1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

CP3397 ECommerce.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Payment Systems Unit 34: E-commerce M2 - Compare two different payment systems used in e-commerce systems.
Figure 15.1 Conventional Cryptography
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
1 Buyer 2. Account ID Valid? 3. Account OK! 5. Transaction Details 1. Account ID 4. Information Goods 6. Satisfied? 7. Accept/Reject or Fraud Indication.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security
12 E-Commerce Overview.
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments makes payments Withdraw/ Deposit coins New Coins, statement Valid indication Validate +deposit coins signs coins user accounts database

2 Minting Stage Serial number (unknown) Client (known) Deposit Stage Serial number (known) Client (unknown)

3 Withdrawing Coins Many coins of different denominations can be obtained in a single request to the bank Many coins of different denominations can be obtained in a single request to the bank The request is signed by the client with his private key and contains information about the serial nos. to be signed The request is signed by the client with his private key and contains information about the serial nos. to be signed The request is encrypted with a symmetric key and that symmetric key is encrypted with the public key of the bank The request is encrypted with a symmetric key and that symmetric key is encrypted with the public key of the bank The bank signs serial nos. in order to mint coins of requested denominations and forward them to the client/buyer The bank signs serial nos. in order to mint coins of requested denominations and forward them to the client/buyer

4 Payreq={currency,amount,timestamp, merchant_bank ID, merchant_accID, order description} merchant_bank ID, merchant_accID, order description}

5 Hash function and message digest are sent to the e-cash bank Hash Bluesky MD

6 Lost Coins In case network fails or computer crashes during payment transaction, coins might be lost In case network fails or computer crashes during payment transaction, coins might be lost All signed blinded coins from last 16 withdrawals are sent by the bank to the client All signed blinded coins from last 16 withdrawals are sent by the bank to the client Client uses the blinding factor known to its wallet to reveal the serial # Client uses the blinding factor known to its wallet to reveal the serial # It then sends all serial nos. to the bank for its verification whether or not the coins have already been spent It then sends all serial nos. to the bank for its verification whether or not the coins have already been spent After checking its database the bank credits the client’s account with the value of unspent coins After checking its database the bank credits the client’s account with the value of unspent coins

7 E-Cash & the Web Ecash Bank Merchant Software Merchant Software Client Wallet Client Wallet Web Browser Web Server 9.Goods/Acknowledgement 1.Select Order 2. Merchant wallet Starts 8.Send goods 3. Payment Request (Order) 4. Payment (coins,order) 7. Receipt 5. Deposit coins 6. Accepted

8 Secure Socket Layer (SSL) A protocol developed by Netscape Communications A protocol developed by Netscape Communications SSL is built into many browsers SSL is built into many browsers Operates at the TCP/IP layer Operates at the TCP/IP layer Uses a combination of symmetric and asymmertric cryptography Uses a combination of symmetric and asymmertric cryptography Internet Explorer: Tools menu->Internet options-> Internet Explorer: Tools menu->Internet options-> Advanced tab-> Security (use SSL option is given) Advanced tab-> Security (use SSL option is given)

9 Client sends “hello” message Client sends response Session SSL Client (browser) Server responds With “hello” message Session Send encryption algorithms and key length SSL Server Send server certificate containing server’s public key Send client certificate and encrypted private session key Send data between client and server using private shared key Server receives client response and initiates session

10 Debit Card Automated Clearing House Payer’s Bank Acquirer Bank PayerPayee Internet Debit Card Certification Authority Payment Gateway

11 SETCo Card Issuer Bank Customer Card Brand Merchant

12 Buyer/Bidder Merchant or Auction house Acquirer Bank Encrypted message authorizing payment to the auction house if offer is accepted, but no details about what item is bought MD2 and DSMD encrypted with Bidder’s private key 1a Offer for Items 4 Encrypted message includes amount offered on the item, but no account information MD1 encrypted with Bidder’s private key 1b Decrypt message with auction house private key Decrypt MD1 with bidder’s public key Determine whether to accept bid 2 Decrypt account information with acquirer private key Decrypt offer acceptance message with acquirer private key Decrypt MD2 and DSMD with bidder’s public key Decrypt MD1 from step no. 3 with auction house’s public key Concatenate MD1 and MD2 Recompute dual signature and verify against DSMD sent by bidder Encrypted message that offer is accepted from bidder MD1 encrypted with auction house’s private key 3 4

13 MD1 from auction house related to order information MD1 from auction house related to order information Account information in encrypted form Account information in encrypted form MD2 related to account information MD2 related to account information DSMD = MD1 + MD2 DSMD = MD1 + MD2

14 SSL Vs. SET SSL only handles secured transmission of credit card no. but SET is designed to handle the whole transaction in a secured manner using dual signatures SSL only handles secured transmission of credit card no. but SET is designed to handle the whole transaction in a secured manner using dual signatures SSL is a general purpose protocol built into the browser, whereas SET requires software on,both, the client and the merchant side SSL is a general purpose protocol built into the browser, whereas SET requires software on,both, the client and the merchant side SET uses a hierarchy of certificates for authentication SET uses a hierarchy of certificates for authentication SET is complex and distribution of certificates is sometimes not stable SET is complex and distribution of certificates is sometimes not stable SET increases transaction cost SET increases transaction cost SET transactions are slower than SSL SET transactions are slower than SSL SET uses a payment gateway for secured transmission of information SET uses a payment gateway for secured transmission of information

15 Advantages of E-business Personalized service Personalized service High-quality customer service High-quality customer service No inventory cost No inventory cost Worldwide reach of your business Worldwide reach of your business Electronic catalogues (Convenient and quick transaction) Electronic catalogues (Convenient and quick transaction) Bulk transactions Bulk transactions Improved supply chain management Improved supply chain management