45136707 electronic payment systems

111
Introduction

Upload: rama-krishnan

Post on 01-Nov-2014

120 views

Category:

Documents


0 download

DESCRIPTION

sps

TRANSCRIPT

Introduction Outline +The Net Effect on Payment/E-Payment +Impact on Developed Countries +Starting point for Developing Nations +New Opportunities Conventional Payment Mechanisms in United States+ Approx 80% of payments in Cash + International Trade involves Wire Transfers, Letters of Credit etc. Non-Cash Payment Instrument Trans. Volume Trans. Value Average Value Check71%10%$1,179 C/D Card25%0.1%$59 C/D Transfer by ACH 2.5%2%$2,000 Wire Transfer0.1%86%$4.3m 1999 Source BIS Retail Payments Net Evolution + Cash evolving (very slowly) to Internet based systems such as Paypal + Credit-Card based systems Ideal for Internet already a global payment method tradition of card-not-present Combined with Secure Socket Layer, it is used for almost all retail E-commerce high fraud rate + Retail Check being eroded by Electronic Bill Payment, electronic home banking Trade Payments Net Evolution + Check Payments migrating to Electronic Transfers in the U.S. via the Automated Clearing House (ACH) networks FSTC E-check and BIPS Projects + ACH Transfers growing in importance European Initiatives: STEP1 (1, if a and n are relatively prime, then the equation ax=b mod n has a unique solution modulo n. Encryption + In the RSA system, the actual encryption is done using exponentiation. + A key result: 1 mod, 01== ep aa Z f or any a ime, thenIfp is prremittle Theo Fermats Lpp Encryption + RSA technicals Select 2 prime numbers p and q Let n=pq Select a small odd integer e relatively prime to (p-1)(q-1) Compute the modular inverse d of e, i.e. the solution to the equation Publish the pair P=(e,n) as the public key Keep secret the pair S=(d,n) as the secret key ( )( ) 1 1 mod 1 = q p deEncryption For this specification of the RSA system, the message domain is Zn Encryption of a message M in Zn is done by defining Decrypting the message is done by computing n M M P Cemod ) ( = =() n C C Sdmod =Encryption Let us verify that the RSA scheme does in fact define an invertible mapping of the message. ( ) ( ) ( ) ( )( )( )( ) theorem.) s Fermat' applying byfollowsteps last(themodmodmod modHence, . integersome for 1 1 1other each of inverses modularare and Sincen. modany For ) 1 () 1 ( ) 1 () 1 )( 1 (M n M Mn M MMn MM n Mkq p k ede dM M P S M S PZ Mkqq k pq p k ededn= === + =-= =e - Encryption Note that the security of the encryption system rests on the fact that to compute the modular inverse of e, you need to know the number (p-1)(q-1), which requires knowledge of the factors p and q. Getting the factors p and q, in turn, requires being able to factor the large number n=pq.This is a computationally difficult problem. Some examples: http://econ.gsia.cmu.edu/spear/rsa3.asp Encryption + Applications Direct message encryption Digital Signatures Use secret key to encrypt signature: S(Name) Appended signature to message and send to recipient Recipient decrypts signature using public key: P(S(Name)=Name Encrypted message and signature Create digital signature as above, appended to message, encrypt message using recipients public key Recipient uses own secret key to decrypt message, then uses senders public key to decrypt signature, thus verifying sender Policy Issues + Privacy and verification + Transaction costs and micro-payments + Monetary effects Domestic money supply control and economic policy levers International currency exchanges and exchange rate stability + Market organization effects Development of new financial intermediaries + Effects on government Seniorage Legal issues 2/16/00EMTM 55333 E-payment systems +To transfer money over the Internet +Methods of traditional payment Check, credit card, or cash +Methods of electronic payment Electronic cash, software wallets, smart cards, and credit/debit cards Scrip is digital cash minted by third-party organizations 2/16/00EMTM 55334 Requirements for e-payments +Atomicity Money is not lost or created during a transfer +Good atomicity Money and good are exchanged atomically +Non-repudiation No party can deny its role in the transaction Digital signatures 2/16/00EMTM 55335 Desirable Properties of Digital Money +Universally accepted +Transferable electronically +Divisible +Non-forgeable, non-stealable +Private (no one except parties know the amount) +Anonymous (no one can identify the payer) +Work off-line (no on-line verification needed) No known system satisfies all. 2/16/00EMTM 55336 Types of E-payments +E-cash +Electronic wallets +Smart card +Credit card 2/16/00EMTM 55337 