39
SET SECURE ELECTRONIC TRANSACTIONS

Secure Electronic Transaction (SET)

Embed Size (px)

Citation preview

Page 1: Secure Electronic Transaction (SET)

SETSECURE ELECTRONIC TRANSACTIONS

Page 2: Secure Electronic Transaction (SET)

“Use your mentality, Wake up to reality”

---From the song, “I've got you under my skin” by Cole Porter

Page 3: Secure Electronic Transaction (SET)

Ctrl-V Members

Taimoor Hussain (Roll No. 59) Wajid Ali (Roll No. 58) Shahid Iqbal (Roll No. 22)

Page 4: Secure Electronic Transaction (SET)

Outline

Background SET Security Architecture

Mandatory Digital Certificates Dual Signatures Digital Wallet

Complexity

Page 5: Secure Electronic Transaction (SET)

Outline

Attempted Solutions SET / EMV 3-D SET

Conclusion References

Page 6: Secure Electronic Transaction (SET)

Background

Alternative Shopping Method in 1996 Cryptography as a magic-pill PKC (Public Key Cryptography)

Encryption Digital Signature Entity Authentication

Page 7: Secure Electronic Transaction (SET)

SET ?

Invented by GTE, IBM, MasterCard, Microsoft, Netscape, SAIC, Terisa Systems, VeriSign, and Visa.

Symmetric & Asymmetric Cryptography 3-DES & 1024-bit RSA

Fill security issues of SSL / TLS Software and Hardware Public Key Certificates Digital Signatures

Page 8: Secure Electronic Transaction (SET)

SET Participants• Authorized holder of a payment card

that has been issued by an issuer.Card Holder

• A person or organization with goods or services to sell to the cardholder.Merchant

• Financial institution that provides the cardholder with the payment card.

Issuer

• Financial institution that establishes an account with a merchant and processes payment card authorizations and payments.

Acquirer

Page 9: Secure Electronic Transaction (SET)

SET Participants

• Function interface between SET and the existing bankcard payment networks or authorization and payment functions.

Payment Gateway

• An entity that is trusted to issue X.509v3 public‐key certificates for cardholders, merchants, and payment gateways.

Certificate Authority

Page 10: Secure Electronic Transaction (SET)

Important Features

• 3-DESConfidentiality

• RSA digital Signature, using SHA-1 hash CodeIntegrity

• X.509v3 digital certificates with RSA signatures to legitimate the Cardholder Account.

Cardholder Authentication

• X.509v3 digital certificates with RSA signatures to legitimate the Merchant Account.

Merchant Authentication

Page 11: Secure Electronic Transaction (SET)

SET Components and Participants

Page 12: Secure Electronic Transaction (SET)

Security Architecture

Utilizes PKI to address limitations found in SSL/TLS.

Page 13: Secure Electronic Transaction (SET)

Mandatory Digital Certificates

use of digital signatures to authenticate identity of customer and merchant.

Page 14: Secure Electronic Transaction (SET)

Mandatory Digital Certificates

CA issues Digital Certificates to the Issuing Bank or ‘The Issuer’ (CERTISS = Sign(SKCA)[PKISS])

the Acquiring Bank or ‘The Acquirer’ (CERTACC = Sign(SKCA)[PKACC])

Customer gets its own Digital Certificate from the Issuing Bank CERTCUS = Sign(SKISS)[PKCUS]

Merchant gets its own Digital Certificate from the Acquiring bank CERTMER = Sign(SKISS)[PKMER]

Page 15: Secure Electronic Transaction (SET)

Mandatory Digital Certificates Process

Asymmetric key pair for the customer must be generated. E-consumer’s public key must be sent to the customer’s bank

(‘the issuer’). Generates a public key certificate for the customer using the

issuer’s private signature key. System “root” public key along with customer’s public key. Customer’s private key is saved to Digital Wallet with password

protected.

Page 16: Secure Electronic Transaction (SET)

Dual Signature

To link two messages that are going to different recipients. Order Information (OI): Customer to Merchant Payment Information (PI): Customer to Bank

The customer needs to send OI and PI to merchant and bank respectively.

The merchant does not need to know the customers credit card number.

The bank does not need to know what the customer is buying.

