SlideShare ist ein Scribd-Unternehmen logo
1 von 32
email : rameshogania@gmail.com
Gsm : 9969 37 44 37
Intro to SSL/TLS & SET
SSL Origins
• Internet Engineering Task Force (IETF)
– www.ietf.org
– Documents: RFC 2246
• ANSI
– X9.42
• ITU
– X.509
• Netscape
Architecture
IP
TCP
SSL
Application (HTTP)
SSL security services
• Server authentication
– Client authentication is optional
• Encryption
• Message integrity
SSL phases
• Handshake
• Set protocol details
– Authenticate server
– Establish keys
• Data transfer
2/2/2016 Gene Itkis: CS558 Network Security 5
Handshake
• ClientHello
– Supported options
• ServerHello
– Options to be used
• ServerCertificate (ServerKeyExchange)
• ServerHelloDone
• ClientKeyExchange
• Finished (sent by client)
2/2/2016 Gene Itkis: CS558 Network Security 6
SSL Handshake - First PartTime
Gray areas are optional in some circumstances.
7
SSL Handshake - Second PartTime
Gray areas are optional in some circumstances.
8
Client Server
9
Application
Transport
Layer
(TCP,UDP)
Network
Layer (IP)
E'net Data
Link Layer
Ethernet
Phys. Layer
Network
Layer
E'net Data
Link Layer
E'net Phys.
Layer
Network
Layer
Process Process
Router
Buffers Packets that
need to be forwarded
(based on IP address).
Application
Transport
Layer
(TCP,UDP)
Network
Layer (IP)
Token Ring
Data-Link Layer
Token Ring
Phys. Layer
Token Ring
Data Link Layer
Token Ring
Phys. Layer
IPsec IPsec
SSL SSL
HTTPS is HTTP with SSL (Secure Socket Layer).
HTTPS uses the TLS/SSL default TCP port, port 443
10
Encrypt
HTTPS
:"Network Security Essentials: Applications and
Standards," Prentice Hall, by Wm. Stallings (ECE6612)
Web Browser or Web Server
SSL (Secure Sockets Layer)
• NOT a payment protocol -- can be used for any secure
communications, like credit card numbers
• SSL is a secure data exchange protocol providing
– Privacy between two Internet applications
– Authentication of server (authentication of browser optional)
• Uses enveloping: RSA used to exchange DES keys
• SSL Handshake Protocol
– Negotiates symmetric encryption protocol, authenticates
• SSL Record Protocol
– Packs/unpacks records, performs encryption/decryption
• Does not provide non-repudiation
WireShark* View of HTTPS (TLS = SSL) Connection
*Capture Filter: ether host 00:D0:**:**:**:*c
13
SET (Secure Electronic Transactions)
• Provides a secure communications channel among all the parties involved in a
transaction: Customer, Seller, Customer’s credit provider, Seller’s bank.
• Provides trust by the use of X.509v3 certificates.
• Ensures privacy because information is only made available to the parties that need it.
* Cardholder account authentication to the Merchant (Cardholder must have a
Certificate issued by the credit company). Merchant may issue a temporary Certificate
to issue the session is not hijacked).
* Verifies Merchant's relationship with financial institution.
* Integrity of data customer sends to Merchant (order info tied to funds transfer).
14
SET - Steps in a Transaction
1. Customer opens account with credit company or bank.
2. Bank issues X.509 cert. to the Customer with RSA Keys.
3. Merchant has two certificates, signing and key exchange.
----
4. Customer places an order.
5. The Merchant sends the customer a copy of his certificate.
6. The Customer sends Order Information (OI) encrypted so the Merchant can read
it, and Payment Information (PI) encrypted so the Merchant can not read it.
---
7. Merchant requests payment by sending PI to the “Payment Gateway” (who can
decrypt it) and verifies Customer’s credit.
8. Merchant confirms the order to the Customer.
9. Merchant ships goods to Customer.
10. Merchant sends request for payment to the Payment Gateway which handles
transfer of funds.
15
Secure Electronic Transactions (SET)
Electronic Payment Systems
Credit Card Protocols:
SSL, TLS, SET
Participants
•Issuing Bank
•Issues card
•Extends credit
•Assumes risk of card
•Cardholder reporting
Card
Associations
Merchant
•Merchant Bank (Acquirer)
•Sets up merchant
•Extends credit
•Assumes risk of merchant
•Funds merchant
Consumer
Processor Processor
TLS (Transport Layer Security)
• SSL is so important it was adopted by the Internet
Engineering Task Force (IETF)
• TLS Protocol 1.0 (RFC 2246)
• TLS is very similar to SSL but they do not interoperate
• Goals
– Separate record and handshaking protocols
– Extensibility (add new cipher suites easily)
– Efficiency (minimize network activity)
1. Customer
•pays with card
•card swiped
•mag data read
•(get signature)
5. Merchant
•stores authorizations
and sales conducted
•captures sales (at end
of day)
•submits batch for
funding
Authorizations
Batch Settlement
2.Card Authorization
via dial, lease line,
satellite
3 . Acquiring Bank’s Processor
•direct connections to MC /VI
•obtains authorization from Issuer
•returns response to merchant
•five digit number that must be stored
6. Acquiring Bank /
Processor
•scans settlement file
•verifies authorizations
match captured data
•prepares file for MC/VI
•prepares funding file
•records txs for reporting
4 . Issuing Bank / Processor
•receives auth request
•verifies available funds
•places hold on funds
7. Issuing Bank / Processor
•receives settlement file from
MC / VI
•funds MC / VI
•matches txs to auths
•post txs to cardholder
•records transactions for
reporting
8. MC / VI
debit issuers /
credit acquirers9. Acquiring Bank
