The basics of Electronic Commerce abbreviated as e-commerce. The advantages and disadvantages of e-commerce
|
|
|
- Wilfrid Hamilton
- 10 years ago
- Views:
Transcription
1 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/ Electronic Commerce Learning Objectives Learning Goals The basics of Electronic Commerce abbreviated as e-commerce The advantages and disadvantages of e-commerce Architecture of e-commerce systems Electronic Data Interchange in e-commerce The need for security in e-commerce transactions and how to ensure it How Electronic payment schemes work in e-commerce. V. Rajaraman/IISc. Bangalore //V1/June 04/1 Indian Institute of Science Bangalore
2 System Analysis and Design Prof. V.Rajaraman System Analysis and Design / Electronic Commerce Motivation Motivation With the emergence of internet and the world wide web new methods of carrying out business transactions using the world wide web began to be explored. Electronic Commerce emerged as a very important application of the world wide web. Today it is difficult to find an isolated computer. Computers in an organization are interconnected to form intranets and intranets of the cooperating organizations are interconnected to form extranet. It is cheaper and faster to carry out business transactions within an organization and among organizations electronically using the network connection. Thus it is important to understand how business transactions are carried out electronically reliably and securely When designing information systems it is essential to understand the emerging web based transactions A number of organizations are exploring how to carry out all day-to-day operations electronically using the intranet in a so-called paperless system It is thus important for a student to understand how to design such systems V. Rajaraman/IISc. Bangalore //V1/July 04/1 Indian Institute of Science Bangalore
3 Electronic Commerce 13.1 What is E-Commerce? V.Rajaraman SAD/M13/LU1/V1/2004 1
4 What Is Electronic Commerce Definition Sharing Business Information, Maintaining Business relationships and conducting business transactions using computers connected to a Telecommunication Network is called E-Commerce Classification Classified As : Business To Business (B2B) Business To Customer (B2C) Customer To Customer (C2C) V.Rajaraman SAD/M13/LU1/V1/2004 2
5 E-commerce Applications-example Retail Stores - Books, Music Auction Sites Cooperating Businesses Placing orders,paying invoices etc. Electronic Banking Booking Tickets - Trains, Cinema, Airlines Electronic Publishing Filling Tax Returns With Government Dept. V.Rajaraman SAD/M13/LU1/V1/2004 3
6 Business To Business E-commerce LAN of buisness2 Public switched telephone network LAN of buisness1 Vendor Local computers PSTN or LEASED LINE Purchase store accounts Local computers V.Rajaraman SAD/M13/LU1/V1/2004 4
7 Business To Business E-commerce (contd.) Local LAN of business would normally follow TCP/IP protocol of internet and is called corporate intranet Purchase order entered by business1 in its PC and electronically dispatched to vendor (by ) Vendor acknowledges electronically the order Vendor dispatches goods(physically) and delivery note electronically to business1 V.Rajaraman SAD/M13/LU1/V1/2004 5
8 B2B E-commerce (Contd) Business 1 can compare delivery note against order -both are in computer readable form Discrepancy note(if any) can be immediately sent to the vendor Business 1 can carry out all local transactions using its LAN Local transactions are inventory update by stores - advice to accounts to pay for goods taken into stock Accounts can make payment electronically to Vendor V.Rajaraman SAD/M13/LU1/V1/2004 6
9 Implementing B2B E-commercerequirements 1. Agreed on formats for Purchase order, delivery note, payment order etc. Standard known as EDI (Electronic Data Interchange Standard) is used to send documents electronically 2.Each Business must have corporate intranet and the two nets are connected by PSTN or leased line 3. Transactions must be secure - particularly if PSTN is used 4.Secure electronic payment methods are required V.Rajaraman SAD/M13/LU1/V1/2004 7
