SlideShare a Scribd company logo
1 of 21
SHARDA
UNIVERSITY
MINI PROJECT
submitted to: Mr. Rupesh Jindal
Secure Electronic
Transaction
Submitted BY :
Subhash Kumar
Secure Electronic
Transaction
• An application-layer security mechanism, consisting
of a set of protocols.
• Protect credit card transaction on the Internet.
• Companies involved:– MasterCard, Visa, IBM,
Microsoft, Netscape, RSA, Cyber Cash, Net Bill
• Not an ordinary payment system.
• It has a complex technical specification
SET Business
Requirements
• Provide confidentiality of payment and ordering
information.
• Ensure the integrity of all transmitted data.
• Provide authentication that a cardholder is a ultimate
user of a credit card account
• Provide authentication that a merchant can accept
credit card transactions through its relationship with
a financial institution
SET Business Requirements (cont’d)
• Ensure the use of the best security practices and system design
techniques to protect all legitimate parties in an electronic
commerce transaction
• Create a protocol that neither depends on transport security
mechanisms nor prevents their use
• Facilitate and encourage interoperability among software and
network providers
Secure Electronic
Transaction : Protocol
• Confidentiality: All messages are encrypted
• Trust: All parties must have digital certificates
• Privacy: information made available only when and where
necessary
• Developed by Visa and MasterCard
• Designed to protect credit card transactions
Parties in SET
Implementation of SET
• Data Confidentiality  Encryption
• Who am I dealing with?  Authentication
• Message integrity  Message Digest
• Non-repudiation  Digital Signature
• Access Control  Certificate Attributes
SET Transactions
• The customer sends order and payment information to
the merchant.
• The merchant requests payment authorization from the
payment gateway prior to shipment.
• The merchant confirms order to the customer.
• The merchant provides the goods or service to the
customer.
• The merchant requests payment from the payment
gateway.
SET Transactions
Key Technologies of SET
• Confidentiality of information:
Encryption
• Integrity of data: RSA digital signatures with SHA-1 hash codes
etc
• Cardholder account authentication:
X.509v3 digital certificates with RSA signatures
• Merchant authentication:
X.509v3 digital certificates with RSA signatures
• Privacy: separation of order and payment information using
dual signatures
Dual Signatures for SET
 Concept: Link Two Messages Intended for Two Different Receivers:
• Order Information (OI): Customer to Merchant
• Payment Information (PI): Customer to Bank
 Goal: Limit Information to A “Need-to-Know” Basis:
• Merchant does not need credit card number.
• Bank does not need details of customer order.
• Afford the customer extra protection in terms of privacy by keeping
these items separate.
• This link is needed to prove that payment is intended for this order and not
some other one.
Dual Signature Operation
The operation for dual signature is as follows:
Take the hash (SHA-1) of the payment and order
information.
These two hash values are concatenated [H(PI) || H(OI)] and
then the result is hashed.
Customer encrypts the final hash with a private key
creating the dual signature.
DS = EKRC [ H(H(PI) || H(OI)) ]
SET Supported
Transactions
card holder registration
merchant registration
purchase request
payment authorization
payment capture
certificate query
purchase inquiry
 purchase notification
 sale transaction
 authorization reversal
 capture reversal
 credit reversal
Credit Card Protocols
• SSL (System Session Layer ) 1 or 2 parties have private keys
• TLS (Transport Layer Security)
• SEPP (Secure Encryption Payment Protocol)
– MasterCard, IBM, Netscape
• STT (Secure Transaction Technology)
– VISA, Microsoft
• SET (Secure Electronic Transactions)
– MasterCard, VISA all parties have certificates
Payment Process
•The payment process is broken down into two
steps:
•Payment authorization
•Payment capture
Payment Authorization• The merchant sends an authorization request message
to the payment gateway consisting of the following:
• Purchase-related information
• PI
• Dual signature calculated over the PI & OI and
signed with customer’s private key.
• The OI message digest (OIMD)
• The digital envelop
• Authorization-related information
• Certificates
Payment Authorization (cont’d)
• Authorization-related information
• An authorization block including:
• A transaction ID
• Signed with merchant’s private key
• Encrypted one-time session key
• Certificates
• Cardholder’s signature key certificate
• Merchant’s signature key certificate
• Merchant’s key exchange certificate
Payment: Payment Gateway
• Verify All Certificates
• Decrypt Authorization Block Digital Envelope to Obtain
Symmetric Key and Decrypt Block
• Verify Merchant Signature on Authorization Block
• Decrypt Payment Block Digital Envelope to Obtain
Symmetric Key and Decrypt Block
• Verify Dual Signature on Payment Block
• Verify Received Transaction ID Received from Merchant
Matches PI Received from Customer
• Request and Receive Issuer Authorization
SET Interoperability
• Software development on SET protocol
• Brokat, Entrust, Globeset, GTE, IBM, TrinTech, Verisign
• SET costs
• Software development
• Hardware and runtime increases with high volume of
transactions
THANK YOU

More Related Content

What's hot

X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 CertificatesSou Jana
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Samip jain
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocolMousmi Pawar
 
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)Omar Ghazi
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 

What's hot (20)

X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Data encryption
Data encryptionData encryption
Data encryption
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
 
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)
 
Hash Function
Hash FunctionHash Function
Hash Function
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 

Similar to Secure electronic transaction ppt

Similar to Secure electronic transaction ppt (20)

Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
Fdp week 1 presentation
Fdp week 1 presentationFdp week 1 presentation
Fdp week 1 presentation
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
 
Secnet
SecnetSecnet
Secnet
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
E commerce
E commerceE commerce
E commerce
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 

More from Subhash Gupta

More from Subhash Gupta (8)

Uas
UasUas
Uas
 
Legal and general
Legal and generalLegal and general
Legal and general
 
Bank of baroda
Bank of barodaBank of baroda
Bank of baroda
 
Indian Textile Industry
Indian Textile Industry Indian Textile Industry
Indian Textile Industry
 
GST -Effects On Consumer
GST -Effects On ConsumerGST -Effects On Consumer
GST -Effects On Consumer
 
System Maintenance
System MaintenanceSystem Maintenance
System Maintenance
 
Vehicle Tracking System
Vehicle Tracking SystemVehicle Tracking System
Vehicle Tracking System
 
Motivation
MotivationMotivation
Motivation
 

Recently uploaded

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

Secure electronic transaction ppt

  • 3. Secure Electronic Transaction • An application-layer security mechanism, consisting of a set of protocols. • Protect credit card transaction on the Internet. • Companies involved:– MasterCard, Visa, IBM, Microsoft, Netscape, RSA, Cyber Cash, Net Bill • Not an ordinary payment system. • It has a complex technical specification
  • 4. SET Business Requirements • Provide confidentiality of payment and ordering information. • Ensure the integrity of all transmitted data. • Provide authentication that a cardholder is a ultimate user of a credit card account • Provide authentication that a merchant can accept credit card transactions through its relationship with a financial institution
  • 5. SET Business Requirements (cont’d) • Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction • Create a protocol that neither depends on transport security mechanisms nor prevents their use • Facilitate and encourage interoperability among software and network providers
  • 6. Secure Electronic Transaction : Protocol • Confidentiality: All messages are encrypted • Trust: All parties must have digital certificates • Privacy: information made available only when and where necessary • Developed by Visa and MasterCard • Designed to protect credit card transactions
  • 8. Implementation of SET • Data Confidentiality  Encryption • Who am I dealing with?  Authentication • Message integrity  Message Digest • Non-repudiation  Digital Signature • Access Control  Certificate Attributes
  • 9. SET Transactions • The customer sends order and payment information to the merchant. • The merchant requests payment authorization from the payment gateway prior to shipment. • The merchant confirms order to the customer. • The merchant provides the goods or service to the customer. • The merchant requests payment from the payment gateway.
  • 11. Key Technologies of SET • Confidentiality of information: Encryption • Integrity of data: RSA digital signatures with SHA-1 hash codes etc • Cardholder account authentication: X.509v3 digital certificates with RSA signatures • Merchant authentication: X.509v3 digital certificates with RSA signatures • Privacy: separation of order and payment information using dual signatures
  • 12. Dual Signatures for SET  Concept: Link Two Messages Intended for Two Different Receivers: • Order Information (OI): Customer to Merchant • Payment Information (PI): Customer to Bank  Goal: Limit Information to A “Need-to-Know” Basis: • Merchant does not need credit card number. • Bank does not need details of customer order. • Afford the customer extra protection in terms of privacy by keeping these items separate. • This link is needed to prove that payment is intended for this order and not some other one.
  • 13. Dual Signature Operation The operation for dual signature is as follows: Take the hash (SHA-1) of the payment and order information. These two hash values are concatenated [H(PI) || H(OI)] and then the result is hashed. Customer encrypts the final hash with a private key creating the dual signature. DS = EKRC [ H(H(PI) || H(OI)) ]
  • 14. SET Supported Transactions card holder registration merchant registration purchase request payment authorization payment capture certificate query purchase inquiry  purchase notification  sale transaction  authorization reversal  capture reversal  credit reversal
  • 15. Credit Card Protocols • SSL (System Session Layer ) 1 or 2 parties have private keys • TLS (Transport Layer Security) • SEPP (Secure Encryption Payment Protocol) – MasterCard, IBM, Netscape • STT (Secure Transaction Technology) – VISA, Microsoft • SET (Secure Electronic Transactions) – MasterCard, VISA all parties have certificates
  • 16. Payment Process •The payment process is broken down into two steps: •Payment authorization •Payment capture
  • 17. Payment Authorization• The merchant sends an authorization request message to the payment gateway consisting of the following: • Purchase-related information • PI • Dual signature calculated over the PI & OI and signed with customer’s private key. • The OI message digest (OIMD) • The digital envelop • Authorization-related information • Certificates
  • 18. Payment Authorization (cont’d) • Authorization-related information • An authorization block including: • A transaction ID • Signed with merchant’s private key • Encrypted one-time session key • Certificates • Cardholder’s signature key certificate • Merchant’s signature key certificate • Merchant’s key exchange certificate
  • 19. Payment: Payment Gateway • Verify All Certificates • Decrypt Authorization Block Digital Envelope to Obtain Symmetric Key and Decrypt Block • Verify Merchant Signature on Authorization Block • Decrypt Payment Block Digital Envelope to Obtain Symmetric Key and Decrypt Block • Verify Dual Signature on Payment Block • Verify Received Transaction ID Received from Merchant Matches PI Received from Customer • Request and Receive Issuer Authorization
  • 20. SET Interoperability • Software development on SET protocol • Brokat, Entrust, Globeset, GTE, IBM, TrinTech, Verisign • SET costs • Software development • Hardware and runtime increases with high volume of transactions