funds merchant
Parties in Secure eCommerce
SET in Practice
SOURCE: http://www.software.ibm.com/commerce/payment/specsheetetill.html
SET Objectives
• Confidentiality of payment and order information
– Encryption
• Integrity of all data (digital signatures)
• Authentication of cardholder & account (certificates)
• Authentication of merchant (certificates)
• No reliance on secure transport protocols (uses TCP/IP)
• Interoperability between SET software and network
– Standardized message formats
• SET is a payment protocol
– Messages relate to various steps in a credit card transaction
Root CA
(SET Co)
Geo-Political CA (optional)
(only for VISA)
Brand CA
(MasterCard, Visa)
Merchant CA
(Banesto)
Cardholder CA
(Banesto)
Cardholder
Payment Gateway CA
(MasterCard, Banesto in VISA
Merchant Payment Gateway
SET Certificate Hierarchy
Hosted by
SOURCE: INZA.COM
SSL Vs. SET
• A part of SSL (Secure Socket Layer) is available on
customers’ browsers
– it is basically an encryption mechanism for order taking, queries and
other applications
– it does not protect against all security hazards
– it is mature, simple, and widely use
• SET ( Secure Electronic Transaction) is a very
comprehensive security protocol
– it provides for privacy, authenticity, integrity, and, or repudiation
– it is used very infrequently due to its complexity and the need for a
special card reader by the user
– it may be abandoned if it is not simplified/improved
SET Vs. SSL
Secure Electronic Transaction (SET) Secure Socket Layer (SSL)
Complex Simple
SET is tailored to the credit card
payment to the merchants.
SSL is a protocol for general-
purpose secure message
exchanges (encryption).
SET protocol hides the customer’s
credit card information from
merchants, and also hides the order
information to banks, to protect
privacy. This scheme is called dual
signature.
SSL protocol may use a certificate,
but there is no payment gateway.
So, the merchants need to receive
both the ordering information and
credit card information, because
the capturing process should be
initiated by the merchants.
Payments, Protocols and Related Issues
• SET Protocol is for Credit Card Payments
• Electronic Cash and Micropayments
• Electronic Fund Transfer on the Internet
• Stored Value Cards and Electronic Cash
• Electronic Check Systems
• Security requirements
Payments, Protocols and Related Issues (cont.)
Authentication: A way to verify the buyer’s identity before
payments are made
Integrity: Ensuring that information will not be accidentally or
maliciously altered or destroyed, usually during transmission
Encryption: A process of making messages indecipherable
except by those who have an authorized decryption key
Non-repudiation: Merchants need protection against the
customer’s unjustifiable denial of placed orders, and customers need
protection against the merchants’ unjustifiable denial of past payment
Electronic Credit Card System
on the Internet
• The Players
Cardholder
Merchant (seller)
Issuer (your bank)
Acquirer (merchant’s financial institution,
acquires the sales slips)
Brand (VISA, Master Card)
Secure Electronic Transaction (SET) Protocol
1. The message is hashed to a prefixed length of message digest.
2. The message digest is encrypted with the sender’s private signature
key, and a digital signature is created.
3. The composition of message, digital signature, and Sender’s
certificate is encrypted with the symmetric key which is generated at
sender’s computer for every transaction. The result is an encrypted
message. SET protocol uses the DES algorithm instead of RSA for
encryption because DES can be executed much faster than RSA.
4. The Symmetric key itself is encrypted with the receiver’s public key
which was sent to the sender in advance. The result is a digital
envelope.
29
Sender’s Computer
5. The encrypted message and digital envelope are transmitted to
receiver’s computer via the Internet.
6. The digital envelope is decrypted with receiver’s private exchange key.
7. Using the restored symmetric key, the encrypted message can be
restored to the message, digital signature, and sender’s certificate.
8. To confirm the integrity, the digital signature is decrypted by sender’s
public key, obtaining the message digest.
9. The delivered message is hashed to generate message digest.
10. The message digests obtained by steps 8 and 9 respectively, are
compared by the receiver to confirm whether there was any change
during the transmission. This step confirms the integrity.
Receiver’s Computer
Secure Electronic Transaction (SET)
Protocol (cont.)
30© Prentice Hall, 2000
Five Security Tips
• Don’t reveal your online Passcode to anyone. If you think your
online Passcode has been compromised, change it immediately.
• Don’t walk away from your computer if you are in the middle of a
session.
• Once you have finished conducting your banking on the Internet,
always sign off before visiting other Internet sites.
• If anyone else is likely to use your computer, clear your cache or
turn off and re-initiate your browser in order to eliminate copies of
Web pages that have been stored in your hard drive.
• Banks strongly recommends that you use a browser with 128-bit
encryption to conduct secure financial transactions over the
Internet.
Questions ?
email : rameshogania@gmail.com
Gsm : 9969 37 44 37