10 Steps In B2C E-commerce 1. Customer uses a browser and locates vendor or he has vendor's web page address 2. Sees Vendor's web page listing of items available, prices etc 3. Customer selects item and places order. Order may include credit card details or may be cash on delivery 4. Vendor checks with credit card company customer s credit V.Rajaraman SAD/M13/LU1/V1/2004 8
11 Steps In B2C E-commerce 5. Credit card company OKs transaction 6. Vendor acknowledges Customer s order and gives details of delivery date, mode of transport, cost etc 7. Vendor orders with distributor who ships item to vendor's warehouse from where item supplied to customer 8. Customer's credit card company debits his account, credits vendor's account and sends bill to customer for payment V.Rajaraman SAD/M13/LU1/V1/2004 9
12 Customer to Customer E-Commerce Customer1 Internet Customer2 Wants to sell Item 1 Wants to buy Item 1 Broker s website Advertises - "for sale" Brings together buyer and seller Transports items Collects fee from both Seller &Buyer V.Rajaraman SAD/M13/LU1/V1/
13 Advantages Of E-commerce 1. Buying/selling a variety of goods and services from one's home or business 2. Anywhere, anytime transaction 3. Can look for lowest cost for specific goods or service 4. Businesses can reach out to worldwide clients - can establish business partnerships V.Rajaraman SAD/M13/LU1/V1/
14 Advantages Of E-commerce 5. Order processing cost reduced 6. Electronic funds transfer faster 7. Supply chain management is simpler, faster, and cheaper using e-commerce - Can order from several vendors and monitor supplies. - Production schedule and inventory of an organization can be inspected by cooperating supplier who can in-turn schedule their work. V.Rajaraman SAD/M13/LU1/V1/
15 Disadvantages Of E-commerce 1. Electronic data interchange using EDI is expensive for small businesses 2. Security of internet is not very good - viruses, hacker attacks can paralise e-commerce 3. Privacy of e-transactions is not guaranteed 4. E-commerce de-personalises shopping.people go shopping to meet others - window shop and bargain V.Rajaraman SAD/M13/LU1/V1/
16 E-commerce System Architectures LOGICAL LAYERS SERVICES IN LAYER Application layer B2B,B2C,C2C Middleman services Hosting services,value added nets payment services,certificates Secure messaging Encryption,EDI,Firewalls World wide web services HTTP,HTML,XML,OLE Software agents Logical network Intranet,internet,extranet Physical network PSTN,LAN,Bridges,routers Layered architecture V.Rajaraman SAD/M13/LU1/V1/
17 Electronic Data Interchange Computer readable forms for business documents such as invoices, purchase orders, delivery notes needed in B2B e-commerce so that e-documents can be exchanged. Essential to eliminate manual data entry which is error prone Essential to agree on common formats for commonly used forms. V.Rajaraman SAD/M13/LU2/V1/2004 1
18 Electronic Data Interchange (contd.) Electronic data interchange (EDI) standard gives specifications for commonly used standard business forms Currently two standards are available for EDI forms It is possible to adapt these standards for documents which use XML for specification. V.Rajaraman SAD/M13/LU2/V1/2004 2
19 EDI Standards ANSI X.12 standard proposed by American National Standards Institute EDIFACT (Electronic Data Interchange For Administration Commerce and Trade) standardized by United Nations Economic Commission for Europe for international trade EDIFACT used in India for government transactions - customs, central excise etc. V.Rajaraman SAD/M13/LU2/V1/2004 3
20 EDI Transactions in B2B E-commerce Cooperating businesses agree on EDI standard Programs needed to translate data received in EDI format to a form needed by the application program Method of sending/receiving data between businesses to be agreed on - is it PSTN, Extranet or VAN (value added network) service? Important to ensure reliable, guaranteed and secure receipt of electronic documents by intended receiver V.Rajaraman SAD/M13/LU2/V1/2004 4
