39
© Prentice Hall, 2000 Chapter 8 Electronic Payment Systems and Security 1

Electronic Payment System & Security

Embed Size (px)

DESCRIPTION

payment and security

Citation preview

Page 1: Electronic Payment System & Security

© Prentice Hall, 2000

Chapter 8Electronic Payment Systems

and Security

1

Page 2: Electronic Payment System & Security

2© Prentice Hall, 2000

Learning Objectives

Describe typical electronic payment systems for EC Identify the security requirements for safe

electronic paymentsDescribe the typical security schemes used to meet

the security requirements Identify the players and procedures of the

electronic credit card system on the InternetDiscuss the relationship between SSL and SET

protocols

Page 3: Electronic Payment System & Security

3© Prentice Hall, 2000

Discuss the relationship between electronic fund transfer and debit card

Describe the characteristics of a stored value card

Classify and describe the types of IC cards used for payments

Discuss the characteristics of electronic check systems

Learning Objectives (cont.)

Page 4: Electronic Payment System & Security

4© Prentice Hall, 2000

Security requirements

Authentication: A way to verify the buyer’s identity before payments are made

Integrity: Ensuring that information will not be accidentally or maliciously altered or destroyed, usually during transmission

Encryption: A process of making messages indecipherable except by those who have an authorized decryption key

Non-repudiation: Merchants need protection against the customer’s unjustifiable denial of placed orders, and customers need protection against the merchants’ unjustifiable denial of past payment

Page 5: Electronic Payment System & Security

5© Prentice Hall, 2000

Security SchemesThe key security schemes adopted for

electronic payment systems are : Encryption Digital signature Message digest Use of certificates and certifying authorities

Page 6: Electronic Payment System & Security

6© Prentice Hall, 2000

Security SchemesSecret Key Cryptography (symmetric / Private)

the same key is used by a sender (for encryption) and by receiver (for decryption) Data Encryption Standard (DES) algorithm is used for Data encryption. The problem with single key is that it needs to be transmitted to a counterpart.

Scrambled Message

Original Message

Sender

InternetScrambled Message

Keysender (= Keyreceiver)

Encryption

Original MessageReceiver

Keyreceiver

Decryption

Page 7: Electronic Payment System & Security

7© Prentice Hall, 2000

Security SchemesPublic Key Cryptography (Asymmetric)

Use two different keys. The public key is known to all authorized users. The

private key is known to its owner. The private key is generated at the owner’s

computer and is not sent to anyone. The message is encrypted by the receiver's public

key and it is only be decrypted with the receiver’s private key.

The RSA(Rivest, Shamir, and Adelman) algorithm is used for this purpose.

Page 8: Electronic Payment System & Security

8© Prentice Hall, 2000

Public Key Cryptography

Sender

Original Message

Scrambled Message

Scrambled Message

Public Keyreceiver

Original Message

Receiver

Private Keyreceiver

Internet

Security Schemes (cont.)

Message

Sender

Original Message

Scrambled Message

Scrambled Message

Private Keysender

Original Message

Receiver

Public Keysender

InternetDigitalSignature

Page 9: Electronic Payment System & Security

9© Prentice Hall, 2000

Digital Signature

A digital signature is attached by a sender to a message encrypted in the receiver’s public key

The receiver is the only one that can read the message and at the same time he is assured that the message was indeed sent by the sender

Sender encrypts a message with his private key

Any receiver with senders public key can read it

Security Schemes (cont.)

Analogous to handwritten signature It is used for the authentication of senders.

Page 10: Electronic Payment System & Security

10© Prentice Hall, 2000

Certificate

Name : “Richard”key-Exchange Key :Signature Key :Serial # : 29483756Other Data : 10236283025273Expires : 6/18/96Signed : CA’s Signature

Security Schemes (cont.)

Identifying the holder of a public key (Key-Exchange)

Issued by a trusted certificate authority (CA)

Page 11: Electronic Payment System & Security

11© Prentice Hall, 2000

Certificate Authority - e.g. VeriSign

RCA

BCA

GCA

CCA MCA PCA

RCA : Root Certificate AuthorityBCA : Brand Certificate AuthorityGCA : Geo-political Certificate AuthorityCCA : Cardholder Certificate AuthorityMCA : Merchant Certificate AuthorityPCA : Payment Gateway Certificate Authority

Hierarchy of Certificate AuthoritiesCertificate authority needs to be verified by a government or well trusted entity ( e.g., post office)

Security Schemes (cont.)

