1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
1 Applications of Computers 4 We talk about databases and their implementation 4 Implementation of databases involves trees therefore we introduce trees.
1 Welcome Back Students Applications of Computers Lecture-3.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Digital Payment Systems
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Payment Systems for Electronic Commerce
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Traditional and Electronic Payment Methods Chapter 3.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall E-money.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Chapter 10 Developing a Web-Based Online Shopping Application (I)
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
Traditional and Electronic Payment Methods Chapter 3.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Public Key Encryption.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Applications of Computers Lectures 1 and 2
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
BY GAWARE S.R. DEPT.OF COMP.SCI
Cryptography and Network Security
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

1 Applications of Computers Lecture-3

2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were reluctant towards e- commerce but now it is picking up 4 The most revolutionary e-commerce is between business and customer 4 Business-business e-commerce is already developed

3 E-Commerce Requirements 4 E-commerce between customer and business requires several functions 4 For example, auction sites should have the capability to track bids by various people 4 Also, multi-vendor selling sites should support tracking of multiple companies 4 Transactions between customers and the e- commerce site should be safe and secure

4 The Credit Card Concerns 4 Almost all e-commerce sites offer credit card support 4 A customer who wants to buy something pays with credit card 4 The credit card information is transmitted through the public network and it can be tapped by someone in the middle

5 Encryption and Data Security 4 For successful e-commerce, we must ensure that the sensitive data has been encrypted and secured 4 Encryption transforms the data using a “key” into a value that is meaningless in its normal form 4 This encrypted value can only be decrypted by authorized agency or person

6 Securing the Connection 4 For protecting the credit card info, it is transmitted under SSL (secure sockets layer) 4 It means the card info is encrypted and it is very difficult to break the code by an intruder 4 Surprisingly, the misuse of the card info by employees is a more serious concern

7 Encryption and Data Security 4 For successful e-commerce, we must ensure that the sensitive data has been encrypted and secured 4 Encryption transforms the data using a “key” into a value that is meaningless in its normal form 4 This encrypted value can only be decrypted by authorized agency or person

8 Encryption Basics 4 For encryption, XOR logical operation is widely used 4 The data to be encrypted is XORed with the key 4 XOR has the property that it can transform a binary value into another totally different value. This encrypted value is sent instead of the original value 4 The recipient performs XOR of the received encrypted value with the key, restoring original value

9 Class Example 4 The data to be sent is: The 4-bit key is SENDER: Encrypt the data and send it to the recipient 4 Encrypted Data is obtained by repeatedly performing XOR operation with the key 4 First Four bits 0111 XOR 1010 gives the result 1101

10 Class Example 4 Next Four bits 1011 XOR 1010 gives the result RECIPIENT: Decrypt the data 4 First Four bits 1101 XOR 1010 gives the result 0111 (original data recovered) 4 Next Four bits 0001 XOR 1010 gives the result 1011 (original data recovered)

11 Encryption Keys 4 There are two types of encryption schemes in use 4 In symmetric or secret key ciphers, the encryption and decryption keys are symmetric and identical 4 As an example, consider this diagram then encrypt following message with your own encryption scheme 4 “Please transfer six million dollars into my checking account”

12 Symmetric Cipher Adapted for academic use from “Exploring The Digital Domain” by Abernethy Allen, ITP 1999

13 Symmetric Cipher 4 In symmetric secret key cipher, the key must be sent to recipient, otherwise the message cannot be decrypted 4 Sending the key on public network is like putting your house key in locksmith’s shop and allowing everyone to duplicate it 4 Alternatives are to restrict access to secret key to a few individuals

14 DES 4 DES (Data Encryption Standard) is one example of symmetric key encryption 4 DES uses a 56-bit key which can be doubled in length to 112 bits 4 Breaking messages encrypted with DES would require a considerable amount of computing time and effort

15 Alternate Payment Methods 4 DIGICASH is an alternate payment method that does not use credit cards for online buying 4 Customer opens an account and an electronic wallet is created at customer’s machine 4 Customer is able to create digital coins that are certified by the bank

16 Digicash is now eCash The new p2p technology is developed by the eCash technologies 4 Refer to the link below: 4 s/p2p.asp

17 Alternate Payment Methods 4 The bank attaches a digital signature to each digital coin 4 Thus, the customer can send digital cash to the vendor and buy anonymously 4 VIRTUAL PIN allows credit card charges without transmitting card number 4 The bank holds customer’s credit card information and issue a virtual PIN to customer

18 Alternate Payment Methods 4 Customer specifies virtual PIN to a merchant when charging something to credit card 4 Merchant sends this PIN to bank for verification 4 Bank requests customer authorization via and on confirmation, charges the amount of sale to customer’s credit card