21 EDI Using Value Added Network Service VAN provides post box for all subscribers Guarantees delivery Open 24 hours, 7 days a week Provides security, acknowledgement, audit trails for transactions, non repudiation by users Some VAN S provide conversion of EDI forms to application format Disadvantage high cost. Used by large businesses - may not be cost-effective for smaller businesses V.Rajaraman SAD/M13/LU2/V1/2004 5
22 EDI Using Internet Cheaper method for use by small business is to use XML for EDI and ,instead of VAN Establish EDI form standard - XML appropriate Document Type Definition(DTD) publicised using organization s web page-cooperating business can use a DTD to interpret XML documents. Use MIME (multipurpose internet mail extension) to attach EDI forms to messages V.Rajaraman SAD/M13/LU2/V1/2004 6
23 EDI Using Internet Can use Simple Mail Transfer Protocol(SMTP) of internet If secure transmission needed use S/MIME (Security enhanced MIME) which uses encryption and digital signature (We will describe encryption and digital signature later in this module) If very long document or many documents are to be sent together File Transfer Protocol (FTP) may be more appropriate. V.Rajaraman SAD/M13/LU2/V1/2004 7
24 EDI Standard Defines several hundred transaction sets corresponding to each type of business document such as invoice, purchase order etc. Defines data segments - corresponding to groups of data elements such as purchase order line Defines data elements - which are individual fields such as price, quantity etc V.Rajaraman SAD/M13/LU2/V1/2004 8
25 Security In E-commerce Transactions between organizations take place in many e-commerce applications using the Internet Internet is widely accessible and insecure as eavesdropping is possible Need to protect company confidential information from snoopers V.Rajaraman SAD/M13/LU3/V1/2004 1
26 Security In E-commerce We need to protect a company's network from unauthorised entry - both hardware and software techniques used When an organization receives a message it has to be sure from whom it came and whether the message is authentic and not changed by an unauthorised person We thus need a digital signature which can be used in a court of law V.Rajaraman SAD/M13/LU3/V1/2004 2
27 Network Security Using Firewall Firewall is a security device deployed at the boundary of an organization' s network to protect it from unauthorised external access It links an organization's intranet to the internet and restricts the type of traffic that it will pass, thus providing security V.Rajaraman SAD/M13/LU3/V1/2004 3
28 Network Security Using Firewall Simple firewalls may be implemented in some routers, called packet filtering firewalls, they pass only some packets based on simple specified criteria such as -Type of access (such as , ftp, telnet as determined by TCP port number) -Direction of traffic -Source or destination IP address -Time of day V.Rajaraman SAD/M13/LU3/V1/2004 4
29 Proxy Application Gateway Primarily for allowing members of an organization on corporate intranet to access internet facility ensuring organizational discipline and security Proxy application program running on a firewall machine is the one which acts on behalf of all members of an organization wanting to use the internet V.Rajaraman SAD/M13/LU3/V1/2004 5
30 Proxy Application Gateway This program monitors all requests - allows access to only designated addresses outside, limits use of certain browsers and disallows use of some protocols with known security holes Proxy application program may also be allowed to run on some user's machine who have authorization for internet use V.Rajaraman SAD/M13/LU3/V1/2004 6
31 Hardened Firewalls With Proxy Application Gateway Any one from inside or outside an organization give their user id, password, service required to the firewall machine which acts as one's proxy (ie.does ones work on his behalf) Proxy firewall is now server to the requestor's desktop PC and also a client to some other requested service acting on requestor's behalf Firewall needs proxy agent for each service requested such as FTP, HTTP, TELNET etc V.Rajaraman SAD/M13/LU3/V1/2004 7