Weitere ähnliche Inhalte

Was ist angesagt?

Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction pptSubhash Gupta
 
Artificial Intelligence: Knowledge Acquisition
Artificial Intelligence: Knowledge AcquisitionArtificial Intelligence: Knowledge Acquisition
Artificial Intelligence: Knowledge AcquisitionThe Integral Worm
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceVinay Chaithanya
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems Haitham Ahmed
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionSaba Rathinam
 

Was ist angesagt? (20)

Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Artificial Intelligence: Knowledge Acquisition
Artificial Intelligence: Knowledge AcquisitionArtificial Intelligence: Knowledge Acquisition
Artificial Intelligence: Knowledge Acquisition
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
User authentication
User authenticationUser authentication
User authentication
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 

Andere mochten auch

Web authentication
Web authenticationWeb authentication
Web authenticationPradeep J V
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationSylvain Maret
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorizationAlexandru Pasaila
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )Monodip Singha Roy
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
The wonderful story of Web Authentication and Single-Sign On
The wonderful story of Web Authentication and Single-Sign OnThe wonderful story of Web Authentication and Single-Sign On
The wonderful story of Web Authentication and Single-Sign OnClément OUDOT
 
Inro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLInro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLDipankar Achinta
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Sylvain Maret
 
SSL/TLS그리고 암호화
SSL/TLS그리고 암호화SSL/TLS그리고 암호화
SSL/TLS그리고 암호화Hyeok Oh
 
Pmbok 4th edition chapter 11 - Project Risk Management
Pmbok 4th edition   chapter 11 - Project Risk ManagementPmbok 4th edition   chapter 11 - Project Risk Management
Pmbok 4th edition chapter 11 - Project Risk ManagementAhmad Maharma, PMP,RMP
 
P.5 ensayo de flexion
P.5 ensayo de flexionP.5 ensayo de flexion
P.5 ensayo de flexionfacasis
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 