Public or private, comes in levels (hierarchy) A trusted third party services Issuer of digital certificates Verifying that a public key indeed belongs to a

certain individual

Page 12: Electronic Payment System & Security

12© Prentice Hall, 2000

Security Schemes (cont.)Digital Envelop

Process of encrypting a secret key with the receiver’s public key

The DES key is encrypted in this manner, because the DES key should be opened first to decrypt the message contents with the key.

Time Stamp Cryptographically unforgeable digital attestation that

a document was in existence at a particular time. A CA may keep these evidence at the CA’s computer

upon the request of customer.

Page 13: Electronic Payment System & Security

Secure Socket Layer (SSL) Protocol

1. The message is hashed to a prefixed length of message digest.2. The message digest is encrypted with the sender’s private

signature key, and a digital signature is created.3. The composition of message, digital signature, and Sender’s

certificate is encrypted with the symmetric key which is generated at sender’s computer for every transaction. The result is an encrypted message. SET protocol uses the DES algorithm instead of RSA for encryption because DES can be executed much faster than RSA.

4. The Symmetric key itself is encrypted with the receiver’s public key which was sent to the sender in advance. The result is a digital envelope.

13

Sender’s Computer

© Prentice Hall, 2000

Page 14: Electronic Payment System & Security

Sender’s ComputerSender’s Private Signature Key

Sender’s Certificate

+

+

Message

+Digital Signature

Receiver’s Certificate

Encrypt

Symmetric Key

Encrypted Message

Receiver’sKey-Exchange Key

EncryptDigital

Envelope

Message

Message Digest

14© Prentice Hall, 2000

Page 15: Electronic Payment System & Security

5. The encrypted message and digital envelope are transmitted to receiver’s computer via the Internet.

6. The digital envelope is decrypted with receiver’s private exchange key.

7. Using the restored symmetric key, the encrypted message can be restored to the message, digital signature, and sender’s certificate.

8. To confirm the integrity, the digital signature is decrypted by sender’s public key, obtaining the message digest.

9. The delivered message is hashed to generate message digest.10. The message digests obtained by steps 8 and 9 respectively, are

compared by the receiver to confirm whether there was any change during the transmission. This step confirms the integrity.

Receiver’s Computer

Secure Socket Layer (SSL) Protocol (cont.)

15© Prentice Hall, 2000

Page 16: Electronic Payment System & Security

Receiver’s Computer

DecryptSymmetric

Key

Encrypted Message

Sender’s Certificate

+

+

Message

compare

DigitalEnvelope

Receiver’s Private Key-Exchange Key

Decrypt

Message DigestDigital SignatureSender’s Public Signature Key

Decrypt

Message Digest

16© Prentice Hall, 2000

Page 17: Electronic Payment System & Security

17© Prentice Hall, 2000

Secure Electronic Transaction Protocol

Initially designed for Visa and MasterCard in 1997.SET defines the message format, certificate format

and procedure of message exchange. In SET protocol, there are four entities:

Card holder, merchant, CA, and payment gateways.The role of payment gateway is to connect the

internet and proprietary networks of bank.The software Digital Wallet or Electronic Wallet is

necessary to keep the customer’s certificate in his or her personal computer or IC Card.

Page 18: Electronic Payment System & Security

Entities of SET Protocol in Cyber Shopping

IC CardReader

Customer xCustomer y

With Digital WalletsCertificateAuthority

Electronic Shopping Mall

Merchant A Merchant B

Credit CardBrand

ProtocolX.25

Payment Gateway

18© Prentice Hall, 2000

Page 19: Electronic Payment System & Security

19© Prentice Hall, 2000

SET Vs. SSL

Secure Electronic Transaction (SET) Secure Socket Layer (SSL)

Complex Simple

SET is tailored to the credit card payment to the merchants.

SSL is a protocol for general-purpose secure message exchanges (encryption).

SET protocol hides the customer’s credit card information from merchants, and also hides the order information to banks, to protect privacy. This scheme is called dual signature.

