SlideShare a Scribd company logo
SHARDA
UNIVERSITY
MINI PROJECT
submitted to: Mr. Rupesh Jindal
Secure Electronic
Transaction
Submitted BY :
Subhash Kumar
Secure Electronic
Transaction
• An application-layer security mechanism, consisting
of a set of protocols.
• Protect credit card transaction on the Internet.
• Companies involved:– MasterCard, Visa, IBM,
Microsoft, Netscape, RSA, Cyber Cash, Net Bill
• Not an ordinary payment system.
• It has a complex technical specification
SET Business
Requirements
• Provide confidentiality of payment and ordering
information.
• Ensure the integrity of all transmitted data.
• Provide authentication that a cardholder is a ultimate
user of a credit card account
• Provide authentication that a merchant can accept
credit card transactions through its relationship with
a financial institution
SET Business Requirements (cont’d)
• Ensure the use of the best security practices and system design
techniques to protect all legitimate parties in an electronic
commerce transaction
• Create a protocol that neither depends on transport security
mechanisms nor prevents their use
• Facilitate and encourage interoperability among software and
network providers
Secure Electronic
Transaction : Protocol
• Confidentiality: All messages are encrypted
• Trust: All parties must have digital certificates
• Privacy: information made available only when and where
necessary
• Developed by Visa and MasterCard
• Designed to protect credit card transactions
Parties in SET
Implementation of SET
• Data Confidentiality  Encryption
• Who am I dealing with?  Authentication
• Message integrity  Message Digest
• Non-repudiation  Digital Signature
• Access Control  Certificate Attributes
SET Transactions
• The customer sends order and payment information to
the merchant.
• The merchant requests payment authorization from the
payment gateway prior to shipment.
• The merchant confirms order to the customer.
• The merchant provides the goods or service to the
customer.
• The merchant requests payment from the payment
gateway.
SET Transactions
Key Technologies of SET
• Confidentiality of information:
Encryption
• Integrity of data: RSA digital signatures with SHA-1 hash codes
etc
• Cardholder account authentication:
X.509v3 digital certificates with RSA signatures
• Merchant authentication:
X.509v3 digital certificates with RSA signatures
• Privacy: separation of order and payment information using
dual signatures
Dual Signatures for SET
 Concept: Link Two Messages Intended for Two Different Receivers:
• Order Information (OI): Customer to Merchant
• Payment Information (PI): Customer to Bank
 Goal: Limit Information to A “Need-to-Know” Basis:
• Merchant does not need credit card number.
• Bank does not need details of customer order.
• Afford the customer extra protection in terms of privacy by keeping
these items separate.
• This link is needed to prove that payment is intended for this order and not
some other one.
Dual Signature Operation
The operation for dual signature is as follows:
Take the hash (SHA-1) of the payment and order
information.
These two hash values are concatenated [H(PI) || H(OI)] and
then the result is hashed.
Customer encrypts the final hash with a private key
creating the dual signature.
DS = EKRC [ H(H(PI) || H(OI)) ]
SET Supported
Transactions
card holder registration
merchant registration
purchase request
payment authorization
payment capture
certificate query
purchase inquiry
 purchase notification
 sale transaction
 authorization reversal
 capture reversal
 credit reversal
Credit Card Protocols
• SSL (System Session Layer ) 1 or 2 parties have private keys
• TLS (Transport Layer Security)
• SEPP (Secure Encryption Payment Protocol)
– MasterCard, IBM, Netscape
• STT (Secure Transaction Technology)
– VISA, Microsoft
• SET (Secure Electronic Transactions)
– MasterCard, VISA all parties have certificates
Payment Process
•The payment process is broken down into two
steps:
•Payment authorization
•Payment capture
Payment Authorization• The merchant sends an authorization request message
to the payment gateway consisting of the following:
• Purchase-related information
• PI
• Dual signature calculated over the PI & OI and
signed with customer’s private key.
• The OI message digest (OIMD)
• The digital envelop
• Authorization-related information
• Certificates
Payment Authorization (cont’d)
• Authorization-related information
• An authorization block including:
• A transaction ID
• Signed with merchant’s private key
• Encrypted one-time session key
• Certificates
• Cardholder’s signature key certificate
• Merchant’s signature key certificate
• Merchant’s key exchange certificate
Payment: Payment Gateway
• Verify All Certificates
• Decrypt Authorization Block Digital Envelope to Obtain
Symmetric Key and Decrypt Block
• Verify Merchant Signature on Authorization Block
• Decrypt Payment Block Digital Envelope to Obtain
Symmetric Key and Decrypt Block
• Verify Dual Signature on Payment Block
• Verify Received Transaction ID Received from Merchant
Matches PI Received from Customer
• Request and Receive Issuer Authorization
SET Interoperability
• Software development on SET protocol
• Brokat, Entrust, Globeset, GTE, IBM, TrinTech, Verisign
• SET costs
• Software development
• Hardware and runtime increases with high volume of
transactions
THANK YOU