Page 17: Secure Electronic Transaction (SET)

Dual Signature

The operation for dual signature is as follows: Take the hash (SHA-1) of the payment and order information. These two hash values are concatenated [H(PI) || H(OI)] and then the result is

hashed. Customer encrypts the final hash with a private key creating the dual signature.

DS = EKRC [ H(H(PI) || H(OI)) ]

Page 18: Secure Electronic Transaction (SET)

DS Verification by Merchant

The merchant has the public key of the customer obtained from the customer’s certificate.

Now, the merchant can compute two values:H(PIMD || H(OI))DKUC[DS]

Should be equal!

Page 19: Secure Electronic Transaction (SET)

DS Verification by Bank

The bank is in possession of DS, PI, the message digest for OI (OIMD), and the customer’s public key, then the bank can compute the following:

H(H(PI) || OIMD)DKUC [ DS ]

Page 20: Secure Electronic Transaction (SET)

Digital Wallet

For Customer’s self Authentication. By Password Private key is gotten

Transmits OI and PI Encrypted with separate public keys to Merchant

Sign(SKCUS) {E(PKMER)[OI]|E(PKACC)[PI]}

Merchant sent it to The issuing bank and the acquiring bank to verify

Page 21: Secure Electronic Transaction (SET)

SET Process

The customer opens an account with a card issuer. MasterCard, Visa, etc.

The customer receives a X.509 V3 certificate signed by a bank. X.509 V3

A merchant who accepts a certain brand of card must possess two X.509 V3 certificates.

One for signing & one for key exchange

The customer places an order for a product or service with a merchant’s website.

The merchant sends a copy of its certificate for verification.

Page 22: Secure Electronic Transaction (SET)

SET Process

The customer sends order and payment information to the merchant.

The merchant requests payment authorization from the payment gateway prior to shipment.

The merchant confirms order to the customer. The merchant provides the goods or service to the customer. The merchant requests payment from the payment gateway.

Page 23: Secure Electronic Transaction (SET)

SET Process

Page 24: Secure Electronic Transaction (SET)

Complexity of SET

“Magic Pill” became “Toxic Pill”. PKI and registration process is a massive overhead (By Bellis). PKI is not compatible with the infrastructure(1990s) because

Merchants can’t see Credit Card Numbers (By Treese and Stewart).

Overhead for obtaining the digital certificates and Special software must be installed on both sides (C-M) and Private key is stored in Digital Wallet with Password Protected but Password Protection on system is not secure (By Lieb).

e-commerce transactions slow (By Whinnet) Users sometimes interrupted the transactions.

Page 25: Secure Electronic Transaction (SET)

ATTEMPTED SOLUTIONS TO SET PROBLEMS

Included in SET PIN Chip Server Based Digital Wallet

Page 26: Secure Electronic Transaction (SET)

ATTEMPTED SOLUTIONS TO SET

SET / EMV 3-D SET

Page 27: Secure Electronic Transaction (SET)

SET / EMV

PIN and Chip To the secrecy of private keys

PIN extensions provided authentication process. Magnetic Strips were replaced by IC Cards

Used without separate merchant terminals No need to generate key pairs and certificates for consumers

Already in IC Cards No longer Private Key in PC

IC Card

Page 28: Secure Electronic Transaction (SET)

SET / EMV Problems

Required an additional IC Card Reader with Consumer PC Complex Cryptographic mechanisms POS (Point of Sale) for Merchants to communicate

from Cardholder With Payment Gateway (installed on acquiring bank’s servers)

Page 29: Secure Electronic Transaction (SET)

3-D SET

Server-based wallet extensions based on three-domain (3D) architecture

Digital wallet software and the digital certificate on issuer’s server Enabled the payment gateway and merchant certificates to be kept

at an acquirer server 3D SET was built upon the relationships between three ‘domains’ :

acquirer (the relationship between the merchant and the acquiring’s bank)

Issuer (the relationship between the cardholder/consumer and the issuer) Interoperability (the acquirer and issuer domains are supported by the

inter-operability domain)

Page 30: Secure Electronic Transaction (SET)

3-D SET

Complex cryptographic mechanisms Did not require an additional device

Page 31: Secure Electronic Transaction (SET)

Conclusion

SET was not rejected if It had the same architecture like 3-D SET

3-D SET was the new Design as a Magic Pill

Page 32: Secure Electronic Transaction (SET)

References

[1] S. Farrell and M. Zolotarev, “XML and PKI-what’s the story?”Network Security, vol. 2001, pp. 7-10, September 2001.

