Alternative Frameworks of E-Commerce and Electronic Payment Systems Specially Suitable for the Developing Countries Likes Ours

Size: px
Start display at page:

Download "Alternative Frameworks of E-Commerce and Electronic Payment Systems Specially Suitable for the Developing Countries Likes Ours"

Transcription

1 Alternative Frameworks of E-Commerce and Electronic Payment Systems Specially Suitable for the Developing Countries Likes Ours ABSTRACT With the rapid growth of Information and Communication Technology (ICT), e-commerce and online transactions are gaining more popularity in the western world. But in the third world countries like Bangladesh, the scenario is different; e-commerce or electronic payment is of no use excepting a few exceptions. Technical laggings, dearth of infrastructure and infeasibility of the existing frameworks are the main reasons behind this. There are several alternative ways of e-commerce and online transaction. But the establishment and maintenance overheads associated with them are not viable for the developing countries like Bangladesh. In this paper, we analyzed the existing systems from the aspect of developing countries, focused on their limitations and presented alternative frameworks for e-commerce and electronic payments, which may be convincingly suitable for the third world countries Keywords E-commerce, Electronic payment, Online transaction, Framework. 1. INTRODUCTION Electronic commerce is one of the most common business terms in use as we embark on 2 1 st century. E- commerce is developing day-by-day and spreading all over the world. Now it is very much popular in the First world country. People are purchasing product through e-commerce using credit card payment system. However, in the developing country like ours it is not popular or developed yet. The underlying reason behind this is the complexity and problems associated with the credit card processing. Because credit card processing by third party or establishing merchant account is costly and cumbersome task. Transaction by this way will increase product price and in the developing country, people will not be attracted by such circumstance. By this procedure both have to make transaction through bank account which might not attract buyer for online

2 shopping. Considering these issues, we design a system where we omitted the third party and instead of using credit card, we offer a prepaid card which is maintained by the prepaid card company. And this card company removes extra complexity associated with the third party. Because here processing levels decrease and no extra charge is needed to pay by customer and merchant. And the system is designed with considering various aspects of security and firewalls related to processing. 2 THIRD PARTY PROCESSOR AND CREDIT CARDS Third party credit card processor is a company that can accept credit card orders on behalf of the customers or his company and charge an amount for every transaction. Here processing, consumers register with a third party on the Internet to verify electronic micro transactions. It is known as on-line third-party processor (OTPPs). OTPPs have created a six-step process that they believe it will be a fast and efficient way to buy information online: 1. The consumer acquires an OTPP account number by filling out a registration form. 2. To purchase an article, software, or other information online, the consumer request the item from the merchant by quoting her OTPP account number. The purchase can take place in one of the two ways: The consumer can automatically authorize the merchant via browser settings to access her OTPP account and bill her, or she can type in the account information. 3. The merchant contacts the OTPP payment server with the customer s account number. 4. The OTPP payment server verifies the customer s account number for the vendor and checks for sufficient funds.

3 5. The OTPP payment server sends an electronic message to the buyer. This message could be an automatic WWW form that is sent by the OTPP server or could be a simple . The buyer responds to the form or e- mail in one of the three ways: Yes, I agree to pay; No, I will not pay; Fraud, I never asked for this. 6. If the OTPP server gets a Yes from the customer, the merchant is informed and the customer is allowed to purchase the item. 7. The OTPP will not debit the buyer s account until it receives confirmation of purchase completion. 3. MERCHANT ACCOUNT This is the most professional method for accepting credit cards online. A merchant account is an account with a bank (sometimes arranged through an authorized agent) which allows us to accept charge cards as payment for products and services. The account is set up in merchant s business name and approved based on his business credit standing. 4. PROBLEM WITH THIRD PARTY/ MERCHANT ACCOUNT a)problems with current structure: Current structure of e-commerce includes credit cards, where many of the users of developing countries are not experienced with credit cards. And at that situation clients cannot make e-commerce transaction. b) Additional fees: Third parties take a charge for every transaction from both the buyer and seller. This will indirectly increase the price of the product, which will discourage buyer to buy the product. d) Micro-transactions face problem:

