1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver 3.1 15 Sept 2008.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

A Framework for Distributed OCSP without Responders Certificate
Internet payment systems
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Secure Communication Architectures.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
Grid Security. Typical Grid Scenario Users Resources.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Mar 11, 2003Mårten Trolin1 Previous lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Micro-Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University URL:
Your Presenter Amer Sharaf Electronic Payments: Where do we go from here? ByMarkus Jakobsson David Mraihi Yiannis Tsiounis Moti Yung.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS eCommerce Technology Lecture 9 Micropayments I.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Traditional and Electronic Payment Methods Chapter 3.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Supporting Technologies III: Security 11/16 Lecture Notes.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Secure Electronic Transaction (SET)
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Electronic Payment Systems.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Authentication 3: On The Internet. 2 Readings URL attacks
Electronic Money. What is Electronic Money? Scrip or money that is exchanged only through electronically is referred to as electronic money. Electronic.
2/16/001 E-commerce Systems Electronic Payment Systems.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
Key Management and Distribution Anand Seetharam CST 312.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Electronic Banking & Security Electronic Banking & Security.
E-commerce Payment Technology. 2 EC  E-commerce Payment Technology List     End E-moneyE-payment SystemInternet and the Banking Industry Main content.
Online Decision Process
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
Transaction Flow end-end
Grid Security.
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Trezor Support Phone Number For You!! Round The Clock
Overview of Zero-Knowledge Systems Inc
Bitcoin: A New Internet Currency
Information Security message M one-way hash fingerprint f = H(M)
Digital Certificates and X.509
ELECTRONIC PAYMENT SYSTEM.
Cryptocurrency and Blockchain Technology
Presentation transcript:

1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008

2 fairCASH Characteristics Token-based system –Same denomination as physical cash –Tamper-resistant chip to prevent the copying of e-coins Transferable –Offline payment Unify physical payment with the Internet payment –To be designed for usage with mobile phones, computer, cash register, ATM etc Privacy protected –The transacting information is under the control of the two participating parties

3 Public Key Certificate Purposes 1.To provide trust for the system To whom are you sending the e-coins? Is the e-wallet issued by fairCASH? 2.To investigate multi-spent e-coins To identify the e-wallet that is the source of the fraud 3.To limit an entity’s activity By revoking the certificate No certificate -> no transaction

4 User Level Certificates

5 E-wallet Level Certificates

6 Certificate Verification Structure Production Related Certificates Operation Related Certificates

7 Connection Architecture

8 Transaction Connection Proximity Transaction Remote Transaction RFID Phone number IP/DNS address

9 E-coin Bit string object –Denomination, serial number, expiration/clearing date, issuer name + issuer’s digital signature False Money 1.Counterfeit e-coin Failed digital signature verification No valid e-mint currency certificate or e-mint certificate available 2.Multi-spent e-coin E-wallet has been cracked Inside job Easy to block counterfeit e-coin, but not for multi-spent e-coin

10 E-coin Circulation State Offline databases Online databases

11 Risk Management (1) Protection –Tamper-resistant hardware 1.E-coins 2.E-wallet private key Detection –Short lifetime for e-coins –Online renewal facility –Online multi-spending checking facility Investigation –E-wallet transaction logs

12 Risk Management (2) Prevention –Coin Stop List (CSL) Isolation –E-wallet Certificate Revocation List (CRL) Constant update of CSL & e-wallet CRL Force the attacker to repeat his effort –Unique public-private key pair for each e-wallet –To make the attack to be commercially unviable

13 Privacy Privacy is protected –Transaction information is not available to any third parties Anonymity can be obtained if desired –Use non-identified certificate Fully Anonymous Non- Anonymous fairCASHecashCredit card

14 Conclusion An electronic version of physical cash Rely on tamper-resistant hardware and cryptography to contain fraud A practical system that is fraud tolerant

15 Thank You! Q & A