Onno W. Purbo Onno@indo.net.id Security Digital Cash Onno W. Purbo Onno@indo.net.id.

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

Payment Gateway Onno W. Purbo Issu Utama Payment Method Security Certificate Authority Cyberlaw.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Encryption Methods By: Michael A. Scott
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 21 Distributed System Security Copyright © 2008.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Security Digital Cash Onno W. Purbo
Csci5233 computer security & integrity 1 Cryptography: an overview.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
1 Buyer 2. Account ID Valid? 3. Account OK! 5. Transaction Details 1. Account ID 4. Information Goods 6. Satisfied? 7. Accept/Reject or Fraud Indication.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Security Handshake Pitfalls. Client Server Hello (K)
Unit 3 Section 6.4: Internet Security
Onno W. Purbo e-Banking Onno W. Purbo
Cryptography: an overview
Cryptography: an overview
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
Security Design.
Cryptographic Hash Function
e-Health Platform End 2 End encryption
Cryptography And Network Security
Onno W. Purbo Payment Gateway Onno W. Purbo
Encryption
Tutorial on Creating Certificates SSH Kerberos
Onno W. Purbo e-Banking Onno W. Purbo
NET 311 Information Security
Message Security, User Authentication, and Key Management
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Kerberos Part of project Athena (MIT).
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Electronic Payment Security Technologies
eCommerce Technology Lecture 13 Electronic Cash
One-way Hash Function Network Security.
Key Exchange, Man-in-the-Middle Attack
Message Authentication
Presentation transcript:

Onno W. Purbo Onno@indo.net.id Security Digital Cash Onno W. Purbo Onno@indo.net.id

Reference http://www.ex.ac.uk/~RDavies/arian/money.html http://ganges.cs.tcd.ie/mepeirce/project.html http://www.transaction.net/

Key Technology SSL Blind signature Random Serial Number

Entity yang bermain Bank Buyer Merchant Meng-issue coin Validasi coin Menukar dengan uang ‘real’ Buyer Mempunyai account di Bank Dapat mengambil coin Dapat deposit coin Merchant Menerima pembayaran coin Memberi pembayaran coin

Skenario Mengambil Coin The user's cyberwallet calculates digital coins needed. It generates 100 digit random serial numbers for these coins. The serial numbers are blinded using blind signature technique. Bank receives the message, Bank withdrawal amount debited from the signature owner's account. The bank signs the coins with a private key. After signing the blind coins, the bank returns them to the user. The user can then decrypt the message, and unblind the coins by dividing out the blinding factor.

Making a purchase with eCash

Basic Function PayMe System

Purchasing with payme

Security Aspect Eavesdropping Prevention Message Tampering Prevention Replay Prevention Masquerading Prevention Private Key Protection

Eavesdropping Prevention An attacker can’t see the contents of a PMTP message because the message is either: Encrypted with the public key of the receiver. Only the private key can decrypt the message. OR encrypted with a symmetric session key which has been distributed securely. The session key was distributed by sending it in a public-key encrypted message. The only exception to this is the ask_payment_request message. Since the buyer is to remain anonymous this message is transmitted in cleartext.

Message Tampering Prevention Any encrypted message cannot be tampered with, since it will not be possible to decrypt it after it has been changed. By using message digests, a digitally signed message cannot be tampered with.

Replay Prevention A nonce is used within each PMTP message to ensure that the message can be used for one occasion only, and to prevent a replay of that message. It ensures that the message must come from a specific network address and within a small time window.

Masquerading Prevention Where possible all messages are authenticated with a digital signature. Bank withdrawals also require the password of the bank account. In the anonymous messages where a digital signature is not possible, knowledge of a symmetric session key is used. The network address within the nonce prevents an attacker at another site from masquerading as the message sender at the original network address.

Private Key Protection The private key of a user is stored on file at the user's local site. It is encrypted with a secret passphrase. If the user's account is broken into, this prevents the attacker being able to access the private key. Without this private key any cash stored locally cannot be decrypted, and PMTP messages cannot be sent.