Electronic Cash +Primary advantage is with purchase of items less than $10 Credit card transaction fees make small purchases unprofitable Micropayments Payments for items costing less than $1 2/16/00EMTM 55338 E-cash Concept Merchant Consumer Bank 1 2 3 4 5 1. Consumer buys e-cash from Bank 2. Bank sends e-cash bits to consumer (after charging that amount plus fee) 3. Consumer sends e-cash to merchant 4. Merchant checks with Bank that e-cash is valid (check for forgery or fraud) 5. Bank verifies that e-cash is valid 6. Parties complete transaction: e.g., merchant present e-cash to issuing back for deposit once goods or services are delivered Consumer still has (invalid) e-cash 2/16/00EMTM 55339 Electronic Cash Issues +E-cash must allow spending only once +Must be anonymous, just like regular currency Safeguards must be in place to prevent counterfeiting Must be independent and freely transferable regardless of nationality or storage mechanism +Divisibility and Convenience +Complex transaction (checking with Bank) Atomicity problem 2/16/00EMTM 55340 Two storage methods +On-line Individual does not have possession personally of electronic cash Trusted third party, e.g. online bank, holds customers cash accounts +Off-line Customer holds cash on smart card or software wallet Fraud and double spending require tamper-proof encryption 2/16/00EMTM 55341 Advantages and Disadvantages of Electronic Cash +Advantages More efficient, eventually meaning lower prices Lower transaction costs Anybody can use it, unlike credit cards, and does not require special authorization +Disadvantages Tax trail non-existent, like regular cash Money laundering Susceptible to forgery 2/16/00EMTM 55342 Electronic Cash Security +Complex cryptographic algorithms prevent double spending Anonymity is preserved unless double spending is attempted +Serial numbers can allow tracing to prevent money laundering Does not prevent double spending, since the merchant or consumer could be at fault2/16/00EMTM 55343 Blind Signatures +Goal to have the bank sign documents without knowing what they are signing. +Why? Anonymity with Authentication 2/16/00EMTM 55344 How to sign with blind fold? +How? Basic: Sign anything 1. You encrypt the message 2. Send it to the bank 3. The bank signs the message and returns it 4. You decrypt the signed message 5. You spend it 2/16/00EMTM 55345 Cut and Choose +Problems The bank honors anything I write down +Solution: the Cut-and-choose algorithm 1. Prepare n copies of the messages and n different keys, and send them to the bank 2. The bank requests the keys for and opens n - 1 of them, and verifies them.It then signs the remaining one. 3. The bank sends back the signed message, which can then be decrypted and spent 2/16/00EMTM 55346 Anonymous digital cash? +Protocol #1 +Protocol #2 +Protocol #3 +Protocol #4 2/16/00EMTM 55347 Detecting Double Spending 2/16/00EMTM 55348 Past and Present E-cash Systems +E-cash not popular in U.S., but successful in Europe and Japan Reasons for lack of U.S. success not clear Manner of implementation too complicated Lack of standards and interoperable software that will run easily on a variety of hardware and software systems 2/16/00EMTM 55349 Past and Present E-cash Systems +Checkfree Allows payment with online electronic checks +Clickshare Designed for magazine and newspaper publishers Miscast as a micropayment only system; only one of its features Purchases are billed to a users ISP, who in turn bill the customer 2/16/00EMTM 55350 Past and Present E-cash Systems + CyberCash Combines features from cash and checks Offers credit card, micropayment, and check payment services Connects merchants directly with credit card processors to provide authorizations for transactions in real time No delays in processing prevent insufficient e-cash to pay for the transaction + CyberCoins Stored in CyberCash wallet, a software storage mechanism located on customers computer Used to make purchases between .25c and $10 PayNow -- payments made directly from checking accounts 2/16/00EMTM 55351 Past and Present E-cash Systems + DigiCash Trailblazer in e-cash Allowed customers to purchase goods and services using anonymous electronic cash Recently entered Chapter 11 reorganization + Coin.Net Electronic tokens stored on a customers computer is used to make purchases Works by installing special plug-in to a customers web browser Merchants do not need special software to accept eCoins. eCoin server prevents double-spending and traces transactions, but consumer is anonymous to merchant Aggregation +Used when individual transactions are too small for credit card (e.g. $2.00) +Consumer