4 As the merchants/sellers need to pay some charge for every product, for this, sellers don t get profit by selling low price products. So they don t keep low-price products in their catalog. As a result, the buyers can not buy low-price products and thus the benefit of e-commerce shrinks. e)problem with processing steps: Most third party processors will redirect a customer to their own site to make payment on orders.. Thus, the involvement of third party makes the processing steps of an online marketing more longer than it should be. As for every transaction both buyer and seller go through third party verification processes, this includes the additional sequences. To maintain these additional steps during transaction is quite cumbersome task for the user and it also increases the time duration of online marketing. 5. OUR PROPOSED SYSTEM INFRASTRUCTURE 5.1Consideration In our proposed framework, we are considering that the Government will inaugurate permission for some e- commerce sites and prepaid card companies conform with some reliabilities. The components of our system include: Vendors E-commerce site Prepaid card company E-commerce site We are considering that there will be some e-commerce sites facilitating on-line shopping. A user can interact with these sites where the user can buy the products according to his need. When the user finishes his shopping, a bill voucher and the prepaid cards varieties are provided to the user. The user selects one prepaid card company, then merchant s site s function is to redirect the user to the card company server, at the same time the

5 bill is encrypted with the shop s private key and the card company s public key. It is encrypted with the shop s private key, which ensures that the bill is only redirected by the shop only. Moreover, it is encrypted with the public key of Card Company because only Card Company can decrypt the bill and only that company can watch the bill Pre Paid Card Company Three things must be associated with the prepaid card company Decryption Query user account Redirect Decryption When the pre paid card company receives the encrypted bill its first task is to decrypt it with the public key of the shop and then by the private key of the prepaid card company. Then it gets the original information Query user account When a user buys a card from the market, user s first task is to register himself with the prepaid card company. At that time, a login name and password is given to the user. Then when the user is redirected to the card company, then user s first task is to log on to the card company. Then the company shows the bill information that is redirected from the shop. If the user accepts the bill then the corresponding amount is deducted from the user account Redirect One acknowledgement is redirected to the e-shop that bill is paid, so the shop now can deliver the product and at the same time, a confirmation is sent to the user by a transaction number that he can take/receive the product from the shop Actions in case of disruption

6 After the transaction is completed, it is the responsibility of e-shop to deliver the product and the e-shop will take a receipt from the customer. In case of any disruption the customer will be able to contact with the prepaid card company with the transaction number and will query the e-shop to provide receipt of the customer. In case Fig 1: Our proposed system infrastructur of failure to show the receipt, the amount be again balanced from both sites. 5.2 ADVANTAGES OF THE PROPOSED SYSTEM Our system overcome the problem of Third Party and its functionality is convenient than the third party and the overall operation of the system is very much simple and easy to implement. Several advantages are listed below 1) No extra charge from customers: Our proposed system does not charge any amount from the customer, where in other credit card systems vendors need to pay some extra charge over the cost price of the items. 2) No monthly statement:

7 In credit card based payment system, users need to have a monthly statement of all transactions. And after that users have to pay their bill to the bank account, but here in our proposed system the users don t need to face this type of bill statement, all transactions are current. 3) Micro-transaction is possible: As the merchants need to pay a little percentage to the card company, so that merchants will also get profit by selling products of low prices.as a result, they will include low-price product s in their product catalog and buyers will be benefited. 4) Less processing time: Here processing time is lower than current e-commerce transaction policies. No extra verification is considered like credit-card based payment system. 5) Commerce with local currency: All the transactions performed now a day are by foreign currency. Therefore, it s quite cumbersome task to determine the price of product according to foreign currency like dollars. However, in our proposed system all the transactions are by local currency. It will encourage both buyers and merchants. 5.3 SECURITY ISSUE FOR OUR PROPOSED FRAMEWORK As the internet became mainstream and the number of companies, individuals, and government agencies using it grew, so did the number of and type of transactions that needed protection. Three requirements are necessary to carry on secure communication on the internet: confidentiality, integrity and authentication. There are three different techniques that we have imposed for our security issue. They are as follows: 1)RSA 2)SSL

