1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
SET – Secure Electronic Transaction Setting The Stage For Safe Internet Shopping -Jignesh Shah- -Riyaz Malbari-
Chapter 8 Web Security.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Secure Electronic Transaction Creating Debts Online with Confidence.
Supporting Technologies III: Security 11/16 Lecture Notes.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
Epayment System using Java April, Computer Security and Electronic Payment System Cho won chul Kim Hee Dae Lee Jung Hwan Yoon Won Jung.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Figure 15.1 Conventional Cryptography
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
IP Securty 1. Overview 2. Architecture 3. Authentication Header 4. Encapsulating Security Payload 5. Combining security Associations 6. Internet Key Exchange.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Henric Johnson1 Chapter 8 WEB Security //Modified by Prof. M. Singhal// Henric Johnson Blekinge Institute of Technology, Sweden
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
CS580 Internet Security Protocols
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
or call for office visit, or call Kathy Cheek,
Chapter 7 - Secure Socket Layer (SSL)
Cryptography and Network Security
Secure Electronic Transaction
Cryptography and Network Security
Web Security and Security
Cryptography and Network Security
Secure Electronic Transaction (SET) University of Windsor
Secure Electronic Transactions (SET)
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality –denial of service –authentication need added security mechanisms

2 A Comparison of Threats on the Web

3 Relative Location of Security Facilities in the TCP/IP Protocol Stack

4 Secure Electronic Transactions (SET) open encryption & security specification to protect Internet credit card transactions developed in 1996 by MasterCard, Visa etc not a payment system rather a set of security protocols & formats –Provides a secure communications amongst parties –Provides trust from use of X.509v3 certificates –Ensures privacy by restricted info to those who need it

5 Requisiti di sicurezza forniti dallo standard SET Confidenzialità dell’informazione –Encryption DES Integrità dei dati –Firma digitale RSA (using SHA-1) Autenticazione del possessore di una carta di pagamento o del mercante –Firma digitale RSA + certificato X.509v3

6 SET Components

7 SET Transaction 1.customer opens account 2.customer receives a certificate 3.merchants have their own certificates 4.customer places an order 5.merchant is verified 6.order and payment are sent 7.merchant requests payment authorization 8.merchant confirms order 9.merchant provides goods or service 10.merchant requests payment

8 Dual Signature customer creates dual messages –order information (OI) for merchant –payment information (PI) for bank neither party needs details of other but must know they are linked use a dual signature for this –signed concatenated hashes of OI & PI

9 Construction of Dual Signature

10

11 Purchase Request Transaction Initiate Request The costumer requests the certificates The message includes other informations Initiate Response The merchant includes the certificates The message includes other informations Purchase Request Verifies the merchant and gateway certificates Creates the purchase request message (described later) Purchase Response (described later) costumermerchant

12 Purchase Request – Customer

13 1)verifies cardholder certificates using CA signs 2)verifies dual signature using customer's public signature key to ensure order has not been tampered with in transit & that it was signed using cardholder's private signature key 3)processes order and forwards the payment information to the payment gateway for authorization (described later) 4)sends a purchase response(*) to cardholder Purchase Request - Merchant (*) Includes a response block that acknowledges the order and references the corresponding transaction number (signed using merchant’s private signature key)

14 Payment Gateway Authorization Transaction Authorization Request Purchase-related information (obtained from the costumer) Authorization-related information (generated by the merchant) Certificates AuthorizationResponse (described later) merchantpayment gateway

15 Tasks performed by Payment Gateway 1.verifies all certificates 2.decrypts digital envelope of authorization block to obtain symmetric key & then decrypts authorization block 3.verifies merchant's signature on authorization block 4.decrypts digital envelope of payment block to obtain symmetric key & then decrypts payment block 5.verifies dual signature on payment block 6.verifies that transaction ID received from merchant matches that in PI received (indirectly) from customer 7.requests & receives an authorization from issuer 8.sends authorization response(*) back to merchant (*) - Authorization-related information - Capture token information (to effect payment later) - Certificate

16 Payment Capture Transaction merchant sends to payment gateway a payment capture request gateway checks request then causes funds to be transferred to merchants account notifies merchant using capture response