and Merchant sign up with Aggregator +Consumer makes purchase.Merchant notifies Aggregator. +Aggregator keeps Consumers account.When amount owed is large enough (or every month), charges to Consumers credit card +Aggregator sends money (less fees) to Merchant +QPASS, CyberCash, GlobeID 2/16/00EMTM 55353 Past and Present E-cash Systems + MilliCent Developed by Digital, now part of Compaq Electronic scrip system Participating merchant creates and sells own scrip to broker at a discount Consumers register with broker and buy bulk generic scrip, usually with credit card Customers buy by converting broker scrip to vendor-specific scrip, i.e. scrip that a particular merchant will accept Customers can purchase items of very low value Brokers required for two reasons: Small payments require aggregation to insure profitability System is easier to use -- customer need only deal with one broker for all their scrip needs 2/16/00EMTM 55354 Electronic Wallets +Stores credit card, electronic cash, owner identification and address Makes shopping easier and more efficient Eliminates need to repeatedly enter identifying information into forms to purchase Works in many different stores to speed checkout Amazon.com one of the first online merchants to eliminate repeat form-filling for purchases2/16/00EMTM 55355 An Electronic Checkout Counter Form 2/16/00EMTM 55356 Electronic Wallets + Agile Wallet Developed by CyberCash Allows customers to enter credit card and identifying information once, stored on a central server Information pops up in supported merchants payment pages, allowing one-click payment Does not support smart cards or CyberCash, but company expects to soon+ eWallet Developed by Launchpad Technologies Free wallet software that stores credit card and personal information on users computer, not on a central server; info is dragged into payment form from eWallet Information is encrypted and password protected Works with Netscape and Internet Explorer 2/16/00EMTM 55357 Electronic Wallets +Microsoft Wallet Comes pre-installed in Internet Explorer 4.0, but not in Netscape All information is encrypted and password protected Microsoft Wallet Merchant directory shows merchants setup to accept Microsoft Wallet 2/16/00EMTM 55358 Entering Information Into Microsoft Wallet 2/16/00EMTM 55359 W3C Proposed Standard for Electronic Wallets + World Wide Web Consortium (W3C) is attempting to create an extensible and interoperable method of embedding micropayment information on a web page Extensible systems allow improvement of the system without eliminating previous work + Merchants must accept several payment options to insure the widest possible Internet audience Merchants must embed in their Web page payment information specific to each payment system This redundancy spurred W3C to develop common standards for Web page markup for all payment systems Must move quickly to prevent current methods from becoming entrenched 2/16/00EMTM 55360 W3C Electronic Commerce Interest Group (ECIG) Draft Standard Architecture +Client (consumers web browser) initiates micropayment activity Client browser includes Per Fee Link Handler module and one or more electronic wallets New HTML tags will carry micropayment information 2/16/00EMTM 55361 W3C Proposed Micropayment HTML Tags 2/16/00EMTM 55362 The ECML Standard +Electronic Commerce Modeling Language (ECML) proposed standards for electronic wallets Companies forming the consortium are America Online, IBM, Microsoft, Visa, and MasterCard Ultimate goal is for all commerce sites to accept ECML Unclear how this standard will incorporate privacy standards W3C set forth Electronic Commerce Modeling Language (ECML) Wallet/Merchant Standards Initiative, July 1999 (Next four slides) 2/16/00EMTM 55363 Current state of the market - online data exchanges + Providing payment and order information to merchants while shopping online is typically a manual consumer process + 27% of online buyers abandon orders before check-out due to the hassle of filling out forms 1 + There is no standard way for identifying the specific data attributes that consumers must provide to merchants during an online transaction This significantly complicates/limits the ability for digital wallets to automatically exchange information with a merchant web site + 76% of merchants surveyed indicated they are willing to participate in a multi site wallet enterprise, indicating that multi site wallets offer reduced acquisition costs that far outweigh the risk to merchants of losing an existing customer 1 1Jupiter Communications 2/16/00EMTM 55364 ECML - Wallet/Merchant Standard+ Creating a standard