SSL protocol may use a certificate, but there is no payment gateway. So, the merchants need to receive both the ordering information and credit card information, because the capturing process should be initiated by the merchants.

Page 20: Electronic Payment System & Security

20© Prentice Hall, 2000

SSL Vs. SET: Who Will Win?

A part of SSL (Secure Socket Layer) is available on customers’ browsers it is basically an encryption mechanism for order taking, queries and

other applications it does not protect against all security hazards it is mature, simple, and widely use

SET ( Secure Electronic Transaction) is a very comprehensive security protocol it provides for privacy, authenticity, integrity, and, or repudiation it is used very infrequently due to its complexity and the need for a

special card reader by the user it may be abandoned if it is not simplified/improved SET use digital wallet.

Page 21: Electronic Payment System & Security

21© Prentice Hall, 2000

Electronic Credit Card Systemon the Internet

The Players

Cardholder

Merchant (seller)

Issuer (your bank)

Acquirer (merchant’s financial institution, acquires the sales slips)

The Card Brand (The bank card association of issuers and acquires like VISA, Master Card)

Page 22: Electronic Payment System & Security

22© Prentice Hall, 2000

The process of using credit cards offlineA cardholder requests the issuance of a card brand (like Visa and MasterCard) to an issuer bank in which the cardholder may have an account.

Electronic Credit Card Systemon the Internet (cont.)

The authorization of card issuance by the issuer bank, or its designated brand company, may require customer’s physical visit to an office.

A plastic card is physically delivered to the customer’s address by mail. The card can be in effect as the

cardholder calls the bank for initiation and signs on the back of the card.

The cardholder shows the card to a merchant to pay a requested amount. Then the merchant asks for approval from the brand company.

Upon the approval, the merchant requests payment to the merchant’s acquirer bank, and pays fee for the service. This process is called a “capturing process”

The acquirer bank requests the issuer bank to pay for the credit amount through brand company

Page 23: Electronic Payment System & Security

Cardholder Merchantcredit card

Card Brand Company

Payment authorization, payment data

Issuer BankCardholder

Account

Acquirer BankMerchantAccount

account debit data payment data

Credit Card Procedure (offline and online)23

payment data

amount transfer

© Prentice Hall, 2000

Issue Credit Card

Page 24: Electronic Payment System & Security

24© Prentice Hall, 2000

Electronic Fund Transfer (EFT)on the Internet

An Architecture of Electronic Fund Transfer on the Internet

InternetPayer

Cyber Bank

Bank

Cyber Bank

Payee

AutomatedClearinghouse

VANBank

VAN

PaymentGateway

PaymentGateway

Page 25: Electronic Payment System & Security

25© Prentice Hall, 2000

Debit Cards (Check Card)

Card that authorizes the EFT.The debit card allows you to spend only what

is in your bank account.Frees you from carrying cash, traveler’s check,

or a checkbook.Less protection than credit card purchases for

items that are never delivered or are defective.

Page 26: Electronic Payment System & Security

26© Prentice Hall, 2000

Financial EDIIt is an EDI used for financial transactions

EDI is a standardized way of exchanging messages between businesses

EFT can be implemented using a Financial EDI systemSafe Financial EDI needs to adopt a security

scheme used for the SSL protocolExtranet encrypts the packets exchanged between

senders and receivers using the public key cryptography

Page 27: Electronic Payment System & Security

27© Prentice Hall, 2000

Electronic Cash and Micropayments

Smart Cards The concept of e-cash is used in the non-Internet

environment Plastic cards with magnetic stripes (old technology) Includes IC chips with programmable functions on

them which makes cards “smart” Recharge the card only at designated locations,

such as bank office or a kiosk. Future: recharge at your PC through internet. MCB Smart Card

Page 28: Electronic Payment System & Security

28© Prentice Hall, 2000

Representation of E-Cash SystemTo design an e-cash system, we need to

identify how to represent and move the e-cash. Electronic money with a unique value and

identification number. Stored value cards

Page 29: Electronic Payment System & Security

29© Prentice Hall, 2000

Electronic Money

DigiCash The analogy of paper money or coins Banks affiliated with DigiCash issue electronic

bills, each with a unique identification number. Expensive, as each payment transaction must be

reported to the bank and recorded Conflict with the role of central bank’s bill

issuance Legally, DigiCash is not supposed to issue more

than an electronic gift certificate even though it may be accepted by a wide number of member stores. IT IS NOT POPULAR IN REAL WORLD.

