Secure Electronic Transactions (SET)

Slides:



Advertisements
Similar presentations
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Advertisements

1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
PAYMENT WITH A DEBIT-CARD Merchant swipes debit card Debit rather than credit transaction like credit card.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Secure Electronic Transaction Creating Debts Online with Confidence.
Supporting Technologies III: Security 11/16 Lecture Notes.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
2014 Asia-Pacific Financial Forum Seattle, Washington July 7, 2014 Electronic Payments: Expanding Financial Access for Consumers and Businesses of Every.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
EWIC: Getting on Board. Objectives Explain the goals of eWIC. Identify plan for eWIC in Idaho.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
Trusted source for all your payment processing needs.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Chapter 7 - Secure Socket Layer (SSL)
Onno W. Purbo e-Banking Onno W. Purbo
E-Commerce Payment System
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Secure Electronic Transaction
Onno W. Purbo Payment Gateway Onno W. Purbo
BY GAWARE S.R. DEPT.OF COMP.SCI
Onno W. Purbo e-Banking Onno W. Purbo
Cryptography and Network Security
Cryptography and Network Security
Secure Electronic Transaction (SET) University of Windsor
Secure Socket Layer (SSL) Transport Layer Security (TLS)
Cryptography and Network Security
Presentation transcript:

Secure Electronic Transactions (SET)

SET SET is an encryption and security specification designed to protect credit card transactions on the Internet. SET is not itself a payment system. Rather , it is a set of security protocols and formats that enables users to employ the existing credit card payment infrastructure on an open network, such as Internet, in a secure fashion. The main participants in the SET system are : client, vendor and vendor bank

The certification of all the three parts is required The certification of all the three parts is required. The certificats of the client and vendor are provided by their banks (confirmation that they can pay or receive payments with a particular credit card). The certificats contain information about the financial institution that issued the certificate. An interesting and important feature of SET is that it prevents the vendor from learning the client credit card number; this is only provided to the issuing bank

Sequence of events required for a transaction Bob (the customer) comunicates to Alice( the vendor) that it is interested to buy some items with a credit card. Alice sends to Bob a transaction identifier. Alice sends to Bob its digital certificate and the certificate of its bank. The certificates contains the relative public key. They are encrypted with the private key of an certification authority. Bob utilizes the public key of the certification authority and obtains both the public keys of Alice and its bank.

Bob sends to Alice, using its public key, two information blocks: Order information (OI) and Purchase Information (PI) (encrypted with the bank public key) OI contains the transaction identifier and the type of credit card used. PI contains the purchase total price and the credit card number. Alice sends to its bank a message encrypted with the bank public key. The message contains PI, received from Bob and the Alice’s certificate. The Alice’s bank sends a request to the bank that released the Bob’s credit card looking for payment authorization.

If the Bob’s bank authorizes the payment, the Alice’s bank sends to Alice a message encrypted with the Alice’s public key containing the transaction identifier. If the transaction has been approved Alice sends the response message to Bob with the indication that the payment has been accepted and that the required items will be delivered.