approach for the exchange of information will enhance the ability for digital wallets to be used at all merchant sites and therefore facilitate the growth of e-commerce + ECML is a universal, open standard for digital wallets and online merchants that facilitates the seamless exchange of payment and order information to support online purchase transactions Uniform field names only to start; will evolve over time + The ECML Alliance today: America Online, American Express, Brodia (formerly Transactor Networks), Compaq, CyberCash, Discover, Financial Services Technology Consortium (FSTC), IBM, MasterCard, Microsoft, Novell, SETCo, Sun Microsystems, Trintech, and Visa + ECML is designed to be security protocol independent, support global implementations, and support any payment instrument + ECML does not change the look and feel of a merchants site 2/16/00EMTM 55365 Summary of current ECML specification min minfield fieldfield names length field names lengthEcom_ShipTo_Postal_Name_Prefix 4 Ecom_ReceiptTo_Postal_Name_Prefix 4Ecom_ShipTo_Postal_Name_First 15 Ecom_ReceiptTo_Postal_Name_First 15Ecom_ShipTo_Postal_Name_Middle 15 Ecom_ReceiptTo_Postal_Name_Middle 15Ecom_ShipTo_Postal_Name_Last 15 Ecom_ReceiptTo_Postal_Name_Last 15Ecom_ShipTo_Postal_Name_Suffix 4 Ecom_ReceiptTo_Postal_Name_Suffix 4Ecom_ShipTo_Postal_Street_Line1 20 Ecom_ReceiptTo_Postal_Street_Line1 20Ecom_ShipTo_Postal_Street_Line2 20 Ecom_ReceiptTo_Postal_Street_Line2 20Ecom_ShipTo_Postal_Street_Line3 20 Ecom_ReceiptTo_Postal_Street_Line3 20Ecom_ShipTo_Postal_City 22 Ecom_ReceiptTo_Postal_City 22Ecom_ShipTo_Postal_StateProv 2 Ecom_ReceiptTo_Postal_StateProv 2Ecom_ShipTo_Postal_PostalCode 14 Ecom_ReceiptTo_Postal_PostalCode 14Ecom_ShipTo_Postal_CountryCode 2 Ecom_ReceiptTo_Postal_CountryCode 2Ecom_ShipTo_Telecom_Phone_Number 10 Ecom_ReceiptTo_Telecom_Phone_Number 10Ecom_ShipTo_Online_Email 40 Ecom_ReceiptTo_Online_Email 40Ecom_BillTo_Postal_Name_Prefix 4 Ecom_Payment_Card_Name 30Ecom_BillTo_Postal_Name_First 15 Ecom_Payment_Card_Type 4Ecom_BillTo_Postal_Name_Middle 15 Ecom_Payment_Card_Number 19Ecom_BillTo_Postal_Name_Last 15 Ecom_Payment_Card_Verification 4Ecom_BillTo_Postal_Name_Suffix 4 Ecom_Payment_Card_ExpDate_Day 2Ecom_BillTo_Postal_Street_Line1 20 Ecom_Payment_Card_ExpDate_Month 2Ecom_BillTo_Postal_Street_Line2 20 Ecom_Payment_Card_ExpDate_Year 4Ecom_BillTo_Postal_Street_Line3 20 Ecom_Payment_Card_Protocol 20Ecom_BillTo_Postal_City 22Ecom_BillTo_Postal_StateProv 2 Ecom_ConsumerOrderID 20Ecom_BillTo_Postal_PostalCode 14Ecom_BillTo_Postal_CountryCode 2 Ecom_SchemaVersion 30Ecom_BillTo_Telecom_Phone_Number 10Ecom_BillTo_Online_Email 40 Ecom_TransactionComplete -2/16/00EMTM 55366 ECML implementation and Alliance participation + The ECML Alliance seeks widespread support for and adoption of the ECML standard + ECML is publicly available today and can be easily implemented by online merchants, e-commerce technology vendors, and other interested parties www.ecml.org - the official web site of ECML + ECML has been enthusiastically endorsed by several e-commerce industry segments, including the following leading online merchants: To support the current version of ECML, a merchant will need to make a one-time change to incorporate the uniform field names into the check-out pages of its web site, and make changes to CGI/ASP scripts Organizations interested in participating in the ECML Alliance should contact [email protected] with their indication of interest beyond.com Dell Computer fashionmall.com healthshop.com Nordstrom.com Omaha Steaks Reel.com 1-800-Batteries 2/16/00EMTM 55367 Smart Cards+ Magnetic stripe 140 bytes, cost $0.20-0.75 + Memory cards 1-4 KB memory, no processor, cost $1.00-2.50 + Optical memory cards 4 megabytes read-only (CD-like), cost $7.00-12.00 + Microprocessor cards Embedded microprocessor (OLD) 8-bit processor, 16 KB ROM, 512 bytes RAM Equivalent power to IBM XT PC, cost $7.00-15.00 32-bit processors now available 2/16/00EMTM 55368 Smart Cards +Plastic card containing an embedded microchip+Available for over 10 years +So far not successful in U.S., but popular in Europe, Australia, and Japan +Unsuccessful in U.S. partly because few card readers available +Smart cards gradually reappearing in U.S.; success depends on: Critical mass of smart cards that support applications Compatibility between smart cards, card-reader devices, and applications2/16/00EMTM 55369 Smart Card Applications + Ticketless travel Seoul bus system: 4M cards, 1B transactions since 1996 Planned the SF Bay Area system + Authentication, ID + Medical records + Ecash + Store loyalty programs + Personal profiles + Government Licenses + Mall parking . . .2/16/00EMTM 55370 Advantages and Disadvantages of Smart Cards + Advantages: 1. Atomic, debt-free transactions 2. Feasible for very small transactions (information commerce) 3. (Potentially) anonymous 4. Security of physical storage 5. (Potentially) currency-neutral + Disadvantages: 1. Low maximum transaction limit (not suitable for B2B or most B2C) 2. High Infrastructure costs (not suitable for C2C) 3. Single physical point of failure (the card) 4. Not (yet) widely used 2/16/00EMTM 55371 Mondex Smart Card + Holds and dispenses electronic cash (Smart-card based, stored-value card) + Developed by MasterCard International + Requires specific card reader, called Mondex terminal, for merchant or customer to use card over Internet + Supports micropayments as small as 3c and works both online and off-line at stores or over the telephone + Secret chip-to-chip transfer protocol + Value is not in strings alone; must be on Mondex card + Loaded through ATM ATM does not know transfer protocol; connects with secure device at bank 2/16/00EMTM 55372 Mondex Smart Card Processing 2/16/00EMTM 55373 Mondex transaction + Here's what happens "behind the scenes" during a Mondex transaction between a consumer and merchant. Placing the card in a Mondex terminal starts the transaction process:1. Information from the customer's chip is validated by the merchant's chip. Similarly, the merchant's card is validated by the customer's card.2. The merchant's card requests payment and transmits a "digital signature" with the request. Both cards check the authenticity of each other's message. The customer's card checks the digital signature and, if satisfied, sends acknowledgement, again with a digital signature.3. Only after the purchase amount has been deducted from the customer's card is the value added to the merchant's card. The digital signature from this card is checked by the customer's card and if confirmed, the transaction is complete. 2/16/00EMTM 55374 Mondex Smart Card + Disadvantages Card carries real cash in electronic form, creating the possibility of theft No deferred payment as with credit cards -cash is dispensed immediately + Security Active and dormant security software Security methods constantly changing ITSEC E6 level (military) VTP (Value Transfer Protocol) Globally unique card numbers Globally unique transaction numbers Challenge-response user identification Digital signatures MULTOS operating system firewalls on the chip 2/16/00EMTM 55375 Credit Cards + Credit card Used for the majority of Internet purchases Has a preset spending limit Currently most convenient method Most expensive e-payment mechanism MasterCard: $0.29 + 2% of transaction value Disadvantages Does not work for small amount (too expensive) Does not work for large amount (too expensive) + Charge card No spending limit Entire amount charged due at end of billing period 2/16/00EMTM 55376 Payment Acceptance and Processing +Merchants must set up merchant accounts to accept payment cards+Law prohibits charging payment card until merchandise is shipped +Payment card transaction requires: Merchant to authenticate payment card Merchant must check with card issuer to ensure funds are available and to put hold on funds needed to make current charge Settlement occurs in a few days when funds travel through banking system into merchants account 2/16/00EMTM 55377 Processing a Payment Card Order 2/16/00EMTM 55378 Open and Closed Loop Systems +Closed loop systems Banks and other financial institutions serve as brokers between card users and merchants -- no other institution is involved American Express and Discover are examples +Open loop systems Transaction is processed by third party Visa and MasterCard are examples 2/16/00EMTM 55379 Setting Up Merchant Account +Merchant bank Also called acquiring bank Does business with merchants that want to accept payment cards Merchant receives account where they deposit card sales totals Value of sales slips is credited to merchants account 2/16/00EMTM 55380 Processing Payment Cards Online +Can be done automatically by software packaged with electronic commerce software +Can contract with third party to handle payment card processing Can also pick, pack, and ship products to the customer Allows merchant to focus on web presence and supply availability 2/16/00EMTM 55381 Credit Card Processing SOURCE: PAYMENT PROCESSING INC. 2/16/00EMTM 55382 Payment Processing Services +Internetsecure Provides secure credit card payment services Supports payments with Visa and MasterCard Provides risk management and fraud detection, and ensures all proper security