Page 30: Electronic Payment System & Security

30© Prentice Hall, 2000

Stored Value Cards

No issuance of money Debit card — a delivering vehicle of cash in an

electronic form Either anonymous or onymous Advantage of an anonymous card

the card may be given from one person to another Also implemented on the Internet without

employment of an IC card

Page 31: Electronic Payment System & Security

31© Prentice Hall, 2000

Closed Vs Open E-Cash SystemIn Closed E-Cash System, the cash value in

the IC card can only be recharged from a Bank’s account, and the used money, which was collected in the memory of IC card readers.

The direct transfer between IC cards is prohibited.

In Open E-Cash System, allow direct transfer of money value between IC Cards.

Page 32: Electronic Payment System & Security

32© Prentice Hall, 2000

Smart card-based e-cash Can be recharged at home through the Internet Can be used on the Internet as well as in a non-

Internet environmentCeiling of Stored Values

To prevent the abuse of stored values in money laundry

S$500 in Singapore; HK$3,000 in Hong KongMultiple Currencies

Can be used for cross border payments

Page 33: Electronic Payment System & Security

33© Prentice Hall, 2000

Contactless IC Cards

Proximity Card Can be read up to 1 foot from the reader. Used to access buildings and for paying in buses

and other transportation systems Bus, subway and toll card in many cities

Amplified Remote Sensing Card Good for a range of up to 100 feet, and can be

used for tolling moving vehicles at gates Pay toll without stopping (e.g. Highway 91 in

California)

Page 34: Electronic Payment System & Security

34© Prentice Hall, 2000

Electronic Check SystemElectronic implementation of paper check

system.Security schemes for e-check are basically

the same as those in SET. Only the usage procedure are different.

More important in B2B EC, a highly secured system is needed, especially for large payments.

Page 35: Electronic Payment System & Security

35© Prentice Hall, 2000

Electronic Check Systems (cont.)

Counterpart of electronic wallet To be integrated with the accounting information

system of business buyers and with the payment server of sellers

To save the electronic invoice and receipt of payment in the buyers and sellers computers for future retrieval

Example : SafeCheck

Page 36: Electronic Payment System & Security

Payer’s checkbook

agent

Payee’s check-receipt

agent

Payer PayeeIssue a check

Receipt

A/CDB

A/CDB

controlagent of payer’s bank

controlagent of payee’s bank

clearing

Checkbook,screened result

Request of screening checkissuance

present

report

payer’s bank payee’s bank

Internet

The Architecture of SafeCheck 36© Prentice Hall, 2000

Page 37: Electronic Payment System & Security

37© Prentice Hall, 2000

Integrating Payment MethodsTwo potential consolidations:

The on-line electronic check is merging with EFT The electronic check with a designated settlement date is

merging with electronic credit cardsSecurity First Network Bank (SFNB)

First cyberbank Lower service charges to challenge the service fees of

traditional banksVisa

VisaCash is a debit card ePay is an EFT service

Page 38: Electronic Payment System & Security

38© Prentice Hall, 2000

Five Security Tips Don’t reveal your online Passcode to anyone. If you think your

online Passcode has been compromised, change it immediately. Don’t walk away from your computer if you are in the middle of a

session. Once you have finished conducting your banking on the Internet,

always sign off before visiting other Internet sites. If anyone else is likely to use your computer, clear your cache or

turn off and re-initiate your browser in order to eliminate copies of Web pages that have been stored in your hard drive.

Bank of America strongly recommends that you use a browser with 128-bit encryption to conduct secure financial transactions over the Internet.

Page 39: Electronic Payment System & Security

Managerial Issues Security solution providers can cultivate the opportunity of providing

solutions for the secure electronic payment systems Electronic payment system solution providers can offer various

types of electronic payment systems to electronic stores and banks Electronic stores should select an appropriate set of electronic

payment systems Banks need to develop cyberbank services to be compatible with the

various electronic payment system Credit card brand companies need to develop an EC standard like

SET, and watch the acceptance by customers Smart card brand should develop a business model in cooperation

with application sectors and banksCertificate authority needs to identify the types of certificate to provide

39© Prentice Hall, 2000