8 5.4 RSA ALGORITHM RSA is named after its inventors, Rivest, Shamir, and Adleman.It is a public key cryptographic algorithm that does encryption as well as decryption. The key length is variable. Anyone using RSA can choose a long key for enhanc First we need to generate a public key and a corresponding private key. Choose two large primes p and q (probably around 256 bits each).multiply them together and call the result n.the factors p and q will remain secret. To generate our public key, choose a number e that is relatively prime to Φ (n).since we know p and q,we know Φ(n)- its (p-1)(q-1).our public key is (e,n). To generate our private key, find the number d that is the multiplicative inverse of e mod Φ(n).(d,n) is our private key. To encrypt a message m (<n), someone using our public key should compute cipher text c=m e mod n.only we will be able to decrypt c, using our private key to compute m=c d mod n How does RSA work? RSA does arithmetic mod n,where n=pq.we know that Φ(n)=(p-1)(q-1).We have chosen d and e such that de=1 mod Φ(n).Therefore for any x,x de =x mod n.an RSA encryption consists of of taking x and raising it to e.if we take the result and raise it to the d(perform RSA decryption),we will get (x e ) d,which equals x ed.which is the same as x.so we see decryption reverses the encryption Why is RSA Secure? We don t know for sure that RSA is secure. We can only depend on the Fundamental Tenet of Cryptography-lots of smart people are trying to figure out to break RSA and they haven t come up with anything yet. The real premise behind RSA s security is the assumption that factoring a big number is hard. The best known factoring methods are really slow. To factor a 512 bit number with the best known techniques would take about thirty thousand MIPS-year. 5.5 SSL(SECURE SOCKETS LAYER) SSL stands for Secure Sockets Layer. It is a family of protocols that is originally designed to provide security for HTTP transactions, but that also can be used for a variety of other Internet protocols such as IMAP and NNTP.HTTP

9 running over SSL is referred to as secure HTTP. We want to connect to a server using SSL by replacing http with https in the protocol component of a URI. The default port for HTTP over SSL is SSL Protocol Summary: The Process to establish an SSL connection is the following: The user uses his browser to connect to the remote apache server. The handshake phase begins-the browser and server exchange keys and certificate information. The browser checks the validity of the server certificate, including that it has not expired, that it has been issued by trusted CA and so on. Optionally, the server can require the client to present a valid certificate as well. Server and client use each other s public key to securely agree on a symmetric key. The Handshake phase concludes and transmission continues using symmetric cryptography Obtaining and Installing SSL Tools: SSL support is provided by mod_ssl, an Apache module.this module requires the OpenSSL library-an open-source implementation of the SSL/TLS protocols and a variety of the other cryptographic algorithms OpenSSL: All files and instructions necessary for installing OpenSSL can be found at Users of Linux/Unix will find the installation of the OpenSSL software to be familiar to installing other system tools For Linux/Unix Users: We are running a recent LINUX that s why OpenSSL is already be installed in our system. In the past, SSL extensions for Apache had to be distributed separately because of export restrictions.currently; mod_ssl is bundled with Apache 2.0, but only as part of the source distributions. While not an issue for Linux/Unix users, Windows users will find they must build Apache from source in order to build the mod_ssl module; mod_ssl is not distributed in the precompiled and distributed binaries.the mod_ssl module depends on the OpenSSL library, so a valid OpenSSL installation is required.

10 5.5.5 Managing Certificates: After installing and configuring OpenSSL and mod_ssl, the next step for a working SSL server implementation is to create a server certificate. We are using SSL for an e-commerce site, encryption prevents customer data from eavesdroppers, and the certificate enables customers to verify that we are who claim to be. We must have a public/private key pair before we can create a certificate request. Assume that the FQDN for the certificate we want to create is then we can create the keys by using the following command: # /usr/local/ssl/bin/openssl genrsa des3 rand file1:file2:file3 \ -out Example of SSL Configuration: We can add the following configuration snippet to our Apache Configuration file: Listen 443 <VirtualHost_default_:443> <ServerName SSLEngine on SSLCertificateFile \ /usr/local/ssl/openssl/certs/ SSLCertificateKeyFile \ /usr/loca/ssl/openssl/certs/ </Virtual Host> Starting the Server: Now we can stop the server if it is running, and start it again. If we compiled and installed Apache our self then we can see an <ifdefine SSL> block surrounds the SSL directives. That allows for conditional starting of the server in