Andere mochten auch (20)

SSL
SSLSSL
SSL
 
Ecommerce Chap 08
Ecommerce Chap 08Ecommerce Chap 08
Ecommerce Chap 08
 
Web authentication
Web authenticationWeb authentication
Web authentication
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
SSL
SSLSSL
SSL
 
The wonderful story of Web Authentication and Single-Sign On
The wonderful story of Web Authentication and Single-Sign OnThe wonderful story of Web Authentication and Single-Sign On
The wonderful story of Web Authentication and Single-Sign On
 
Inro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLInro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSL
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011
 
SSL/TLS그리고 암호화
SSL/TLS그리고 암호화SSL/TLS그리고 암호화
SSL/TLS그리고 암호화
 
Email security
Email securityEmail security
Email security
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 
Pmbok 4th edition chapter 11 - Project Risk Management
Pmbok 4th edition   chapter 11 - Project Risk ManagementPmbok 4th edition   chapter 11 - Project Risk Management
Pmbok 4th edition chapter 11 - Project Risk Management
 
P.5 ensayo de flexion
P.5 ensayo de flexionP.5 ensayo de flexion
P.5 ensayo de flexion
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 

Ähnlich wie SSL TSL;& SET

ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.pptSonukumarRawat
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesBangNgoVanCong
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptSonukumarRawat
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Understanding transport-layer_security__ssl
Understanding transport-layer_security__sslUnderstanding transport-layer_security__ssl
Understanding transport-layer_security__sslMainak Goswami
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7koolkampus
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 

Ähnlich wie SSL TSL;& SET (20)

ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
Unit -- 5.ppt
Unit -- 5.pptUnit -- 5.ppt
Unit -- 5.ppt
 
ch17.ppt
ch17.pptch17.ppt
ch17.ppt
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Secnet
SecnetSecnet
Secnet
 
Web Security
Web SecurityWeb Security
Web Security
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
E-Business security
E-Business security E-Business security
E-Business security
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Ch17
Ch17Ch17
Ch17
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Understanding transport-layer_security__ssl
Understanding transport-layer_security__sslUnderstanding transport-layer_security__ssl
Understanding transport-layer_security__ssl
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Kürzlich hochgeladen