More Related Content

What's hot

secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
Harsh Mehta
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
Nishant Pahad
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Adarsh Kumar Yadav
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Key management
Key managementKey management
Key management
Sujata Regoti
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
United International University
 
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
Vidulatiwari
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
saurav5884
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 

What's hot (20)

secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Key management
Key managementKey management
Key management
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 

Similar to Secure electronic transaction ppt

Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
hiteshasnani94
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
chandrakaren21
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
Ramesh Ogania
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
ShujaShah
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
Kartik Kalpande Patil
 
Fdp week 1 presentation
Fdp week 1 presentationFdp week 1 presentation
Fdp week 1 presentation
shwetachanchlani
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
vishy230892
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
BangNgoVanCong
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
Dr.Florence Dayana
 
E commerce
E commerceE commerce
E commerce
Himadri Shekhar
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
SonukumarRawat
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
Mercury Processing Services International
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
حمد الشلوي
 
SET.ppt
SET.pptSET.ppt
SET.ppt
SET.pptSET.ppt
SET.ppt
witscollege
 
SET.ppt
SET.pptSET.ppt
SET.ppt
aldi219529
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Goutama Bachtiar
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
Ajmi Siraj
 

Similar to Secure electronic transaction ppt (20)

Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
Fdp week 1 presentation
Fdp week 1 presentationFdp week 1 presentation
Fdp week 1 presentation
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
 
Secnet
SecnetSecnet
Secnet
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
E commerce
E commerceE commerce
E commerce
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
Secnet
SecnetSecnet
Secnet
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 

More from Subhash Gupta

Uas
UasUas
Legal and general
Legal and generalLegal and general
Legal and general
Subhash Gupta
 
Bank of baroda
Bank of barodaBank of baroda
Bank of baroda
Subhash Gupta
 
Indian Textile Industry
Indian Textile Industry Indian Textile Industry
Indian Textile Industry
Subhash Gupta
 
GST -Effects On Consumer
GST -Effects On ConsumerGST -Effects On Consumer
GST -Effects On ConsumerSubhash Gupta
 
System Maintenance
System MaintenanceSystem Maintenance
System Maintenance
Subhash Gupta
 
Vehicle Tracking System
Vehicle Tracking SystemVehicle Tracking System
Vehicle Tracking System
Subhash Gupta
 
Motivation
MotivationMotivation
Motivation
Subhash Gupta
 

More from Subhash Gupta (8)

Uas
UasUas
Uas
 
Legal and general
Legal and generalLegal and general
Legal and general
 
Bank of baroda
Bank of barodaBank of baroda
Bank of baroda
 
Indian Textile Industry
Indian Textile Industry Indian Textile Industry
Indian Textile Industry
 
GST -Effects On Consumer
GST -Effects On ConsumerGST -Effects On Consumer
GST -Effects On Consumer
 
System Maintenance
System MaintenanceSystem Maintenance
System Maintenance
 
Vehicle Tracking System
Vehicle Tracking SystemVehicle Tracking System
Vehicle Tracking System
 
Motivation
MotivationMotivation
Motivation
 

Recently uploaded

Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 

Recently uploaded (20)

Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 

Secure electronic transaction ppt

  • 3. Secure Electronic Transaction • An application-layer security mechanism, consisting of a set of protocols. • Protect credit card transaction on the Internet. • Companies involved:– MasterCard, Visa, IBM, Microsoft, Netscape, RSA, Cyber Cash, Net Bill • Not an ordinary payment system. • It has a complex technical specification
  • 4. SET Business Requirements • Provide confidentiality of payment and ordering information. • Ensure the integrity of all transmitted data. • Provide authentication that a cardholder is a ultimate user of a credit card account • Provide authentication that a merchant can accept credit card transactions through its relationship with a financial institution
  • 5. SET Business Requirements (cont’d) • Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction • Create a protocol that neither depends on transport security mechanisms nor prevents their use • Facilitate and encourage interoperability among software and network providers
  • 6. Secure Electronic Transaction : Protocol • Confidentiality: All messages are encrypted • Trust: All parties must have digital certificates • Privacy: information made available only when and where necessary • Developed by Visa and MasterCard • Designed to protect credit card transactions
  • 8. Implementation of SET • Data Confidentiality  Encryption • Who am I dealing with?  Authentication • Message integrity  Message Digest • Non-repudiation  Digital Signature • Access Control  Certificate Attributes
  • 9. SET Transactions • The customer sends order and payment information to the merchant. • The merchant requests payment authorization from the payment gateway prior to shipment. • The merchant confirms order to the customer. • The merchant provides the goods or service to the customer. • The merchant requests payment from the payment gateway.
  • 11. Key Technologies of SET • Confidentiality of information: Encryption • Integrity of data: RSA digital signatures with SHA-1 hash codes etc • Cardholder account authentication: X.509v3 digital certificates with RSA signatures • Merchant authentication: X.509v3 digital certificates with RSA signatures • Privacy: separation of order and payment information using dual signatures
  • 12. Dual Signatures for SET  Concept: Link Two Messages Intended for Two Different Receivers: • Order Information (OI): Customer to Merchant • Payment Information (PI): Customer to Bank  Goal: Limit Information to A “Need-to-Know” Basis: • Merchant does not need credit card number. • Bank does not need details of customer order. • Afford the customer extra protection in terms of privacy by keeping these items separate. • This link is needed to prove that payment is intended for this order and not some other one.
  • 13. Dual Signature Operation The operation for dual signature is as follows: Take the hash (SHA-1) of the payment and order information. These two hash values are concatenated [H(PI) || H(OI)] and then the result is hashed. Customer encrypts the final hash with a private key creating the dual signature. DS = EKRC [ H(H(PI) || H(OI)) ]
  • 14. SET Supported Transactions card holder registration merchant registration purchase request payment authorization payment capture certificate query purchase inquiry  purchase notification  sale transaction  authorization reversal  capture reversal  credit reversal
  • 15. Credit Card Protocols • SSL (System Session Layer ) 1 or 2 parties have private keys • TLS (Transport Layer Security) • SEPP (Secure Encryption Payment Protocol) – MasterCard, IBM, Netscape • STT (Secure Transaction Technology) – VISA, Microsoft • SET (Secure Electronic Transactions) – MasterCard, VISA all parties have certificates
  • 16. Payment Process •The payment process is broken down into two steps: •Payment authorization •Payment capture
  • 17. Payment Authorization• The merchant sends an authorization request message to the payment gateway consisting of the following: • Purchase-related information • PI • Dual signature calculated over the PI & OI and signed with customer’s private key. • The OI message digest (OIMD) • The digital envelop • Authorization-related information • Certificates
  • 18. Payment Authorization (cont’d) • Authorization-related information • An authorization block including: • A transaction ID • Signed with merchant’s private key • Encrypted one-time session key • Certificates • Cardholder’s signature key certificate • Merchant’s signature key certificate • Merchant’s key exchange certificate
  • 19. Payment: Payment Gateway • Verify All Certificates • Decrypt Authorization Block Digital Envelope to Obtain Symmetric Key and Decrypt Block • Verify Merchant Signature on Authorization Block • Decrypt Payment Block Digital Envelope to Obtain Symmetric Key and Decrypt Block • Verify Dual Signature on Payment Block • Verify Received Transaction ID Received from Merchant Matches PI Received from Customer • Request and Receive Issuer Authorization
  • 20. SET Interoperability • Software development on SET protocol • Brokat, Entrust, Globeset, GTE, IBM, TrinTech, Verisign • SET costs • Software development • Hardware and runtime increases with high volume of transactions