11 SSL mode. Finally if we always want to start Apache with SSL support, we can just remove the <ifdefine> section and start Apache in the usual way. 6 CONCLUSION In this research we have depicted all the relative advantages and disadvantages of the existing hardware based transaction system and clarify the reasons behind choosing our proposed one. Its a great boon for developing country like us. We have considered different types of security measures so that it can deter any fraudulent access to our site and take necessary steps. Customer doesn t have to go a long way for purchasing. Surfing on to the respective site customer can get access onto the online shopping site and order as required. With proper prepaid card a valid customer is identified and make proceeded. Cards are available on the market and users have different options in money value. Websites are designed in such user-friendly that customers can see their way clear while accessing. All the daily necessary stuffs and house-hold appliances are available to be ordered. Customer s satisfactions are fulfilled by blaze of colorful designing. Sites are designed in such a way that they will entice people into purchasing the product very easily. After completion of purchasing, customers are assured of delivering by a confirmation generated from the respective card companies to the authority of online shopping site. After all we wish our proposed works will be a commodity from our country s point of view. REFERENCES: [1]. Sharma & Sharma, Developing e-commerce Sites. [2] Ravi Kalakata, Andrew B Whinston, Frontiers of Electronic Commerce. [3] Macgregor, R.; Ezvan, C.; Liguori, L.; and Han, J. Secure Electronic Transaction Credit Card Payment on the web in theory and Practice. [4] Greenstein; Feinman: Electronic Commerce; security, risk management and Control [5] Christopher Negus Red Hat Linux 7.3 Bible [6] [7]

Apache, SSL and Digital Signatures Using FreeBSD

Apache, SSL and Digital Signatures Using FreeBSD Apache, SSL and Digital Signatures Using FreeBSD AfNOG 2007 Unix System Administration April 26, 2007 Hervey Allen Network Startup Resource Center Some SSL background Invented by Netscape for secure commerce.

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

Apache Security with SSL Using Ubuntu

Apache Security with SSL Using Ubuntu Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Apache Security with SSL Using Linux

Apache Security with SSL Using Linux Apache Security with SSL Using Linux These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions INTRODUCING MASTERPASS WHAT IS MASTERPASS? WHAT ARE THE BENEFITS OF MASTERPASS? WHAT IS THE CUSTOMER EXPERIENCE WHEN MY CONSUMER CLICKS ON BUY WITH MASTERPASS? CAN MY CUSTOMERS

More information

User s guide. APACHE 2.0 + SSL Linux. Using non-qualified certificates with APACHE 2.0 + SSL Linux. version 1.3 UNIZETO TECHNOLOGIES S.A.

User s guide. APACHE 2.0 + SSL Linux. Using non-qualified certificates with APACHE 2.0 + SSL Linux. version 1.3 UNIZETO TECHNOLOGIES S.A. User s guide APACHE 2.0 + SSL Linux Using non-qualified certificates with APACHE 2.0 + SSL Linux version 1.3 Table of contents 1. PREFACE... 3 2. GENERATING CERTIFICATE... 3 2.1. GENERATING REQUEST FOR

More information

SecuritySpy Setting Up SecuritySpy Over SSL

SecuritySpy Setting Up SecuritySpy Over SSL SecuritySpy Setting Up SecuritySpy Over SSL Secure Sockets Layer (SSL) is a cryptographic protocol that provides secure communications on the internet. It uses two keys to encrypt data: a public key and

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]

More information

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002 INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before

More information

Securing the OpenAdmin Tool for Informix web server with HTTPS

Securing the OpenAdmin Tool for Informix web server with HTTPS Securing the OpenAdmin Tool for Informix web server with HTTPS Introduction You can use HTTPS to protect the IBM OpenAdmin Tool (OAT) for Informix web server from eavesdropping, tampering, and message

More information

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English Afaria Network Configuration (X87) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography

More information

Properties of Secure Network Communication

Properties of Secure Network Communication Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

More information

Angel Dichev RIG, SAP Labs

Angel Dichev RIG, SAP Labs Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice

More information

Implementing Secure Sockets Layer on iseries

Implementing Secure Sockets Layer on iseries Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates

More information

E-commerce Shopping Carts Digital Cert. Merchants

E-commerce Shopping Carts Digital Cert. Merchants E-commerce Shopping Carts Digital Cert. Merchants What is E-commerce? In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. People

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

[SMO-SFO-ICO-PE-046-GU-

[SMO-SFO-ICO-PE-046-GU- Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It

More information

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Understanding Digital Certificates and Secure Sockets Layer (SSL) Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005 Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol

More information

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0 How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Electronic Commerce and E-wallet

Electronic Commerce and E-wallet International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: [email protected]

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

2014 IBM Corporation

2014 IBM Corporation 2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173 Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security

More information

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using

More information

Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS

Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS A number of applications today use SSL and TLS as a security layer. Unsniff allows authorized users to analyze these applications by decrypting