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

SSL TSL;& SET

  • 1. email : rameshogania@gmail.com Gsm : 9969 37 44 37 Intro to SSL/TLS & SET
  • 2. SSL Origins • Internet Engineering Task Force (IETF) – www.ietf.org – Documents: RFC 2246 • ANSI – X9.42 • ITU – X.509 • Netscape
  • 4. SSL security services • Server authentication – Client authentication is optional • Encryption • Message integrity
  • 5. SSL phases • Handshake • Set protocol details – Authenticate server – Establish keys • Data transfer 2/2/2016 Gene Itkis: CS558 Network Security 5
  • 6. Handshake • ClientHello – Supported options • ServerHello – Options to be used • ServerCertificate (ServerKeyExchange) • ServerHelloDone • ClientKeyExchange • Finished (sent by client) 2/2/2016 Gene Itkis: CS558 Network Security 6
  • 7. SSL Handshake - First PartTime Gray areas are optional in some circumstances. 7
  • 8. SSL Handshake - Second PartTime Gray areas are optional in some circumstances. 8 Client Server
  • 9. 9 Application Transport Layer (TCP,UDP) Network Layer (IP) E'net Data Link Layer Ethernet Phys. Layer Network Layer E'net Data Link Layer E'net Phys. Layer Network Layer Process Process Router Buffers Packets that need to be forwarded (based on IP address). Application Transport Layer (TCP,UDP) Network Layer (IP) Token Ring Data-Link Layer Token Ring Phys. Layer Token Ring Data Link Layer Token Ring Phys. Layer IPsec IPsec SSL SSL
  • 10. HTTPS is HTTP with SSL (Secure Socket Layer). HTTPS uses the TLS/SSL default TCP port, port 443 10 Encrypt HTTPS :"Network Security Essentials: Applications and Standards," Prentice Hall, by Wm. Stallings (ECE6612) Web Browser or Web Server
  • 11. SSL (Secure Sockets Layer) • NOT a payment protocol -- can be used for any secure communications, like credit card numbers • SSL is a secure data exchange protocol providing – Privacy between two Internet applications – Authentication of server (authentication of browser optional) • Uses enveloping: RSA used to exchange DES keys • SSL Handshake Protocol – Negotiates symmetric encryption protocol, authenticates • SSL Record Protocol – Packs/unpacks records, performs encryption/decryption • Does not provide non-repudiation
  • 12. WireShark* View of HTTPS (TLS = SSL) Connection *Capture Filter: ether host 00:D0:**:**:**:*c
  • 13. 13 SET (Secure Electronic Transactions) • Provides a secure communications channel among all the parties involved in a transaction: Customer, Seller, Customer’s credit provider, Seller’s bank. • Provides trust by the use of X.509v3 certificates. • Ensures privacy because information is only made available to the parties that need it. * Cardholder account authentication to the Merchant (Cardholder must have a Certificate issued by the credit company). Merchant may issue a temporary Certificate to issue the session is not hijacked). * Verifies Merchant's relationship with financial institution. * Integrity of data customer sends to Merchant (order info tied to funds transfer).
  • 14. 14 SET - Steps in a Transaction 1. Customer opens account with credit company or bank. 2. Bank issues X.509 cert. to the Customer with RSA Keys. 3. Merchant has two certificates, signing and key exchange. ---- 4. Customer places an order. 5. The Merchant sends the customer a copy of his certificate. 6. The Customer sends Order Information (OI) encrypted so the Merchant can read it, and Payment Information (PI) encrypted so the Merchant can not read it. --- 7. Merchant requests payment by sending PI to the “Payment Gateway” (who can decrypt it) and verifies Customer’s credit. 8. Merchant confirms the order to the Customer. 9. Merchant ships goods to Customer. 10. Merchant sends request for payment to the Payment Gateway which handles transfer of funds.
  • 16. Electronic Payment Systems Credit Card Protocols: SSL, TLS, SET
  • 17. Participants •Issuing Bank •Issues card •Extends credit •Assumes risk of card •Cardholder reporting Card Associations Merchant •Merchant Bank (Acquirer) •Sets up merchant •Extends credit •Assumes risk of merchant •Funds merchant Consumer Processor Processor
  • 18. TLS (Transport Layer Security) • SSL is so important it was adopted by the Internet Engineering Task Force (IETF) • TLS Protocol 1.0 (RFC 2246) • TLS is very similar to SSL but they do not interoperate • Goals – Separate record and handshaking protocols – Extensibility (add new cipher suites easily) – Efficiency (minimize network activity)
  • 19. 1. Customer •pays with card •card swiped •mag data read •(get signature) 5. Merchant •stores authorizations and sales conducted •captures sales (at end of day) •submits batch for funding Authorizations Batch Settlement 2.Card Authorization via dial, lease line, satellite 3 . Acquiring Bank’s Processor •direct connections to MC /VI •obtains authorization from Issuer •returns response to merchant •five digit number that must be stored 6. Acquiring Bank / Processor •scans settlement file •verifies authorizations match captured data •prepares file for MC/VI •prepares funding file •records txs for reporting 4 . Issuing Bank / Processor •receives auth request •verifies available funds •places hold on funds 7. Issuing Bank / Processor •receives settlement file from MC / VI •funds MC / VI •matches txs to auths •post txs to cardholder •records transactions for reporting 8. MC / VI debit issuers / credit acquirers9. Acquiring Bank funds merchant
