crypto
crypto
ELECTRONIC TRANSACTION
13.2 SECURE
Global reach of Internet encourages online transactions. Secured encryption technology IS neetad
support secure E-commerce in the Internet. Cryptanalysis or code breaker and US export restricis
on encryption are some of the challenges in encryption technology to provide Secure Electronic Trai.
actions in the Internet. In order to provide solution to these challenges, Secure Electronic Transactn 3. Custo
(SET) was developed. SET is an open encryption and security standardi specification that ensures secue to buy
financial transactions performedin the Internetthrough a debit or credit card received from abank.S p r o v i d
was developed by VISA and MasterCard with the support of GTE, Microsoft, IBM and Netscape. Its 4 Issuer
wlente-Teorl ceby I s s u e r
msaction pbuy
some
products
ape. It is suer
ders and
H i ha u t h e n t i c a t i o n .
the customer
ddigital Payment Gateway is an interface
Gateway: The
ate key.
Pment
transfer and settlement. between the merchant and
Isaugports money
Acquirer.
Certification Authority: An entity that issues
eHyper erchants, acquirer, issuer and payment gateways.
X.509v3 public key certificates
to cardholders,
's infor
vantage 13.1, initially, the customer sends order request to the
Sothat TGqUest and confirms the order to the customers. After
merchant. The merchant verifies the
information and order related confirmation fromthe merchant,
getting
nation. EOstomer sends payment related
information to merchant. The
Eahant extracts order related information and
forwards the payment related theinformation to the
ir through payment gateway. The acquirer
fom the issuer that the customer does not communicates with the issues and gets confirma
(bank), exceed his/her limit. After that the acquirer gives
t authorization message to the merchant
ps to the customer. The CA takes the through payment gateway. Finally merchant delivers
stomers Eponents in the form of certificates. responsibility of providing private and public keys to all
iteway.
horiza 22Functionality of SET
cquirer
ivering , both the
Customer and the merchant should register their details with the CA. Then, the
nables the merchant to authorize the user as
ic key received a legitimate user with a valid card by checking
from the CA. It uses X.509v3 digital certificate andrivest, shamirand adleman
342 Cygtgrty and Network Security
the SET. As
(RSA) Sinaturs to prON
authentication in
keys to each other as digital
initialization procedure,
an Nnhant exchange theë public certiftcates provided he
ln the SEt niatin sent from customer to the menchant are Pl and
order carhe
ensurs that the intomatin
is
sent
prtatd
tiom
to
customer to menchant is not altered
provide the tacility of inform atn
during the ime he SEr
confidentiality,
create a Dual Signature (DS) on privacy
tin The intirmatin nd of
The candhoderenters his her private key to tmEN
Messge Digst (MD
introduced inthe SET to provide the
the order
Nhenticaten
and he
pue
The DS isanew onept which is facility of
Us or Qmatenating two diterent messages
the DS
that are
in such
intended
a
fortn
way that the diflerent privacy
persons in
The Ds
m E Hene, the customer creates
the payment-related
merchant
information can view
merhant cannot view
inomation and hene
View the payment-related intomation
and hence the bunk cannot view the order-related the Similarly,
computes MDs of payment. and
In order to do that, the customer initiallyAlgorith-1 order-related informatien
For computing the MD, Secure Hashing
Message
(SHA-1) is used. These
Digest) and OIMD(Order Information
MDS are denutsd iniomata
PIMD (Pament Infommation Message
values, these two values are concatenated and the result Diges). Atg
creting the PIMD and OIMD Message Digest (POMD). This | is sent into
hash function, The final result is called Payment Order
ther encrypted using the private key of card holdto produce the DS. The process of creating the DSifu POMDis
shown in Figure 13.2.
The SET consists of two phases, namely purchase request andIpurchase response. During the pur:
chase request, the cardholder has to send order- and payment-related information to the merchant and
tothe bank. Inthe purchase response, the merchant responds with the cardholder. If the cardholder
transzction is valid, then the merchant delivers the goods to the cardholder. For creating the purchase
request message, the cardholder initially creates the DS. After creatingthe DS, it generates arandom
infornmation as shown in Figure 133
session key value K, to encrypt the payment-related
key of bank Ku. This
erating the session key, it encrypts the session key using the public and is used for fii
decrypted by using the private key of bank Kr,. This is called digital envelope based on enermi
created
the randomly generated session key by the bank. This digital envelope is creating the digital en
performed using the public key of the bank with the RSA algorithm. After PIM
session key generated by the customen
lope, the customer encrypts the PI, DS and OIMD using the DS
browser software. This provides additional confidentiality to
the PI of the transaction. This esut s in en
digital envelope, PIMD, O1, DS and
denoted as encrpted PI. Finally, the customer sends encrypted P1, whic
hunk
P SHA-1 PIMD
POMD ntor
PIMD + OIMD
Customer
SHA-1 H OIMD of the
Usins
Figure 13.2 Dual signature process
Aeplcation Layar Serurity343
Dual s i g n a t u r e
Ks
Digtal enyalope
OIMD
Ku,
IMO
Dual signature
Merchant
Certificate of customer
Encrypted PI
Digital envelope
PIMD POMD
H
Compare
OIMD
Dual signature
D
Encrypted PI
D PI OIMD DS
Digital envelope
D Ks D
H Compare
POMD
Algorithm
Expansion Key size
(bits)
S. No.
DataEncryption Standard
Functionality
56
1.
DES
Protects financial data
key system) (private
Advanced Encryption Standard 128
AES
Speed and
Commercial Data Masking than DES security increased
CDMF
Facility 40
3 Protects acquirer (cardholder
RSA
Rivest-Shamir-Adleman
1024
message)
4
Public key cryptosystem
SHA-1
Secure Hashing Algorithm-1 160
5. Hash algorithm condenses
Hash Message Authentication message to fixed length
HMAC
Code 128
6. Message authentication code
used with SHA-1
MD5 Message Digest 5
128
Digest function
DS to get POMD. Fimally, it compares both the
the.
decrypts