32 Hardened Firewalls With Proxy Application Gateway Now proxy firewall is the initiator of all sessions and thus knows every activity - thus ensuring security Firewall with a proxy function replaces the source address of transaction requestor with its own IP address -this ensures that others on internet see only firewall's IP address - all other IP addresses of organization are hidden V.Rajaraman SAD/M13/LU3/V1/2004 8
33 Data Encryption With Secret Keys Data sent via a public network may be accessed and used by unauthorized persons Thus necessary to scramble it so that even if one accesses it, it cannot be understood Similarly data stored in data bases accessible via internet should be scrambled Method of scrambling known as encryption Method of unscrambling known as decryption V.Rajaraman SAD/M13/LU3/V1/2004 9
34 Plain Text And Ciphertext Plain text is data in its natural form Encryption is taking data in any form(text, Audio,Video etc.) and transforming it to another form which cannot be understood Transformed data is known as cryptogram or cipher text V.Rajaraman SAD/M13/LU3/V1/
35 Example Text Encryption Start plaintext This Is A Message X Block plaintext (5character blocks) Thisi Sames SAGEX 4 1 Transpose characters with permutation ( ) Sthii Esasm Esaxg Substitute character by the one 4 letters away Wxlmm Iwewq Ixebk (eg A E,Z D) Cipher Text This is an example of two transformations - permutation followed by substitution The keys are permutation function and substitution function V.Rajaraman SAD/M13/LU3/V1/
36 Symmetric Encryption. PLAINTEXT (m 1,m 2 m n ) CIPHER TEXT (c 1 c 2, c 3.c n ) Where c i = k( T i (m i ) ) In which T i is permutation of i th character and k is substitution. Decryption by applying same transformations in reverse on cipher text. This method called symmetric key encryption as encryption and decryption performed using same key. Normally the encryption/decryption algorithm is publicised. Only key is secret. V.Rajaraman SAD/M13/LU3/V1/
37 Symmetric Encryption Problem is to ensure secrecy of key when it is sent to partner. If the key is to be sent to many partners need for separate key for each partner.directory of who was sent which key is to be kept and used for each transaction.directory should be secure. If large number of partners are there key distribution very difficult. Advantage of symmetric key is easy and fast to transform plain text to cipher text. V.Rajaraman SAD/M13/LU3/V1/
38 Digital Encryption Standard DES - Proposed by IBM in 1975 Standardised by US Govt in 1977 Reasonably secure It is a combination of permutation and substitution on blocks of 64 bits. A message is broken up into 64 bit blocks and each block is separately encrypted. V.Rajaraman SAD/M13/LU3/V1/
39 Digital Encryption Standard #General idea used in DES M = PLAINTEXT K = KEY E = M + K encryption M= E + K decryption See simplicity of Transformation using Exclusive OR V.Rajaraman SAD/M13/LU3/V1/
40 Digital Encryption Standard Algorithm Before applying DES the text is split up into the 64 bit blocks. DES applied on each 64 bit block. V.Rajaraman SAD/M13/LU3/V1/
41 Encryption method Digital Encryption Standard Algorithm Step 1: Apply an initial permutation on a block.result is B=IP(P) where P is the 64 bit block IP Initial Permutation function and B the result. Step 2: Split B into 32 bit blocks Li = leftmost 32 bits Ri = rightmost 32 bits. Step 3: Pick a 56 bit key. Permute it V.Rajaraman SAD/M13/LU3/V1/
42 Digital Encryption Standard Algorithm Step 4: Left circular shift it by 1 bit giving K1. Step 5: Perform a complex sequence of operations and obtain X 1 = F(R 1,K 1 ) (The complex set of operations include table look up and dropping bits). V.Rajaraman SAD/M13/LU3/V1/
43 Digital Encryption Standard Algorithm Step 6: Find R2 = L1 + X1 Step 7: Set L2 = R1 Repeat steps 2 to 7 16 times to get B16 = L16,R16 Step 8: Apply inverse of initial permutation on B16 The result is the encrypted block V.Rajaraman SAD/M13/LU3/V1/
44 Digital Encryption Standard Algorithm In summary the DES encryption applies the following transformation 16 times.the i th round transformation are L i+1 = R i R i+1 = L i + F(R i,k i ) Each round has a different key K i For Decryption the process of encryption is reversed.the encrypted block is permuted using IP -1. On this transformations are applied starting with K 16 and going to K 1 last.the keys and F are same as those used in encryption process. V.Rajaraman SAD/M13/LU3/V1/