  • 20. Parties in Secure eCommerce
  • 21. SET in Practice SOURCE: http://www.software.ibm.com/commerce/payment/specsheetetill.html
  • 22. SET Objectives • Confidentiality of payment and order information – Encryption • Integrity of all data (digital signatures) • Authentication of cardholder & account (certificates) • Authentication of merchant (certificates) • No reliance on secure transport protocols (uses TCP/IP) • Interoperability between SET software and network – Standardized message formats • SET is a payment protocol – Messages relate to various steps in a credit card transaction
  • 23. Root CA (SET Co) Geo-Political CA (optional) (only for VISA) Brand CA (MasterCard, Visa) Merchant CA (Banesto) Cardholder CA (Banesto) Cardholder Payment Gateway CA (MasterCard, Banesto in VISA Merchant Payment Gateway SET Certificate Hierarchy Hosted by SOURCE: INZA.COM
  • 24. SSL Vs. SET • A part of SSL (Secure Socket Layer) is available on customers’ browsers – it is basically an encryption mechanism for order taking, queries and other applications – it does not protect against all security hazards – it is mature, simple, and widely use • SET ( Secure Electronic Transaction) is a very comprehensive security protocol – it provides for privacy, authenticity, integrity, and, or repudiation – it is used very infrequently due to its complexity and the need for a special card reader by the user – it may be abandoned if it is not simplified/improved
  • 25. SET Vs. SSL Secure Electronic Transaction (SET) Secure Socket Layer (SSL) Complex Simple SET is tailored to the credit card payment to the merchants. SSL is a protocol for general- purpose secure message exchanges (encryption). SET protocol hides the customer’s credit card information from merchants, and also hides the order information to banks, to protect privacy. This scheme is called dual signature. SSL protocol may use a certificate, but there is no payment gateway. So, the merchants need to receive both the ordering information and credit card information, because the capturing process should be initiated by the merchants.
  • 26. Payments, Protocols and Related Issues • SET Protocol is for Credit Card Payments • Electronic Cash and Micropayments • Electronic Fund Transfer on the Internet • Stored Value Cards and Electronic Cash • Electronic Check Systems
  • 27. • Security requirements Payments, Protocols and Related Issues (cont.) Authentication: A way to verify the buyer’s identity before payments are made Integrity: Ensuring that information will not be accidentally or maliciously altered or destroyed, usually during transmission Encryption: A process of making messages indecipherable except by those who have an authorized decryption key Non-repudiation: Merchants need protection against the customer’s unjustifiable denial of placed orders, and customers need protection against the merchants’ unjustifiable denial of past payment
  • 28. Electronic Credit Card System on the Internet • The Players Cardholder Merchant (seller) Issuer (your bank) Acquirer (merchant’s financial institution, acquires the sales slips) Brand (VISA, Master Card)
  • 29. Secure Electronic Transaction (SET) Protocol 1. The message is hashed to a prefixed length of message digest. 2. The message digest is encrypted with the sender’s private signature key, and a digital signature is created. 3. The composition of message, digital signature, and Sender’s certificate is encrypted with the symmetric key which is generated at sender’s computer for every transaction. The result is an encrypted message. SET protocol uses the DES algorithm instead of RSA for encryption because DES can be executed much faster than RSA. 4. The Symmetric key itself is encrypted with the receiver’s public key which was sent to the sender in advance. The result is a digital envelope. 29 Sender’s Computer
  • 30. 5. The encrypted message and digital envelope are transmitted to receiver’s computer via the Internet. 6. The digital envelope is decrypted with receiver’s private exchange key. 7. Using the restored symmetric key, the encrypted message can be restored to the message, digital signature, and sender’s certificate. 8. To confirm the integrity, the digital signature is decrypted by sender’s public key, obtaining the message digest. 9. The delivered message is hashed to generate message digest. 10. The message digests obtained by steps 8 and 9 respectively, are compared by the receiver to confirm whether there was any change during the transmission. This step confirms the integrity. Receiver’s Computer Secure Electronic Transaction (SET) Protocol (cont.) 30© Prentice Hall, 2000
  • 31. Five Security Tips • Don’t reveal your online Passcode to anyone. If you think your online Passcode has been compromised, change it immediately. • Don’t walk away from your computer if you are in the middle of a session. • Once you have finished conducting your banking on the Internet, always sign off before visiting other Internet sites. • If anyone else is likely to use your computer, clear your cache or turn off and re-initiate your browser in order to eliminate copies of Web pages that have been stored in your hard drive. • Banks strongly recommends that you use a browser with 128-bit encryption to conduct secure financial transactions over the Internet.
  • 32. Questions ? email : rameshogania@gmail.com Gsm : 9969 37 44 37