set secure electronic transaction(set)

Post on 27-Jan-2017

641 Views

Category:

Engineering

6 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Secure Electronic Transaction(SET)

Suraj DhalwarSushant TodkarSnehit Deokar

Chinta Yashwanth

Outline: History SET and Requirements Key Features SET Participants Events in SET Key Technologies in SET Dual Signature Conclusion

History/Background:

-Internet shopping didn’t quite pick up as consumers considered financial transactions over the internet, unsafe-Lacks the one on one transaction feeling.-Visa & MC came up with the idea what we call as SET.

What is SET? SET is an open encryption and security

specification designed to protect credit card transactions on the Internet.

SET is in effect a set of protocols for ensuring security and confidentiality.

SET is a relatively new standard. It was first used in February 1996 and was proposed by Visa and MasterCard.

Requirements That SET Must Accomplish

Provide confidentiality of ordering and payment information.

Ensure the integrity of all transmitted data Provide authentication that a cardholder is a

legitimate user of a credit card account. Provide authentication that a merchant can accept

credit card transactions through its relationship with a financial institution.

Key Features of SET Confidentiality of information.

Integrity of Data.

Cardholder account authentication.

Merchant authentication.

Confidentiality of Information

A credit card holder’s personal and payment information is secured as it travels across the network. An interesting feature of SET is that the merchant /seller never sees the credit card number; this is only provided to the issuing bank. Conventional encryption using DES is used to provide confidentiality.

Integrity of Data

Payment information sent from cardholders to merchants include order information, personal information and payment instructions. SET guarantees that these message contents are not altered in transit. RSA digital signatures, using SHA-1 hash codecs, provide message integrity.

Cardholder Account Authentication

SET enables merchants to verify that a cardholder is legitimate user of a valid card account number. SET uses X.509v3 digital certificates with RSA signatures for this purpose.

Merchant Authentication

SET enables cardholders to verify that a merchant has a relationship with a financial institution allowing it to accept payment cards. SET uses X.509v3 digital certificates with RSA signatures for this purpose.

SET Participants Cardholder Merchant Issuer Acquirer Payment Gateway Certification Authority

SET Components and Participants

Cardholder & Merchant Cardholder

– This is an authorized holder of a payment card (e.g, MasterCard, Visa) that has been issued by an issuer.

Merchant– This is a person or organization who has things

to sell to the cardholder. A merchant that accepts credit cards must have a relationship with an acquirer

Issuer & Acquirer Issuer

– This is a financial institution such as a bank that provides the card holder with the payment card.

Acquirer– This is a financial institution that establishes an account

with the merchant and processes credit card authorizations and payments. The acquirer provides authorization to the merchant that a given card account is active and that the proposed purchase does not exceed the credit limit. The Acquirer also provides electronic payments transfers to the merchant’s account.

Payment Gateway This is a function that can be undertaken by

the acquirer or some third party that processes merchant payment messages.

The payment gateway interfaces between SET and the existing bankcard payment networks for authorization and payment functions.

Certification Authority(CA) This is an entity that is entrusted to issue

X.509v3 public-key certificates for cardholders, merchants, and payment gateways.

X.509 Authentication Service• X.509v3 – this is an authentication service

which includes a public – certificate associated with each user. Certificates are assumed to be created by some trusted Certification Authority(CA), and then placed in a directory that can be viewed by others who need to verify the public-key of someone. CA signs the certificate with its private-key thereby authenticating the fact that this key does indeed belong to a user A.

X.509 Certificate

X.509 Certificate Version: there are differences between

different versions of certificates. Serial Number: unique integer value. Issuer name: CA that created and signed the

certificate Period Of Validity: expiration date.

X.509 Certificate Cont’d Subject Name: The name of the user to

whom the certificate refers. Subjects Public-key Information: public-key

of the subject. Signature: Covers all other fields of the

certificate; it contains a hash code of all other fields, encrypted with the CA’s private key.

Events required for a Successful SET Transaction

1. Customer Opens an account – customer gets a credit card account from, such as a Visa or MasterCard, with a bank that supports SET.

