E-Payment ECT 582 Robin Burke. Outline Characteristics Select protocols.

Slides:



Advertisements
Similar presentations
Chapter 8 Payment Systems: Getting the Money
Advertisements

M.B.A. II SEMESTER Course No. 208 Paper No. – XVI E-Business Dr.N.C.Dhande Unit II e-business frameworks e-selling process, e-buying, e-procurement, e-payments:
Internet payment systems
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
E-Commerce Payment Systems
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Class 12 Anonymous Digital Currency CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Chapter 6 E-commerce Payment Systems
FIT3105 Smart card based authentication and identity management Lecture 4.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS eCommerce Technology Lecture 10 Micropayments II.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS eCommerce Technology Lecture 9 Micropayments I.
“Electronic Payment System”
FINANCIAL SOCCER Module 3 Credit, debit and prepaid cards Collect a quiz and worksheet from your teacher.
Digital Payment Systems
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
E-Money / Digital Cash Lin Huang. Money / Digital Cash What is Money –Coins, Bill – can’t exist on two places at one time –Bearer bonds: immediate cashable.
Payment Systems for Electronic Commerce
Traditional and Electronic Payment Methods Chapter 3.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Electronic Payment Systems
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Chris Olston, cs294-7, Spring Atomicity in Electronic Commerce J. D. Tygar -- UCB presented by Chris Olston.
Secure Electronic Transaction (SET)
E-Payment ECT 582 Robin Burke. Outline Schedule changes Characteristics Select protocols.
Electronic Payment Systems
Chapter 15 E-Payments: Getting the Money. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Brief History of Money Features of Real-World.
Chapter 10 E- Payment.
Bitcoin (what, why and how?)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
ICT in Banking.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Traditional and Electronic Payment Methods Chapter 3.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Electronic Payment Systems.
ELC 200 DAY 26. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Quiz 4 (last) will be April 30 Chap 13, 14, & 15 Assignment 8 on next.
2/16/001 E-commerce Systems Electronic Payment Systems.
Chapter 4 E-commerce Security and Payment.
DIGITAL SIGNATURE.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
E-Payment Methods Fazal rehman shamil. 2001Daniel L. Silver2 Major Architectural Components of the Web Internet Browser Database Server Client 1 Server.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
Electronic Banking & Security Electronic Banking & Security.
E-commerce Payment Technology. 2 EC  E-commerce Payment Technology List     End E-moneyE-payment SystemInternet and the Banking Industry Main content.
Chapter 4 E-commerce Security and Payment.
ELC 200 DAY 25 & 26.
Presentation transcript:

E-Payment ECT 582 Robin Burke

Outline Characteristics Select protocols

Characteristics of payment systems Security / Privacy Convenience Cost Overhead Interoperability

Security / Privacy Anonymous seller or buyer authentication required? Non-repudiation secure receipt generated? Security against theft? against forgery? against double-spending? Privacy properties of transaction hidden from involved parties Fail-safe is money lost / created in system failure?

Cost Fixed cost cost to adopt the technology Transaction cost cost per transaction Float accrual of accumulated interest Risk possible financial loss to buyer / seller

Convenience Complexity number of steps to complete transaction Two-way peer to peer payment possible Off-line no need for connection to third-party during transaction Account does one or both parties need a special account established in advance? Respendability no intermediate steps between receiving and spending Portable not location-dependent

Interoperability Exchangeable one type of currency for another Transferable can be transferred from individual to individual Divisible can be subdivided into smaller units Hardware independent no special hardware required Monetary value built-in value

Overhead Scalability transactions / users Delay how long does the transaction take? Hardware / software requirements

Examples Cash Check Credit card Online credit card Mondex PayPal Digital wallet

Framework Players who is involved Processes what is the protocol Properties costs risks etc

Cash Players buyer / seller (Bob & Susie) Process secure document fixed amount physical exchange

Cash properties anonymity divisibility exchangable low cost repudiable, without receipt step low tech monetary untraceable

Check Players Bob, Susie Bob's bank BK, Susie's bank SK Verification service V Process physical exchange secure document with biometric ID Susie may verify with V before accepting Susie deposits with SK SK settles with BK via ACH Bob's account at BK debited

Check properties Accounts required Bob and Susie Traceable Non-anonymous Medium cost 10-20¢ Risk to seller if verification not in place Non-transferable (in theory) biometric authentication

Credit card Players Bob, Susie, SK (acquirer) Card issuer BC Transaction processor T Setup Susie must have card processing account SK leases POS hardware and network access Bob must have credit card

