SET – Secure Electronic Transaction Setting The Stage For Safe Internet Shopping -Jignesh Shah- -Riyaz Malbari-

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Internet payment systems
CP3397 ECommerce.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
Summary of Reading Assignments: Credits and Debits on the Internet & New Payment Systems Hope To Cash In Dr. Deepak Khazanchi.
Chapter 8 Web Security.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
Secure Electronic Transaction (SET)
Epayment System using Java April, Computer Security and Electronic Payment System Cho won chul Kim Hee Dae Lee Jung Hwan Yoon Won Jung.
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Figure 15.1 Conventional Cryptography
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Chapter 7 - Secure Socket Layer (SSL)
Cryptography and Network Security
Secure Electronic Transaction
Cryptography and Network Security
Pooja programmer,cse department
Cryptography and Network Security
Secure Electronic Transaction (SET) University of Windsor
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

SET – Secure Electronic Transaction Setting The Stage For Safe Internet Shopping -Jignesh Shah- -Riyaz Malbari-

History/Background: - Internet shopping didn’t quite pick up as consumers considered financial transactions over the internet, unsafe - Lacks the one on one transaction feeling. - Visa & MC came up with the idea what we call as SET.

Advantages: - Privacy: Uses 1024 bit public key cryptography which renders the intercepted message unreadable ! - Integrity: Hashing & signing ensures message sent is unaltered. - Authentication: Uses digital certificates to ensure the parties are really who they claim to be.

How SET Works: Components: Cardholder Merchant Acquirer Gateway Certification Authority

Merchant’s Cardholder’s Bank Bank 1. Cardholder initializes purchase 2. Merchant verifies funds 3. Acquirer authorizes purchase & Verifies merchant’s certificate 5. Requests payment 4. Order is confirmed 6. Makes transfers & provides payment to merchant

How safe is SET? -Uses 1024–bit cipher keys, making it one of the strongest encryption applications. -If we use 100 computers each processing 10 MIPS, it would take 2.8 x years to break just ONE encrypted message !!!! Source:

SET versus SSL -SET was developed specifically for payment transaction. SSL simply encrypts the communication channel between cardholder & merchant website and its not backed by any financial institution. - Compare 128-bit encryption with that to SET !

SET versus SSL: -SET also authenticates each participant as its backed by CA & financial institutions. -SET provides security throughout the entire transaction process. SSL provides security only between cardholder and merchant.

Concept of Dual Signature : AliceBob Bank

Certificate Issuance: Electronic representation of payment card/brand Must be approved by the Acquirer gateway

Payment Processing : Cardholder registeration Merchant registeration Purchase request Payment authorisation Payment capture

Drawbacks:  Slow  Expensive  Not portable

References:   

THANK YOU !!!