following tasks: Open an Account for Sellers Ceiling set and enabled them credit cards Deposit amount received by the card vendor account Payment Gateway (Payment Gateway): processing messages and vendor payments by the Acquirer or the third person Reference Certification (CA): X509 certificate issuer for cards owners, sellers, and payment gateway
  • 53. Payment Gatway Verify all certificates Decrypt the digital license to obtain and decrypt the symmetric key block Verify the sign vendor Decrypt digital pay to obtain and decrypt the symmetric key block Verify the signature block double payment Requested and received permission Sender
  • 57. Thank you for your attention dear