45 Digital Encryption Standard Algorithm The encryption process uses simple binary operations. They can thus be realised in hardware as an integrated circuit chip. DES chips are inexpensive. Key externally fed. The complex encryption algorithm is explained using two block diagrams in the next two transparencies. V.Rajaraman SAD/M13/LU3/V1/
46 64 bit block of plain text DES Encryption Block Diagram 56 bit key IP Initial Permutation R O U N D 1 L1 R1 L2 R2 F + K1 + L 1 F(R 1,K 1 ) P1 Permute Permute Left circular shift R O U N D 2 F + L3 R L16. R16 K2 L + 2 F(R 2,K 2 ) K16 P2.... P Left circular shift Left circular shift IP bit Cipher text Inverse of Initial permutation (F is a complex function involving two table look ups and dropping bits of K 1 to get 3 bits for bitwise Exclusive OR of L 1 and F(K 1,R 1 ) ) V.Rajaraman SAD/M13/LU3/V1/
47 Details of One Round of DES Encryption 64 bit Plain Text 56-bit key Permute Permute 32 bits 32 bits 28 bits 28 bits L 1 R 1 KL KB Left Shifts Round1 L 1 F(R 1,K 1 ) + K 1 48 bits Permute and Contract L 2 R Repeat 15 more times KL KB For next key V.Rajaraman SAD/M13/LU3/V1/
48 DES Chip Input block Key DES CHIP 64 Encrypted Block Observe that from initial key others are derived by circular shifts Decryption chip inputs encrypted block and key and the output is decrypted block V.Rajaraman SAD/M13/LU3/V1/
49 DES - Discussion Cryptanalysis is technique for breaking a code, given samples of encrypted messages. If plain text also known it is somewhat easier. DES code can be broken if key is found. The easiest method of breaking a code is by brute force of trying out all possible keys to decrypt message. V.Rajaraman SAD/M13/LU3/V1/
50 DES - Discussion With increase in speed of computers it has now been shown that DES key can be found in less than 12 hrs with a fast computer (1 Million decryption per microsecond) Thus DES is practically useless now (original DES was invented in mid 70s) New more secure symmetric encryption algorithm is needed An extension of DES called triple DES is shown to be more secure. V.Rajaraman SAD/M13/LU3/V1/
51 Triple DES Triple DES uses three different keys and three executions of DES algorithm. The algorithm is Cipher text = E k3 [D k2 [E k1 [Plain Text]]] where E k [X] = DES Encryption of X using key K and D k [X] = DES Decryption of X using key K Remember that in DES Decryption of encrypted plain text with a different key is almost same as another encryption. This is true as encryption and decryption use the same algorithm V.Rajaraman SAD/M13/LU3/V1/
52 Triple DES To decrypt cipher text we reverse the operations. Plain text = D k1 [E k2 [D k3 [Cipher Text]]] Block Diagrams Of Triple Des Plain text (64 bit block) Cipher text Encryption K1 K2 K3 E D E Decryption K3 K2 K1 E D E Cipher text (64bit block) Plain text V.Rajaraman SAD/M13/LU3/V1/
53 Triple DES(Contd) Using DES thrice is equivalent to having a DES key length of 168 bits. Brute force method to break triple DES with 10 6 decrypts per micro second will take 5.9 X years! Even at fold increase in computer speed will make triple DES secure against brute force attacks to break code V.Rajaraman SAD/M13/LU3/V1/
54 Triple DES(Contd) The only reason D is used as middle step in triple DES is to allow data encrypted using single DES hardware.in this case K3=K2=K1 (Single key used) (See block diagram) Triple DES will be quite popular for a foreseeable future as it is very secure, can be realised by simple hardware. Triple DES has two disadvantages 1. It is slow to implement in software 2. It uses 64 bit blocks. Thus new standards were explored. V.Rajaraman SAD/M13/LU3/V1/
55 Requirements of Symmetric Key Cryptography Algorithm(NIST) Advanced Encryption System(AES) National Institute for Standards Technology put out a call for proposals for new crypto system with following requirements. Must provide a high level of security (i.e. difficult to decrypt in finite time) Must be completely specified and easily understood Security must reside in key Not in algorithm V.Rajaraman SAD/M13/LU3/V1/
