e commerce

36
E-commerce Víctor E. Ríos

Upload: victor-rios

Post on 10-Jan-2016

81 views

Category:

Documents


2 download

DESCRIPTION

e Commerce

TRANSCRIPT

Page 1: e Commerce

E-commerceVíctor E. Ríos

Page 2: e Commerce

Abstract

● E-commerce is a very important tool for business, the benefits generated by e-commerce are inclusively raising the economies of some countries. The transactions made in e-commerce applications use information such as bank accounts, credit cards numbers and general information about the parties involved, therefore when the applications are being designed the security must be in the designer's mind. In this work, I explain the importance of e-commerce security as well as the protocols associated with it.

Page 3: e Commerce

Contents

● Electronic commerce● Secure E-commerce protocol● Public Key Infrastructure● Digital Signatures and Certificates● Secure Socket Layer● Pretty Good Privacy● Secure Electronic Transaction

Page 4: e Commerce

Introduction to e-commerce

● E-commerce (electronic commerce) consists in buying and selling products or services by electronic means, using principally Internet as the mean for transactions.

Page 5: e Commerce

Benefits

● e-commerce:– Disappears geophysical barriers.

– Allows companies to enhance their supply chain operation.

– Expands the customer base.

– Creates a competitive advantage.

– Reduces costs of production.

– Allows to trade continuously.

Page 6: e Commerce

Types of e-commerce

● Business-to-Consumer (B2C)● Business-to-Business (B2B)● Business-to-Government (B2G)● Consumer-to-Consumer (C2C)

Page 7: e Commerce

Business-to-Consumer (B2C)

● Companies selling goods and/or services to people in general, the end-users.

● For selling physical goods, the companies offers its products using a website with storefront, online catalogs in websites.

Page 8: e Commerce

E-tail

● E-tail is the business of selling goods directly to people using electronic means.

● Although Internet is an insecure channel, it is the main channel used to sell this products, through the World Wide Web.

Page 9: e Commerce

www.etail.com

Page 10: e Commerce

Business-to-Business (B2B)

● Business-to-business (B2B) refers to the commerce transactions between business.

● The volume of B2B transactions is higher than the B2C transactions, because the supply chain involves more transactions than a single B2C transaction.

Page 11: e Commerce

Business-to-Government (B2G)

● Business-to-Government refers to selling goods or services to the different government levels.

Page 12: e Commerce

Consumer-to-Consumer (C2C)

● The consumer-to-consumer commerce involves transactions between consumers through some trusted third party.

● The third party organizes the transaction and receives something from the transaction.

● The transactions can be online auctions.

Page 13: e Commerce

Security in e-commerce

● The security is fundamental to provide the confidence that e-commerce requires.

● The e-commerce protocol is divided in phases. The phases need some security measures to protect the process.

Page 14: e Commerce

Schmid's e-commerce model.

● Information phase:– The parties find partners, compare the offers,

specify the trade relation and choose the products to be traded.

● Contracting phase:– The parties sign a contract.

● Delivery phase:– The payment and the delivery are done.

Page 15: e Commerce

Security measures in E-commerce transaction phases

Page 16: e Commerce

E-commerce security requirements

● Access Control● Privacy/Confidentiality● Authentication● Non-Repudiation● Integrity● Availability● Supports man-in-the-middle attacks.

Page 17: e Commerce

Public Key Infrastructure (PKI)

● Establishing an infrastructure that supports the public key encryption satisfy the requirement of authentication.

● The PKI allows the system to distribute and use public keys and digital certificates.

● One of the algorithms used for public key encryption is RSA.

Page 18: e Commerce

Public Key Infrastructure

Page 19: e Commerce

Public Key Infrastructure

● The PKI allows parties to communicate through insecure channels, such as Internet, even without having a previous knowledge of the other party.

● This process requires certificates and digital signatures. A secure e-commerce protocol also provides certificates and a .

● A certificate authority (CA) issues the certificates to customers or merchants.

Page 20: e Commerce

Certificates

● For a secure e-commerce protocol, the certificate schema of the customer and the merchant contains:– Certificate holder's name and ID, certificate holder's

public key information, certificate serial number, key usage limitation definition, certificate policy information, certificate validity period, certificate issuer's name and ID.

