Advances in Card Solutions 7 th Annual CACR April 25, 2001 7 th Annual CACR April 25, 2001.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Wireless PKI Shakeel Ahamad Shaik (Research Fellow) Under the supervision of Dr.V.N.Sastry, Associate Professor (IDRBT) & Dr.S.K.Udgata, Reader (UOH) Saturday,
E-Commerce Payment Systems
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Certicom MobileTrust™: PKI for Mobile and Wireless Systems John Kennedy Director of PKI Product Marketing April, 2000.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
A Survey of WAP Security Architecture Neil Daswani
Implementation of LSI for Privacy Enhancing Computation Kazue Sako, Sumio Morioka
Principles of Information Security, 2nd edition1 Cryptography.
Mobile Security and Payment Nour El Kadri University Of Ottawa.
Electronic Transaction Security (E-Commerce)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Public Key Infrastructure Ammar Hasayen ….
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
PKI interoperability and policy in the wireless world.
E-PAYMENT METHODS 1. FACT OR FICTION ??? VISA processed 15,200 credit card transactions per minute. The first ATM machine was developed in 1939?. Luther.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Public Key Infrastructures and mCommerce Baltimore’s offerings for wireless technologies.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Team 13 Prathibha and Shrimi 11/12/13 Mobile Credit Card Processing.
Mobile Security. Security is Hard Just this year: Denial of service Credit card compromise I Love you Cost to manage security quickly becomes prohibitive.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
Telefónica Data Perú S.A.A. How will e-commerce affect the Transportation Industry Ing. Ricardo Lanfranco Varea Central Manager Sales & Marketing Telefónica.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Mobile E-Commerce in Asia Issues and Strategies for the New Information Age Business Wong Jeat Shyan CYBERSOURCE PTE LTD SINGAPORE.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
“Every human will have a secure access to the Blockchain.”
e-Security Solutions Penki Kontinentai Vladas Lapinskas
“Every human will have a secure access to the Blockchain.”
Presentation transcript:

Advances in Card Solutions 7 th Annual CACR April 25, th Annual CACR April 25, 2001

Certicom Overview  Founded in 1985, 340 employees - Offices in Toronto, San Francisco, Dulles, and London - Listed on both Toronto Stock Exchange & the NASDAQ  Strong patent portfolio in wireless/mobile security  Sponsors cryptographic research at University of Waterloo and Stanford University  Has over 150 licensees  Founded in 1985, 340 employees - Offices in Toronto, San Francisco, Dulles, and London - Listed on both Toronto Stock Exchange & the NASDAQ  Strong patent portfolio in wireless/mobile security  Sponsors cryptographic research at University of Waterloo and Stanford University  Has over 150 licensees

Security for the Next 20 Years  Encryption Underlies all Internet Security  Existing Encryption Technology is 20 Years Old  Certicom Owns the Next Generation Encryption Technology - Elliptic Curve Cryptography (ECC)  Designed for Mobile, Wireless Smart Card Environments  Security for the Next 20 Years  Encryption Underlies all Internet Security  Existing Encryption Technology is 20 Years Old  Certicom Owns the Next Generation Encryption Technology - Elliptic Curve Cryptography (ECC)  Designed for Mobile, Wireless Smart Card Environments  Security for the Next 20 Years

Industry Leading Customers

Agenda  PKI, Cards, Wireless – Where are we?  Common challenges  Security Solutions – how can Crypto help?  Success stories to watch…  Concluding Remarks  PKI, Cards, Wireless – Where are we?  Common challenges  Security Solutions – how can Crypto help?  Success stories to watch…  Concluding Remarks

Classic Hype Cycle Visibility Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Time

PKI Hype Cycle Source: Gartner Group Visibility Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Time Public Key Encryption Developed PGP Introduced 1994 RSA Conference Verisign formed Verisign IPO Entrust IPO 1999 RSA Conference Scotia Bank Deploys B2C PKI American Express Releases Blue Identrus Formed Verisign Acquires NSI Entrust Merges with EnCommerce Visa Announces 3-D SSL E-Sign Laws Signed PKI Disappears Into Application PC Makers add SmartCard Readers Industry Policy Authorities Form We are here

Smart Card Hype Cycle 1996 Olympics (Visa Cash) 1995 Mondex Swindon, England EMV New York Joint Trials American Express Launches Blue Visa Launches eVisa Are we here? Smart Card Disappears into card, device, etc PC Makers add SmartCard Readers Industry Policy Authorities Form Visibility Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Time

Wireless Hype Cycle Are we here? WAP SMS WTLS Location-based Services Visibility Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Time

Coming Together Visibility Time PKI Cycle Smart CardWireless eCommerce We must be here My “Optimist’s” view!

