Download presentation
Presentation is loading. Please wait.
Published byGabriella Thompson Modified over 9 years ago
1
Lecture 12 E-Commerce and Digital Cash
2
As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce have become available. This great potential to reach more customers has led to great potential for theft and fraud. Transmitting credit card and purchase information over nonprotected channels can lead to unwanted parties invading customer privacy and stealing vital credit information. Securing the information necessary to conduct electronic commerce is therefore very important.
3
We look at three examples of how cryptography can be used in electronic business transactions. We use the signatures with additional functionality. The mechanisms described in this lecture provide functionality beyond authentication and non-repudiation. In most instances, they combine a basic digital signature scheme with a specific protocol to achieve additional features which the basic method does not provide.
4
Outline Secure Electronic Transaction Undeniable Signature Digital Cash
5
1 Secure Electronic Transaction Every time someone places an order in an electronic transaction over the internet. These data must be protected from unwanted eavesdroppers in order to ensure the customer ’ s privacy and prevent credit fraud.
6
1.1 Requirements
7
1.2 SET Protocol In 1996, the credit card companies MasterCard and Visa called for the establishment of standards for electronic commerce. The result, whose development involved several companies, is called the SET. It starts with the existing credit card system and allows people to use it securely over open channels. The SET protocol is fairly complex, involving many technique details. In the following, we ’ ll discuss one aspect of the whole protocol, namely the use of dual signature.
8
1.2.1 Elements Participants Bank Cardholder Merchant Cardholder ’ s two pieces of information GSO=goods and services order, which consists of the cardholder ’ s and merchant ’ s names, the quantities of each item ordered, the prices, etc. PI=Payment Instructions, including the merchant ’ s name, the credit card number, the total price, etc.
9
1.2.2 Problem The bank does not need to know what the customer is ordering, and for security reasons the merchant should not know the card number. However, these two pieces of information need to be linked in some way. Otherwise, the merchant could attach the payment information to another order.
10
1.2.3 Transaction Scheme The system uses a public hash function H. A public key algorithm RSA is used, and the cardholder, the merchant, and the bank have their own public and private keys. Let E C, E M, and E B denote the encryption functions for the cardholder, the merchant, and the bank, and let D C, D M, and D B be the decryption functions.
11
1.2.3 Transaction Scheme (Continued)
14
Bank Cardholder Merchant
15
1.2.3 Transaction Scheme (Continued)
16
2 Undeniable Signature Normal digital signatures can be copied exactly. Sometimes this property is useful, as in the dissemination of public announcements. Other times it could be a problem. Imagine a digitally signed personal or business letter. If many copies of that document were floating around, each of which could be verified by anyone, this could lead to embarrassment or blackmail. The best solution is a digital signature that can be proven valid, but that the recipient cannot show to a third party without the signer ’ s consent.
17
2.1 Scenarios for Undeniable Signature
18
2.1 Scenarios for Undeniable Signature (Continued)
19
2.2 Basic Idea
20
2.2 Basic Idea (Continued)
21
2.3 Chaum-Antwerpen Scheme
22
2.3 Chaum-Antwerpen Scheme (Continued)
28
2.4 Further Consideration
29
2.4 Further Consideration (Continued)
30
3 Digital Cash Cash is a problem. It ’ s annoying to carry, it spreads germs, and people can steal it from you. Checks and credit cards have reduced the amount of physical cash flowing through society, but the complete elimination of cash is virtually impossible. It'll never happen; drug dealers and politicians would never stand for it. Checks and credit cards have an audit trail; you can ’ t hide to whom you gave money.
31
Checks and credit cards allow people to invade your privacy to a degree never before imagined. You might never stand for the police following you your entire life, but the police can watch your financial transactions. They can see where you buy your gas, where you buy your food, who you call on the telephone — all without leaving their computer terminals. People need a way to protect their anonymity in order to protect their privacy.
32
A great social need exists for this kind of thing. With the growing use of the Internet for commercial transactions, there is more call for network-based privacy and anonymity in business. (There are good reasons people are reluctant to send their credit card numbers over the Internet.)
33
3.1 Scenarios for Digital Cash Lobbyist Alice can transfer digital cash to congress critter Bob so that newspaper reporter Eve does not know Alice's identity. Bob can then deposit that electronic money into his bank account, even though the bank has no idea who Alice is. But if Alice tries to buy cocaine with the same piece of digital cash she used to bribe Bob, she will be detected by the bank. And if Bob tries to deposit the same piece of digital cash into two different accounts, he will be detected — but Alice will remain anonymous. Sometimes this is called anonymous digital cash.
34
3.2 Requirements for Digital Cash (1) Independence. The security of the digital cash is not dependent on any physical location. The cash can be transferred through computer networks. (2) Security. The digital cash cannot be copied and reused. (3) Privacy (Untraceability). The privacy of the user is protected; no one can trace the relationship between the user and his purchases.
35
3.2 Requirements for Digital Cash (Continued) (4) Off-line payment. When a user pays for a purchase with electronic cash, meaning no communication with the central bank is needed during the transaction. (5) Transferability. The digital cash can be transferred to other users. (6) Divisibility. A piece of digital cash in a given amount can be subdivided into smaller pieces of cash in smaller amounts. (Of course, everything has to total up properly in the end.)
36
3.3 Brands ’ s Digital Cash Scheme We describe a system that satisfies 1 through 4. The system is much more complicated than the centuries old system of actual coins. This is because electronic objects can be reproduced at essentially no cost, in contrast to physical cash, which has usually been rather difficult to counterfeit. Therefore, steps are needed to catch electronic cash counterfeiters. This means that something like a user ’ s signature needs to be attached to an electronic coin. The “ restricted blind signature ” is used to preserve the anonymity.
37
3.3.1 Architecture of Brands ’ s Scheme Participants Bank Spender Merchant Algorithms Initialization Creating a coin Spending a coin Depositing a coin
38
Bank Spender Merchant Initialization Creating a coin Spending a coin Depositing a coin
39
3.3.2 Algorithms of Brands ’ s Scheme
40
3.3.2 Algorithms of Brands ’ s Scheme (Continued)
47
3.3.3 Anonymity of Brands ’ s Scheme
48
3.3.4 Other Security Concerns of Brands ’ s Scheme
49
Thank You!
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.