2. The Customer receives a certificate – the customer receives an X.509v3 digital certificate which is signed by the bank. This certificate verifies the customers public key and it’s expiration date.

3. Merchant Certificates – the merchant must have two(2) certificates for the two public keys it owns. One for signing messages with and one for key exchange. The merchant also needs a copy of the payment gateway’s public-key certificate.

4. The customer places an order.

Events required for a Successful SET Transaction Cont’d

Events required for a Successful SET Transaction Cont’d

5. Merchant Verification – The merchant sends an order form to the customer, as well as a copy of the merchants certificate, so the customer can verify that he/she is dealing with a valid store.

6. Order & Payment Sent – The customer sends order information (OI) and payment information(PI) to the merchant together with the customers certificate so the merchant can verify that he is dealing with a valid customer. The PI is encrypted in such a way that the merchant cannot read it.

Events required for a Successful SET Transaction Cont’d

7. Merchant Requests PI authorization – The merchant forwards the PI to the payment gateway, to determine whether the customer has sufficient funds/credit for the purchase.

8. Merchant Confirms the order – merchant sends confirmation of the order to the customer.

9. Merchant ships goods and services.10. Merchant requests payment – this request for

payment is sent to the payment gateway, which handles payment processing

Key Technologies of SET Confidentiality of information: DES Integrity of data: RSA digital signatures with

SHA-1 hash codes Cardholder account authentication: X.509v3

digital certificates with RSA signatures Merchant authentication: X.509v3 digital

certificates with RSA signatures Privacy: separation of order and payment

information using dual signatures

Concept: Link Two Messages Intended for Two Different Receivers:– Order Information (OI): Customer to Merchant– Payment Information (PI): Customer to Bank

Goal: Limit Information to A “Need-to-Know” Basis:– Merchant does not need credit card number.– Bank does not need details of customer order.– Afford the customer extra protection in terms of privacy by

keeping these items separate. This link is needed to prove that payment is intended for this

order and not some other one.

SET’s Dual Signature

Why Dual Signature?

Suppose that customers send the merchant two messages:• The signed order information (OI).• The signed payment information (PI).• In addition, the merchant passes the payment information

(PI) to the bank. If the merchant can capture another order information (OI) from

this customer, the merchant could claim this order goes with the payment information (PI) rather than the original.

Dual Signature

Purchase Request – CustomerThe cardholder generates a one-time symmetric encryption key, KS,

Merchant Verifies Purchase Request

When the merchant receives the Purchase Request message, it performs the following actions:– Verify the cardholder

certificates by means of its CA signatures.

– Verifies the dual signature using the customer’s public key signature.

Merchant Verification (cont’d)

– Processes the order and forwards the payment information to the payment gateway for authorization.

– Sends a purchase response to the cardholder.

Payment Gateway Authorization1. verifies all certificates2. decrypts digital envelope of authorization block to obtain

symmetric key & then decrypts authorization block3. verifies merchant's signature on authorization block4. decrypts digital envelope of payment block to obtain

symmetric key & then decrypts payment block5. verifies dual signature on payment block6. verifies that transaction ID received from merchant

matches that in PI received (indirectly) from customer7. requests & receives an authorization from issuer8. sends authorization response back to merchant

Payment Capture merchant sends payment gateway a

payment capture request gateway checks request then causes funds to be transferred to

merchants account notifies merchant using capture response

SET Overhead

Simple purchase transaction: Four messages between merchant and customer Two messages between merchant and payment gateway 6 digital signatures 9 RSA encryption/decryption cycles 4 DES encryption/decryption cycles 4 certificate verifications

Scaling: Multiple servers need copies of all certificates

Advantages:

-Privacy: Uses 1024 bit public key cryptography which renders the intercepted message unreadable !-Integrity: Hashing & signing ensures message sent is unaltered.-Authentication: Uses digital certificates to ensure the parties are really who they claim to be.

CONCLUSION -Uses 1024–bit cipher keys, making it one of the strongest encryption applications.-If we use 100 computers each processing 10 MIPS, it would take 2.8 x 10 11 years to break just ONE encrypted message !!!!

Source: http://www.rsa.com/set/html/howstrong.html

top related