Upload
syed-shah
View
682
Download
3
Embed Size (px)
Citation preview
SETSECURE ELECTRONIC TRANSACTIONS
“Use your mentality, Wake up to reality”
---From the song, “I've got you under my skin” by Cole Porter
Ctrl-V Members
Taimoor Hussain (Roll No. 59) Wajid Ali (Roll No. 58) Shahid Iqbal (Roll No. 22)
Outline
Background SET Security Architecture
Mandatory Digital Certificates Dual Signatures Digital Wallet
Complexity
Outline
Attempted Solutions SET / EMV 3-D SET
Conclusion References
Background
Alternative Shopping Method in 1996 Cryptography as a magic-pill PKC (Public Key Cryptography)
Encryption Digital Signature Entity Authentication
SET ?
Invented by GTE, IBM, MasterCard, Microsoft, Netscape, SAIC, Terisa Systems, VeriSign, and Visa.
Symmetric & Asymmetric Cryptography 3-DES & 1024-bit RSA
Fill security issues of SSL / TLS Software and Hardware Public Key Certificates Digital Signatures
SET Participants• Authorized holder of a payment card
that has been issued by an issuer.Card Holder
• A person or organization with goods or services to sell to the cardholder.Merchant
• Financial institution that provides the cardholder with the payment card.
Issuer
• Financial institution that establishes an account with a merchant and processes payment card authorizations and payments.
Acquirer
SET Participants
• Function interface between SET and the existing bankcard payment networks or authorization and payment functions.
Payment Gateway
• An entity that is trusted to issue X.509v3 public‐key certificates for cardholders, merchants, and payment gateways.
Certificate Authority
Important Features
• 3-DESConfidentiality
• RSA digital Signature, using SHA-1 hash CodeIntegrity
• X.509v3 digital certificates with RSA signatures to legitimate the Cardholder Account.
Cardholder Authentication
• X.509v3 digital certificates with RSA signatures to legitimate the Merchant Account.
Merchant Authentication
SET Components and Participants
Security Architecture
Utilizes PKI to address limitations found in SSL/TLS.
Mandatory Digital Certificates
use of digital signatures to authenticate identity of customer and merchant.
Mandatory Digital Certificates
CA issues Digital Certificates to the Issuing Bank or ‘The Issuer’ (CERTISS = Sign(SKCA)[PKISS])
the Acquiring Bank or ‘The Acquirer’ (CERTACC = Sign(SKCA)[PKACC])
Customer gets its own Digital Certificate from the Issuing Bank CERTCUS = Sign(SKISS)[PKCUS]
Merchant gets its own Digital Certificate from the Acquiring bank CERTMER = Sign(SKISS)[PKMER]
Mandatory Digital Certificates Process
Asymmetric key pair for the customer must be generated. E-consumer’s public key must be sent to the customer’s bank
(‘the issuer’). Generates a public key certificate for the customer using the
issuer’s private signature key. System “root” public key along with customer’s public key. Customer’s private key is saved to Digital Wallet with password
protected.
Dual Signature
To link two messages that are going to different recipients. Order Information (OI): Customer to Merchant Payment Information (PI): Customer to Bank
The customer needs to send OI and PI to merchant and bank respectively.
The merchant does not need to know the customers credit card number.
The bank does not need to know what the customer is buying.
Dual Signature
The operation for dual signature is as follows: Take the hash (SHA-1) of the payment and order information. These two hash values are concatenated [H(PI) || H(OI)] and then the result is
hashed. Customer encrypts the final hash with a private key creating the dual signature.
DS = EKRC [ H(H(PI) || H(OI)) ]
DS Verification by Merchant
The merchant has the public key of the customer obtained from the customer’s certificate.
Now, the merchant can compute two values:H(PIMD || H(OI))DKUC[DS]
Should be equal!
DS Verification by Bank
The bank is in possession of DS, PI, the message digest for OI (OIMD), and the customer’s public key, then the bank can compute the following:
H(H(PI) || OIMD)DKUC [ DS ]
Digital Wallet
For Customer’s self Authentication. By Password Private key is gotten
Transmits OI and PI Encrypted with separate public keys to Merchant
Sign(SKCUS) {E(PKMER)[OI]|E(PKACC)[PI]}
Merchant sent it to The issuing bank and the acquiring bank to verify
SET Process
The customer opens an account with a card issuer. MasterCard, Visa, etc.
The customer receives a X.509 V3 certificate signed by a bank. X.509 V3
A merchant who accepts a certain brand of card must possess two X.509 V3 certificates.
One for signing & one for key exchange
The customer places an order for a product or service with a merchant’s website.
The merchant sends a copy of its certificate for verification.
SET Process
The customer sends order and payment information to the merchant.
The merchant requests payment authorization from the payment gateway prior to shipment.
The merchant confirms order to the customer. The merchant provides the goods or service to the customer. The merchant requests payment from the payment gateway.
SET Process
Complexity of SET
“Magic Pill” became “Toxic Pill”. PKI and registration process is a massive overhead (By Bellis). PKI is not compatible with the infrastructure(1990s) because
Merchants can’t see Credit Card Numbers (By Treese and Stewart).