● The certificate is encrypted by private key of a CIA (Certificate Issue Authority).

Page 21: e Commerce

Google certificate

Page 22: e Commerce
Page 23: e Commerce
Page 24: e Commerce

Digital Signatures

● The digital signatures also complies the requirements of authentication and integrity.

● By encrypting a value with the sender's private key the only way to get back the message is decrypting the ciphertext received with the sender's public key.

Page 25: e Commerce

Secure Socket Layer (SSL)

● Secure Socket Layer (SSL) and its successor Transport Layer Security (TLS) provide a secure communication between the parties involved.

● SSL/TLS are used in operations that involve information exchange, such as the e-commerce transactions.

● SSL/TLS employees digital certificates and PKI to provide authentication. The information is sent in packets through different routes.

Page 26: e Commerce

Secure Socket Layer (SSL)

● Specify algorithms for the communication.● Public key exchange:

– RSA, Diffie-Hellman, DSA, Fortezza.

● Provides certificates based authentication.● Symmetric encryption:

– RC4, AES, DES, Triple DES, IDEA.

● Hash functions: MD5, SHA.

Page 27: e Commerce

Pretty Good Privacy (PGP)

● Phil Zimmermann (1991)● Pretty good privacy satisfies the confidentiality

and authentication requirements.● The other services provided by PGP are

compression, e-mail compatibility and segmentation.

Page 28: e Commerce

PGP Authentication

● The first party generates a message.● From this message the sender obtains a 160-bits

hash code using SHA-1.● The hash code is encrypted with the sender's

private key (digital signature) and is concatenated with the message. The result is compressed.

● Then symmetric encryption is applied. The session key is encrypted using the receiver's public key and is added to the ciphertext.

Page 29: e Commerce

PGP Authentication

● The receiver decrypts the ciphertext using the private key and the session key.

● The text is decompressed.● The encrypted hash code is decrypted using the

sender's public key.● A new hash is generated with the rest of the message

and SHA-1.● The new hash code and the received hash code are

compared. If the two match, the message is accepted.

Page 30: e Commerce

Pretty Good Privacy

Page 31: e Commerce

PGP Confidentiality

● The sender creates a message to be transmitted and a 128-bit session key.

● The message is encrypted with the session key.● The session key is encrypted with the receiver

public key and is attached to the encrypted message.

● The receiver decrypts the session key and then decrypts the ciphertext to obtain the message.

Page 32: e Commerce

Attacks: Frauds

● The e-commerce security sometimes can't protect users against frauds or identity thefts.

● Frauds:– The merchandise is not sent.

– The products are of lesser value than advertised.

– All relevant information about a product is not made public.

● Auction frauds: shill bidding, bid shielding.

Page 33: e Commerce

Attacks

● Attacks to SSL/TLS:– Password interception.

– BEAST (Browser Exploit Against SSL/TLS Attack), based on chosen ciphertext attack.

– Timing attacks.

● Attacks to PGP:– Passive attacks and keypress snooping.

– The Trojan Horse is still effective.

– PGP is highly vulnerable to chosen ciphertext attacks.

Page 34: e Commerce

Future works

● The secure e-commerce protocol can handle only one transaction at a time.

● There are some requirements that are not fulfilled by the established protocols, replay threats and the frauds cannot be handled by this cryptographic functions.

Page 35: e Commerce

Conclusion

● E-commerce is a great way to trade. E-commerce allows a company to reach new markets and increase its sales. Nevertheless, the information exchange requires a strong protection against threats. The cryptographic techniques provides the protection that the data management requires. In this work, I presented the main practices used to protect the information against third parties.

Page 36: e Commerce

References

● Yasin, S., Haseeb, K., Jalal, R. (March 2012) Cryptography Based E-Commerce Security: A Review. International Journal of Computer Sciences Issues, Vol. 9, Issue 2, No. 1.

● Al-Slamy, N. (May 2008) E-commerce Security. International Journal of Computer Science and Network Security, Vol. 8, No. 5.