Security Digital Cash Onno W. Purbo

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
SMUCSE 5349/73491 Authentication Protocols. SMUCSE 5349/73492 The Premise How do we use perfect cryptographic mechanisms (signatures, public-key and symmetric.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Encryption Methods By: Michael A. Scott
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 21 Distributed System Security Copyright © 2008.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Csci5233 computer security & integrity 1 Cryptography: an overview.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Digital Signatures and Digital Certificates Monil Adhikari.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
Fall 2006CS 395: Computer Security1 Key Management.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
1 Buyer 2. Account ID Valid? 3. Account OK! 5. Transaction Details 1. Account ID 4. Information Goods 6. Satisfied? 7. Accept/Reject or Fraud Indication.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Onno W. Purbo e-Banking Onno W. Purbo
Cryptography: an overview
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
Onno W. Purbo Security Digital Cash Onno W. Purbo
Onno W. Purbo Payment Gateway Onno W. Purbo
Onno W. Purbo e-Banking Onno W. Purbo
Cryptography: an overview
Presentation transcript:

Security Digital Cash Onno W. Purbo

Reference oney.html oney.html t.html t.html

Key Technology SSL Blind signature Random Serial Number

Entity yang bermain Bank Meng-issue coin Validasi coin Menukar dengan uang ‘real’ Buyer Mempunyai account di Bank Dapat mengambil coin Dapat deposit coin Merchant Menerima pembayaran coin Memberi pembayaran coin

Skenario Mengambil Coin The user's cyberwallet calculates digital coins needed. It generates 100 digit random serial numbers for these coins. The serial numbers are blinded using blind signature technique. Bank receives the message, Bank withdrawal amount debited from the signature owner's account. The bank signs the coins with a private key. After signing the blind coins, the bank returns them to the user. The user can then decrypt the message, and unblind the coins by dividing out the blinding factor.

Making a purchase with eCash

Basic Function PayMe System

Purchasing with payme

Security Aspect Eavesdropping Prevention Message Tampering Prevention Replay Prevention Masquerading Prevention Private Key Protection

Eavesdropping Prevention An attacker can’t see the contents of a PMTP message because the message is either: Encrypted with the public key of the receiver. Only the private key can decrypt the message. OR encrypted with a symmetric session key which has been distributed securely. The session key was distributed by sending it in a public-key encrypted message. The only exception to this is the ask_payment_request message. Since the buyer is to remain anonymous this message is transmitted in cleartext.

Message Tampering Prevention Any encrypted message cannot be tampered with, since it will not be possible to decrypt it after it has been changed. By using message digests, a digitally signed message cannot be tampered with.

Replay Prevention A nonce is used within each PMTP message to ensure that the message can be used for one occasion only, and to prevent a replay of that message. It ensures that the message must come from a specific network address and within a small time window.

Masquerading Prevention Where possible all messages are authenticated with a digital signature. Bank withdrawals also require the password of the bank account. In the anonymous messages where a digital signature is not possible, knowledge of a symmetric session key is used. The network address within the nonce prevents an attacker at another site from masquerading as the message sender at the original network address.

Private Key Protection The private key of a user is stored on file at the user's local site. It is encrypted with a secret passphrase. If the user's account is broken into, this prevents the attacker being able to access the private key. Without this private key any cash stored locally cannot be decrypted, and PMTP messages cannot be sent.