More information

Securing Your Apache Web Server With a Thawte Digital Certificate

Securing Your Apache Web Server With a Thawte Digital Certificate Contents Securing Your Apache Web Server With a Thawte Digital Certificate 1. Overview 2. Research 3. System requirements 4. Generate your private key 5. Generate your Certificate Signing Request 6. Using

More information

>copy openssl.cfg openssl.conf (use the example configuration to create a new configuration)

>copy openssl.cfg openssl.conf (use the example configuration to create a new configuration) HowTo - PxPlus SSL This page contains the information/instructions on SSL Certificates for use with PxPlus Secure TCP/IP-based applications such as the PxPlus Web Server, the PxPlus Application Server

More information

Web Security: Encryption & Authentication

Web Security: Encryption & Authentication Web Security: Encryption & Authentication Arnon Rungsawang [email protected] Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,

More information

SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service

SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service Paper SAS1541-2015 SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service Heesun Park and Jerome Hughes, SAS Institute Inc., Cary, NC ABSTRACT

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Protect your CollabNet TeamForge site

Protect your CollabNet TeamForge site 1 Protect your CollabNet TeamForge site Set up SELinux If SELinux is active on the machine where your CollabNet TeamForge site is running, modify it to allow the services that TeamForge requires. This

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

E-Commerce: Designing And Creating An Online Store

E-Commerce: Designing And Creating An Online Store E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

SSL Certificates HOWTO

SSL Certificates HOWTO Franck Martin Revision History Revision v0.1 2001 11 18 Revised by: fm A first hand approach on how to manage a certificate authority (CA), and issue or sign certificates to be used for secure web, secure

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

A: This will depend on a number of factors. Things to consider and discuss with a member of our ANZ Merchant Services team are:

A: This will depend on a number of factors. Things to consider and discuss with a member of our ANZ Merchant Services team are: 1 ANZ egate FAQ s Contents Section 1 General information: page 1 Section 2 Technical information for ANZ egate Merchants: page 5 November 2010 Section 1 General information Q: What is ANZ egate? A: ANZ

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public

More information

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005 Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the vwlan Appliance

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the vwlan Appliance Installing an SSL Certificate Provided by a Certificate Authority (CA) on the vwlan Appliance Date: 2/18/2011 Revision: 1.0 Introduction This document explains how to install an SSL certificate provided

More information

COMP 3704 Computer Security

COMP 3704 Computer Security COMP 3704 Computer Security Christian Grothoff [email protected] http://grothoff.org/christian/ 1 Key Size Consider how much the information is worth Even advancements in computing are not going to

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

SSL A discussion of the Secure Socket Layer

SSL A discussion of the Secure Socket Layer www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record

More information

AS DNB banka. DNB Link specification (B2B functional description)

AS DNB banka. DNB Link specification (B2B functional description) AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

mod_ssl Cryptographic Techniques

mod_ssl Cryptographic Techniques mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Authorize.net modules for oscommerce Online Merchant.

Authorize.net modules for oscommerce Online Merchant. Authorize.net Authorize.net modules for oscommerce Online Merchant. Chapters oscommerce Online Merchant v2.3 Copyright Copyright (c) 2014 oscommerce. All rights reserved. Content may be reproduced for

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

WS_FTP Professional 12. Security Guide

WS_FTP Professional 12. Security Guide WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...

More information

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/ Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................

More information

Enterprise SSL Support

Enterprise SSL Support 01 Enterprise SSL Support This document describes the setup of SSL (Secure Sockets Layer) over HTTP for Enterprise clients, servers and integrations. 1. Overview Since the release of Enterprise version

More information

Two Factor Authentication in SonicOS

Two Factor Authentication in SonicOS Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

Understanding SSL/TLS

Understanding SSL/TLS Understanding SSL/TLS or What is an SSL Certificate and What Does It Do for Me? J.K. Harris Electrical and Computer Engineering Virginia Tech Oct 2008 1/39 Understanding SSL/TLS What is It? How Does It

More information

Building a Secure RedHat Apache Server HOWTO

Building a Secure RedHat Apache Server HOWTO Table of Contents Building a Secure RedHat Apache Server HOWTO...1 Richard Sigle, [email protected] 1. Purpose/Scope of this Guide...1 2. Introduction to Secure Sockets Layer/Private Key Infrastructure...1

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Key Management (Distribution and Certification) (1)

Key Management (Distribution and Certification) (1) Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem

More information