for credit card transactions is maintained Ensures all transactions are properly credited to merchants account 2/16/00EMTM 55383 Payment Processing Services +Tellan Provides PCAuthorize for smaller commerce sites and WebAuthorize for larger enterprise-class merchant sites Both systems capture credit card information from the merchants form and connect directly to the bank network using dial-up or private, leased lines Bank network receives credit information, performs credit authorization, and deposits the money in the merchants bank account The merchants web site receives confirmation or rejection of the transaction, which is communicated to the customer 2/16/00EMTM 55384 Payment Processing Services +IC Verify Provides electronic transaction processing for merchants for all major credit and debit cards Also allows check guarantees and verification transactions A CyberCash company +Authorize.Net Online, real time service that links merchants with issuing banks by simply inserting a small block of HTML code into their transaction page 2/16/00EMTM 55385 Secure Electronic Transaction (SET) Protocol + Jointly designed by MasterCard and Visa with backing of Microsoft, Netscape, IBM, GTE, SAIC, and others + Designed to provide security for card payments as they travel on the Internet Contrasted with Secure Socket Layers (SSL) protocol, SET validates consumers and merchants in addition to providing secure transmission + SET specification Uses public key cryptography and digital certificates for validating both consumers and merchants Provides privacy, data integrity, user and merchant authentication, and consumer nonrepudiation 2/16/00EMTM 55386 The SET protocol The SET protocol coordinates the activities of the customer,merchant, merchants bank, and card issuer. [Source: Stein] 2/16/00EMTM 55387 SET Payment Transactions +SET-protected payments work like this: Consumer makes purchase by sending encrypted financial information along with digital certificate Merchants website transfers the information to a payment card processing center while a Certification Authority certifies digital certificate belongs to sender Payment card-processing center routes transaction to credit card issuer for approval Merchant receives approval and credit card is charged Merchant ships merchandise and adds transaction amount for deposit into merchants account 2/16/00EMTM 55388 SET uses a hierarchy of trust All parties hold certificates signed directly orindirectly by a certifying authority. [Source: Stein] 2/16/00EMTM 55389 SET Protocol + Extremely secure Fraud reduced since all parties are authenticated Requires all parties to have certificates + So far has received lukewarm reception + 80 percent of SET activities are in Europe and Asian countries + Problems with SET Not easy to implement Not as inexpensive as expected Expensive to integrated with legacy applications Not tried and tested, and often not needed Scalability is still in question Electronic payments: Issues +Secure transfer across internet +High reliability: no single failure point +Atomic transactions +Anonymity of buyer +Economic and computational efficiency: allow micropayments +Flexiblility: across different methods +Scalability in number of servers and users E-Payments: Secure transfer +SSL: Secure socket layer below application layer +S-HTTP: Secure HTTP: On top of http SSL: Secure Socket Layer + Application protocol independent + Provides connection security as: Connection is private: Encryption is used after an initial handshake to define secret (symmetric) key Peer's identity can be authenticated using public (asymmetric) key Connection is reliable: Message transport includes a message integrity check (hash) + SSL Handshake protocol: Allows server and client to authenticate each other and negotiate a encryption keySSL Handshake Protocol + 1. Client "Hello": challenge data, cipher specs + 2. Server "Hello": connection ID, public key certificate, cipher specs + 3. Client "session-key": encrypted with server's public key + 4. Client "finish": connection ID signed with client's private key + 5. Server "verify": client's challenge data signed with server's private key + 6. Server "finish": session ID signed with server's private key+ Session IDs and encryption options cached to avoid renegotiation for reconnection S-HTTP: Secure HTTP +Application level security (HTTP specific) +"Content-Privacy-Domain" header: Allows use of digital signatures &/ encryption Various encryption options +Server-Browser negotiate Property: cryptographic scheme to be used Value: specific algorithm to be used Direction: One way/Two way security