Overhead for obtaining the digital certificates and Special software must be installed on both sides (C-M) and Private key is stored in Digital Wallet with Password Protected but Password Protection on system is not secure (By Lieb).
e-commerce transactions slow (By Whinnet) Users sometimes interrupted the transactions.
ATTEMPTED SOLUTIONS TO SET PROBLEMS
Included in SET PIN Chip Server Based Digital Wallet
ATTEMPTED SOLUTIONS TO SET
SET / EMV 3-D SET
SET / EMV
PIN and Chip To the secrecy of private keys
PIN extensions provided authentication process. Magnetic Strips were replaced by IC Cards
Used without separate merchant terminals No need to generate key pairs and certificates for consumers
Already in IC Cards No longer Private Key in PC
IC Card
SET / EMV Problems
Required an additional IC Card Reader with Consumer PC Complex Cryptographic mechanisms POS (Point of Sale) for Merchants to communicate
from Cardholder With Payment Gateway (installed on acquiring bank’s servers)
3-D SET
Server-based wallet extensions based on three-domain (3D) architecture
Digital wallet software and the digital certificate on issuer’s server Enabled the payment gateway and merchant certificates to be kept
at an acquirer server 3D SET was built upon the relationships between three ‘domains’ :
acquirer (the relationship between the merchant and the acquiring’s bank)
Issuer (the relationship between the cardholder/consumer and the issuer) Interoperability (the acquirer and issuer domains are supported by the
inter-operability domain)
3-D SET
Complex cryptographic mechanisms Did not require an additional device
Conclusion
SET was not rejected if It had the same architecture like 3-D SET
3-D SET was the new Design as a Magic Pill
References
[1] S. Farrell and M. Zolotarev, “XML and PKI-what’s the story?”Network Security, vol. 2001, pp. 7-10, September 2001.
[2] F. Piper, “Some trends in research in cryptography and securitymechanisms,” Computers and Security, vol. 22, pp. 22-25, January2003.
[3] L. Loeb, Secure Electronic Transactions: Introduction and TechnicalReference, Boston: Artech House, 1998.
[4] M. S. Merkow, J. Breithaupt, and K. L. Wheeler, Building SETApplications for Secure Transactions, John Wiley and Sons, New
York, 1998.[5] Secure Electronic Transaction LLC (SETCo), SET Secure Electronic
Transaction Specification, version 1.0 ed., May 1997.
References
[6] K. Chen, H. Lee, and B. Mayer, “The impact of security control onbusiness-to-consumer electronic commerce,” Human SystemsManagement, vol. 20, no. 2, pp. 139,147, 2001.
[7] D. Birch, “Secure electronic commerce – i: The certificate businesspublic key infrastructure will be big business,” Computer Law &Security Review, vol. 13, no. 6, pp. 454-456, 1997.
[8] http://www.informit.com/articles/article.aspx?p=26857
[9] http://www.slideshare.net/HARRY-MEHTA/secure-electronics-transaction
[10] E. Bellis, Beautiful Security, ch. Beautiful Trade: RethinkingE-Commerce Security, Sebastopol: O’Reilly, 2009.
References
[11] G. W. Treese and L. C. Stewart, Designing Systems for InternetCommerce, Massachusetts: Addison-Wesley, 1998.
[12] J. Lieb, “Getting secure online-an overview,” Commerce Net-TheStrategies Report, vol. 1, pp. 1-4, July 1999.
[13] Ford and M. S. Baum, Secure Electronic Commerce, Prentice Hall,2001.
[14] Secure Electronic Transaction LLC (SETCo), Common Chip Extension-Application for SETCo Approval, version 1.0 ed., September 1999.
[15] Secure Electronic Transaction LLC (SETCo), Online PIN Extensionsto SET Secure Electronic Transaction, version 1.0 ed., May 1999.
References
[16] P. Jarupunphol and C. J. Mitchell, “Measuring SSL and SET againste-commerce consumer requirements,” in Proceedings of theInternational Network Conference (INC 2002), Plymouth UniversityPress, pp. 323-330, July 2002.
[17] P. Jarupunphol and C. J. Mitchell, “The future of SET,” in Proceedings of UKAIS 2002, Leeds Metropolitan University, pp. 9-17, April 2002.
[18] IBM e-business, Internet Wallet Choices and Answers for Business and Technical Managers, 1999
[19] P. Jarupunphol, “A critical analysis of 3-D Secure,” in Proceedings ofthe 3rd Electronic Commerce Research and Development (E-COM-03),Gdansk, Poland, pp. 87-94, October 2003.
[20] R. Anderson, Security Engineering-A Guide to Building DependableDistributed Systems. John Wiley and Sons, 2001.
References
[21] K. Wrona, M. Schuba, and G. Zavagli, “Mobile payment- state of the art and open problems,” in Proceedings of 2nd
International Workshop IACSIT International Journal ofEngineering and Technology, Vol. 5, No. 2, April 2013 WELCOM(L. Fiege, G. Mühl, and U. G. Wilhelm, eds.), Lecture Notes in Computer Science,
Springer-Verlag, Berlin, vol. 2232, pp. 88-100, 2001.
[22] http://www.slideshare.net/Slyoldawg/jlfrank-sinatra
[23] Network Security Essentials: Applications and Standards By William Stalling