Secure electronic transaction
Download
1 / 17

Internet Credit Card Security Issues - PowerPoint PPT Presentation


  • 349 Views
  • Updated On :

Secure Electronic Transaction. Creating Debts Online with Confidence. SET Objectives. To encrypt critical information over the internet To separate the merchant from credit card information To link payment and order information. SET. Starring. Alice as the Cardholder

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Internet Credit Card Security Issues' - omer


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Secure electronic transaction
Secure Electronic Transaction

Creating Debts Online with Confidence


Set objectives
SET Objectives

  • To encrypt critical information over the internet

  • To separate the merchant from credit card information

  • To link payment and order information


SET

Starring

  • Alice as the Cardholder

  • Bob’s Beer Delivery as the Merchant

  • Visa as the Issuer

  • Wachovia as the Acquirer/Payment Gateway


Dual signature

Dual Signature

How Bob can prove Alice paid for Natural Light and not Samuel Adams


Dual signature creation

PIMD

PI

H

E kra

DS

POMD

H

||

OI

H

OIMD

Dual Signature Creation


How bob uses the ds

!

=

How Bob Uses the DS

DS = Ekra[ H( H(PI) || H(OI) ) ]

  • DS

  • PIMD

  • OI

Ekua [ Ekra[ H( H(PI) || H(OI) ) ] ]

H( H(PI) || H(OI) )

H( PIMD || H(OI) )


How wachovia uses the ds

!

=

How Wachovia Uses the DS

DS = Ekra[ H( H(PI) || H(OI) ) ]

  • DS

  • PI

  • OIMD

Ekua [ Ekra[ H( H(PI) || H(OI) ) ] ]

H( H(PI) || H(OI) )

H( H(PI) || OIMD )


Payment processing
Payment Processing

  • Purchase Request

    • Alice to Bob’s Beer Delivery

  • Payment Authorization

    • Bob’s Beer Delivery to Wachovia

    • Wachovia to Visa


From alice to bob s beer

Sent on by Bob’s Beer Delivery to

Wachovia (Money Related)

Contains Key To Decrypt Dual Sig

(KPUB-Alice )

Used by Bob’s Beer Delivery

(Order Related)

From Alice To Bob’s Beer

PIMD

+

Order

Info

+

Dual Sig

+

Alice’s

Cert.

+

+

Dig Envelope


Payment processing1
Payment Processing

  • Purchase Request

    • Alice to Bob’s Beer Delivery

  • Payment Authorization

    • Bob’s Beer Delivery to Wachovia

    • Wachovia to Visa


From alice to bob s beer1

Sent on by Bob’s Beer Delivery to

Wachovia (Money Related)

Contains Key To Decrypt Dual Sig

(KPUB-Alice )

Used by Bob’s Beer Delivery

(Order Related)

From Alice To Bob’s Beer

PIMD

+

Order

Info

+

Dual Sig

+

Alice’s

Cert.

+

+

Dig Envelope


From alice through bob to wachovia
From Alice Through Bob To Wachovia

Money Info Encrypted Using

Symmetric Key

+

Symmetric Key Encrypted Using

Wachovia’s Public Key

Dig Envelope


Bob s beer to wachovia

KS

Bob’s Beer To Wachovia

Payment

Info

E

Dual Sig

OIMD

Temporary Symmetric Key Generated by Alice


Digital envelope

KS

KPUB-Wachovia

Digital Envelope

E

Dig Envelope


Obtaining the payment info

D

Payment

Info

KPRI-Wachovia

Dual Sig

OIMD

KS

KS

D

Obtaining The Payment Info

Dig Envelope


Set interoperability
SET Interoperability

  • Software development on SET protocol

    • Brokat, Entrust, Globeset, GTE, IBM, TrinTech, Verisign

  • SET costs

    • Software development

    • Hardware and runtime increases with high volume of transactions


Conclusion
Conclusion

  • Non-repudiation

  • Inherited credit card risks

  • Not widely used


ad