Credit card cont'd Presentation Bob presents card or Bob presents card number plus other information Authorization Susie contacts SK with card info SK contacts T T contacts BC BC can accept, deny, etc. Capture Transaction is committed goods accepted Authorization steps happen again with capture flag card balance debited Settlement BC transfers money to SK Billing BC sends Bob a monthly bill Bob pays BC

Credit card cont'd non-anonymous non-transferable security weak esp. NSP designed to thwart simple theft off-line = low security not interoperable low cost / low risk for buyer BC absorbs fraud risk

Online credit card same as before except weak buyer authentication physical card never present physical signature never present security reduced from biometric to data weak seller authentication major fraud opportunity SSL protects only passive attacks on IP traffic

SET Same players as credit card Central idea Susie only needs to know that she will get paid Bob's card number not essential BC only needs to know enough to validate the transaction Segment the transaction Part for Susie Part for BC

SET cont'd

Process Susie and BC have public keys Bob encrypts and signs an order O to Susie Bob encrypts and signs payment information P to BC P is sent through the acquirer to BC BC decrypts and validates the transaction Sends Susie verification and transaction id Susie presents transaction id to acquirer for settlement

SET cont'd Properties authentication of seller non-disclosure of credit card # non-disclosure of order details enhanced privacy hardware / software requirement electronic wallet Slow adoption of SET requires PKI (hierarchical) requires client-side software incompatible wallet implementations

Mondex Players Bob, Susie Setup Bob and Susie both have Mondex smart cards Bob has downloaded cash tokens to his Mondex card Bob or Susie has a Mondex terminal money exchange device Process connect cards to terminal enter respective PINs cards authenticate each other's certificates Susie's card generates signed purchase request Bob's card acknowledges request and deletes stored tokens Susie's card adds tokens

Mondex cont'd Characteristics limited maximum storage reduces danger of money laundering some buyer risk stolen card is lost cash respendable two-way convenient dependent on secure hardware risky assumption

Secure hardware Private key stored in device key used to authenticate as "real" Mondex device key used to encrypt memory contents Similar to private key token for PKI BUT owner has incentive to break in How to build packaging internal consistency checks "reset on fault"

Attacks against secure hardware Problem physics of device cannot be hidden Attackers can etch new circuitry remove deletion step alter encryption algorithm monitor encryption to capture secret key power consumption timing bus probe

Should we worry? Question where does "expected payoff" > "investment to break" Answer if Mondex becomes widespread chip tampering = printing money Attackers Class I – capable outsider Class II – knowledgeable insider Class III – determined organization

eCash Players Bob, Susie Setup Bob and Susie have eCash accounts and eCash software or smart card Bob loads secure "coins" to wallet a coin = a $$ amount, an id and a digital signature Process Bob transfers coins to Susie Susie deposits in account

Characteristics Anonymous Two-way Non-traceable Respendable Forgery cryptographic problem

Anonymity Coin only has bank's identifier Bank doesn't know who originally withdrew it whose hands it has passed through Problem double spending bank can detect but is Susie or Bob at fault withdrawal when coins are given to Bob, ids could be recorded

Blind signature Problem sign a document without looking at it Solution multiple message by a factor M*F sign M*F creating M*F + S factor out F leaving M + S/F for certain algorithms S/F is the correct signature for M Bob can create a message = "$1" blind it have bank sign it deduct $1 from Bob's account create coin

Cut and choose Bob could also create a message = "$100" blind it tell the bank it says "$1" have bank sign it Solution Bob creates n messages Bank examines n-1 at random if they all say "$1" then the bank signs we pick n to be as large as necessary for security may depend on size of transaction

Double spending What if Bob spends the same coins twice? What if Susie deposits the same coins twice? Bank can detect same id deposited twice can't distinguish

Conditional anonymity Bob encrypts self-identifying information in the coin bank can verify just like $ amount When spending Bob discloses 50% of the key used to decrypt personal info if he spends twice, his identity becomes known to the bank A similar device can be used to protect against double deposits

Double spending

eCash viability Untraceability + anonymity + virtuality many opportunities for crime governments hate it DigiCash founder Chaum went bankrupt some patents will expire soon

PayPal Players Bob, Susie, PayPal Setup Bob needs a PayPal account linked to a bank account or credit card Process Bob uses the PayPal application to send money using Susie's address Susie can access her funds by creating a PayPal account linked to her address

Characteristics Low transaction cost Respendable On-line only Viral recipient must get an account to get paid Traceable, non-anonymous

Digital wallet The cure-all that wasn't eWallet out of business Java Wallet discontinued MS Passport no longer includes credit card info W3C digital wallet initiative discontinued

Why? information not portable single machine information too portable third party insufficient trust in client software

Conclusion Very few e-payment success stories Credit cards approximately 1.8 billion in fraud on-line in 2002 still the dominant mechanism Reasons convenience already in use low buyer risk