Secure end to end protocols E-Payments: Atomicity +Money atomicity: no creation/destruction of money when transferred +Goods atomicity: no payment w/o goods and viceversa. Eg: pay on delivery of parcel +Certified delivery: the goods delivered is what was promised: Open the parcel in front of a trusted 3rd party Anonymity of purchaser Payment system types +Credit card-based methods Credit card over SSL- First Virtual -SET +Electronic Cheques - NetCheque+Anonymous payments - Digicash- CAFE +Micropayments +SmartCards Encrypted credit card payment +Set secure communication channel between buyer and seller+Send credit card number to merchant encrypted using merchants public key +Problems: merchant fraud, no customer signature+Ensures money but no goods atomicity +Not suitable for microtransactions First virtual +Customer assigned virtual PIN by phone +Customer uses PIN to make purchases +Merchant contacts First virtual +First virtual send email to customer +If customer confirms, payment made to merchant +Not goods atomic since customer can refuse to pay +Not suitable for small transactions +Flood customers mailbox, delay merchant Cybercash +Customer opens account with cybercash, gives credit card number and gets a PIN +Special software on customer side sends PIN, signature, transaction amount to merchant +Merchant forwards to cybercash server that completes credit card transaction +Pros: credit card # not shown to server, fast +Cons: not for microtransactionsSET:Secure Electronic Transactions +Merge of STT, SEPP, iKP +Secure credit card based protocol +Common structure: Customer digitally signs a purchase along with price and encrypts in banks public key Merchant submits a sales request with price to bank. Bank compares purchase and sales request. If price match, bank authorizes sales +Avoids merchant fraud, ensures money but no goods atomicity Electronic Cheques +Leverages the check payments system, a core competency of the banking industry.+Fits within current business practices +Works like a paper check does but in pure electronic form, with fewer manual steps.+Can be used by all bank customers who have checking accounts +Different from Electronic fund transfers How does echeck work? +Exactly same way as paper+Check writer "writes" the echeck using one of many types of electronic devices+Gives" the echeck to the payee electronically.+Payee "deposits"echeck, receives credit,+Payee's bank "clears" the echeck to the paying bank.+Paying bank validates the echeck and "charges" the check writer's account for the check.Anonymous payments 1. Withdraw money: cyrpographically encoded tokens 2. Transform so merchant can check validity but identity hidden 3. Send token after adding merchants identity 4. Check validity and send goods 5. Deposit token at bank. If double spent revealidentity and notify police customer merchant Problems with the protocol +Not money atomic: if crash after 3, money lost if money actually sent to merchant: returning to bank will alert police if money not sent: not sending will lead to loss +High cost of cryptographic transformations: not suitable for micropayments +Examples: Digicash Micropayments on hyperlinks +HTML extended to have pricing details with each link: displayed when user around the link +On clicking, browser talks to E-Wallet thatinitiates payment to webserver of the source site +Payment for content providers +Attempt to reduce overhead per transaction Micropayments: NetBill + Customer & merchant have account with NetBill server + Protocol: Customer request quote from merchant, gets quote and accepts Merchant sends goods encrypted by key K Customer prepares & signs Electronic Purchase Order having Merchant countersigns EPO, signs K and sends both to NetBill server NetBill verifies signatures and transfers funds, stores K and crypto-checksum and NetBill sends receipt to merchant and K to customerRecent micropayment systems Company PaymentsystemUniquecodeCompaq Millicent mcentIBM IBM paymentsystemmpayFranceTelecomMicrommerce micromSmartcards + 8-bit micro, < 5MHz, < 2k RAM, 20k ROM + Download electronic money on a card: wallet on a card + Efficient, secure, paperless, intuitive and speedy+ Real and virtual stores accept them+ Less susceptible to net attacks since disconnected + Has other uses spanning many industries, from banking to health careMondex +Smart card based sales and card to card transfers +Money is secured through a password and transactions are logged on the card +Other operation and features similar to traditional debit cards +Card signs transaction: so no anonymity +Need card reader everywhere +Available only in prototypes