Information Security Threats Fraud  Problem - Impersonation or identity theft - Credit card fraud  Impact - Massive financial loss - Merchants absorb most of the losses - Slows adoption of e-Commerce  Problem - Impersonation or identity theft - Credit card fraud  Impact - Massive financial loss - Merchants absorb most of the losses - Slows adoption of e-Commerce

Credit Card Fraud  Meridien Research predicts that by 2001, online credit card fraud could cost merchants $9 billion a year, and that by 2003 the cost could reach $15 billion

Challenges  Wireless is bandwidth constrained - Pay per byte transmitted over networks - Latency of messaging - Proximity card performance  Battery life  Resource limitations - Smart card processors fit within 25 sq mm - PDA, pager, cell handsets  Devices may look different, but It’s the same problem  Wireless is bandwidth constrained - Pay per byte transmitted over networks - Latency of messaging - Proximity card performance  Battery life  Resource limitations - Smart card processors fit within 25 sq mm - PDA, pager, cell handsets  Devices may look different, but It’s the same problem

ECC – A Part of any Solution ECC Key Size (Bits) ECC Key Size (Bits) RSA Key Size (Bits) RSA Key Size (Bits) Key Size Ratio 1631,0241 : ,0721 : ,6801 : ,3601 : ,0241 : ,0721 : ,6801 : ,3601 : 27

Traditional Technology  Digitally Signed Transaction on a Palm VII Using Traditional Encryption Technology Not Viable!

Certicom Technology  Digitally Signed Transaction on a Palm VII Using Certicom Technology Instantaneous Trust!

Solutions emerging  Proximity devices  Intelligent use of Public Key technology - Not just PKI - Combinations of PK, PKI and trust models  Solutions for business needs  Proximity devices  Intelligent use of Public Key technology - Not just PKI - Combinations of PK, PKI and trust models  Solutions for business needs

Incentives for end customers  Sex appeal factor  Hide security from consumers  Assure privacy, integrity of transactions  For Financials - Make it smooth for the merchants - Avoid discount rate discussions ;-)  Sex appeal factor  Hide security from consumers  Assure privacy, integrity of transactions  For Financials - Make it smooth for the merchants - Avoid discount rate discussions ;-)

Example successes  Proximity in North America - WMATA - Mobil Speed Pass  Large card rollouts - American Express Blue - eVisa - MasterCard announcement with Keycorp  Key differences… - Proximity solutions seem to gain user acceptance!  Proximity in North America - WMATA - Mobil Speed Pass  Large card rollouts - American Express Blue - eVisa - MasterCard announcement with Keycorp  Key differences… - Proximity solutions seem to gain user acceptance!

Proximity solutions  ECC enables secure solutions - Payment - Terminal communications  Total transaction time required - <150ms  ECDSA Sign Performance by Certicom - < 90 ms for a signature  Viable for demanding proximity protocol solutions  ECC enables secure solutions - Payment - Terminal communications  Total transaction time required - <150ms  ECDSA Sign Performance by Certicom - < 90 ms for a signature  Viable for demanding proximity protocol solutions

On Card Key Generation  Private key is “perfect secret” - A random number  Public key is computed by multiplying private key with the “generator point” - Same complexity as signature generation  No risk of primality testing  Total process typically less than 2 seconds  Enables keys as demanded by business process, user generated - Avoids key injection requirements at mfg time  Private key is “perfect secret” - A random number  Public key is computed by multiplying private key with the “generator point” - Same complexity as signature generation  No risk of primality testing  Total process typically less than 2 seconds  Enables keys as demanded by business process, user generated - Avoids key injection requirements at mfg time

PK Solutions to Match  Digital Signature Authentication Solutions  Just in time security - On card key generation for business app use - TrustPoint PKI Portal registration of keys - MobileTrust CA services  Small certificates by design - CA supports business process - NOT business process driven by CA  Digital Signature Authentication Solutions  Just in time security - On card key generation for business app use - TrustPoint PKI Portal registration of keys - MobileTrust CA services  Small certificates by design - CA supports business process - NOT business process driven by CA

System Architecture Secure Client Application Secure Client Application Secure Server Application Secure Server Application PKI Client Protocols Client Certificate Crypto PKI Tools Server Certificate Protocols Crypto Certificate Authority (CA)Registration Authority (RA) Public-key Infrastructure Wireless Device Application Server

TrustPoint PKI Portal

Conclusions  ECC solutions provide the Right solution for todays security needs  Proximity solutions need high security – ECC meets the challenge - On card key generation - <150ms total transaction times  Emerging business applications need Public Key Technology  ECC solutions provide the Right solution for todays security needs  Proximity solutions need high security – ECC meets the challenge - On card key generation - <150ms total transaction times  Emerging business applications need Public Key Technology