[2] F. Piper, “Some trends in research in cryptography and securitymechanisms,” Computers and Security, vol. 22, pp. 22-25, January2003.

[3] L. Loeb, Secure Electronic Transactions: Introduction and TechnicalReference, Boston: Artech House, 1998.

[4] M. S. Merkow, J. Breithaupt, and K. L. Wheeler, Building SETApplications for Secure Transactions, John Wiley and Sons, New

York, 1998.[5] Secure Electronic Transaction LLC (SETCo), SET Secure Electronic

Transaction Specification, version 1.0 ed., May 1997.

Page 33: Secure Electronic Transaction (SET)

References

[6] K. Chen, H. Lee, and B. Mayer, “The impact of security control onbusiness-to-consumer electronic commerce,” Human SystemsManagement, vol. 20, no. 2, pp. 139,147, 2001.

[7] D. Birch, “Secure electronic commerce – i: The certificate businesspublic key infrastructure will be big business,” Computer Law &Security Review, vol. 13, no. 6, pp. 454-456, 1997.

[8] http://www.informit.com/articles/article.aspx?p=26857

[9] http://www.slideshare.net/HARRY-MEHTA/secure-electronics-transaction

[10] E. Bellis, Beautiful Security, ch. Beautiful Trade: RethinkingE-Commerce Security, Sebastopol: O’Reilly, 2009.

Page 34: Secure Electronic Transaction (SET)

References

[11] G. W. Treese and L. C. Stewart, Designing Systems for InternetCommerce, Massachusetts: Addison-Wesley, 1998.

[12] J. Lieb, “Getting secure online-an overview,” Commerce Net-TheStrategies Report, vol. 1, pp. 1-4, July 1999.

[13] Ford and M. S. Baum, Secure Electronic Commerce, Prentice Hall,2001.

[14] Secure Electronic Transaction LLC (SETCo), Common Chip Extension-Application for SETCo Approval, version 1.0 ed., September 1999.

[15] Secure Electronic Transaction LLC (SETCo), Online PIN Extensionsto SET Secure Electronic Transaction, version 1.0 ed., May 1999.

Page 35: Secure Electronic Transaction (SET)

References

[16] P. Jarupunphol and C. J. Mitchell, “Measuring SSL and SET againste-commerce consumer requirements,” in Proceedings of theInternational Network Conference (INC 2002), Plymouth UniversityPress, pp. 323-330, July 2002.

[17] P. Jarupunphol and C. J. Mitchell, “The future of SET,” in Proceedings of UKAIS 2002, Leeds Metropolitan University, pp. 9-17, April 2002.

[18] IBM e-business, Internet Wallet Choices and Answers for Business and Technical Managers, 1999

[19] P. Jarupunphol, “A critical analysis of 3-D Secure,” in Proceedings ofthe 3rd Electronic Commerce Research and Development (E-COM-03),Gdansk, Poland, pp. 87-94, October 2003.

[20] R. Anderson, Security Engineering-A Guide to Building DependableDistributed Systems. John Wiley and Sons, 2001.

Page 36: Secure Electronic Transaction (SET)

References

[21] K. Wrona, M. Schuba, and G. Zavagli, “Mobile payment- state of the art and open problems,” in Proceedings of 2nd

International Workshop IACSIT International Journal ofEngineering and Technology, Vol. 5, No. 2, April 2013 WELCOM(L. Fiege, G. Mühl, and U. G. Wilhelm, eds.), Lecture Notes in Computer Science,

Springer-Verlag, Berlin, vol. 2232, pp. 88-100, 2001.

[22] http://www.slideshare.net/Slyoldawg/jlfrank-sinatra

[23] Network Security Essentials: Applications and Standards By William Stalling

Page 37: Secure Electronic Transaction (SET)
Page 38: Secure Electronic Transaction (SET)
Page 39: Secure Electronic Transaction (SET)