56 Requirements of Symmetric Key Cryptography Algorithm(NIST) Advanced Encryption System(AES) Must be available for all users Adaptable for use in diverse applications e.g.credit cards Implementable economically in electronic devices Must be efficient to use as both software and hardware Must allow one to validate it. V.Rajaraman SAD/M13/LU3/V1/
57 Requirements of Symmetric Key Cryptography Algorithm(NIST) Advanced Encryption System(AES) Must be exportable No trap door Must use 128 blocks and key lengths of 128,192 or 256 bits depending on the level of security desired. In October 2000 it announced the selection of an algorithm called Rijin dael(pronounce RAIN DOLL) as new Advance Encryption Standard (AES) Details may be found in V.Rajaraman SAD/M13/LU3/V1/
58 Public Key Encryption In Private Key Encryption transmission of key without compromising not easy It is necessary to assign different private key to each business partner. When this is done a directory of keys should be kept which should be secret.this is difficult. Only secure way is to change the private key every time a message is sent V.Rajaraman SAD/M13/LU3/V1/
59 Public Key Encryption Public Key Encryption eliminates the key distribution problem There is a pair of keys for each organization - A Private Key and its Public Key If A wants to send message to B, A encrypts the message with B's Public Key When message is received by B he decrypts it with his Private Key V.Rajaraman SAD/M13/LU3/V1/
60 Public Key Encryption A Plain text ENCRYPT B s Public Key Cipher text DECRYPT B s Private Key Plain text B SENDER A RECEIVER B V.Rajaraman SAD/M13/LU3/V1/
61 RSA Code Details. R Wants To Find His Public And Private Keys 1. Pick large primes p and q. Let n =p * q 2 Find ø = (p-l)*(q-l) 3 Find e relatively prime to Ø, i.e. gcd(ø,e)=1; 1<e<ø. {e,n} is R's Public Key V.Rajaraman SAD/M13/LU3/V1/
62 RSA Code Details. R Wants To Find His Public And Private Keys 4 Find a number d which satisfies relation (d * e) mod (ø) =1 {d,n} is R s Private key 5. Let plain text = t. Encrypt t using R s public key. Encryption = t e (mod n) = c (cipher text) 6. Decryption c d (mod n) =t (Both n and e should be known to encrypt.similarly both n and d should be known to decrypt) V.Rajaraman SAD/M13/LU3/V1/
63 Example Of RSA Use This example is a toy example to illustrate the method.in practice the primes p and q will be very large each at least 300 digits long to ensure security. RSA Algorithm 1. Pick as prime numbers p=3,q=11 n = p * q=33 Note : The message to be encrypted should be smaller than 33.If we do letter by letter encryption of English alphabets (A to Z 1 to 26) this is OK 2. Ø = (p-1) x (q-1) = 2 x 10 = 20 V.Rajaraman SAD/M13/LU3/V1/
64 Example Of RSA Use RSA Algorithm (Contd) 3. Pick a number relatively prime to 20. We pick 7. The Public key of R = {7,33} 4. To pick private key of R find d from relation (d x e)mod(ø) = 1 (d x 7) mod (20) =1 This gives d =3 Therefore, the private key of R = {3,33} V.Rajaraman SAD/M13/LU3/V1/
65 Applying RSA Algorithm 1. Let the message be CODE If we use code C=3, O=14,D=4,E=5 The message is 3,14,4,5 2. We will encrypt one letter at a time Thus cipher of plain text 3 is 3 e mod (n) =3 7 mod(33) 3 7 mod (33) =2187 mod (33)=9 (14) 7 mod (33) = mod(33)=20 (4) 7 mod (33) =16384 mod (33) =16 (5) 7 mod (33) =78125 mod(33) = 14 V.Rajaraman SAD/M13/LU3/V1/
66 Applying RSA Algorithm 3. Thus cipher text = 9,20,16,14 4. Decryption : c d mod (n) d=3,n= mod (33) = 729 mod(33) = mod(33) = 8000 mod(33)= mod(33) = 4096 mod(33) = mod(33) = 2744 mod(33) =5 We see that we get the original text 3,14,4,5 V.Rajaraman SAD/M13/LU3/V1/
67 Discussion on RSA The security RSA encryption is dependent on the fact that factorising a large prime number to its factors is very difficult. RSA algorithm is symmetric.in other words if a plain text is encoded by the private key of S, the sender, it can be decrypted using the public key of R, the receiver (We will find later that this symmetry property is used in creating digital signature) Example using S s keys S s Private key = {3,33} S s Public key = {7,33} V.Rajaraman SAD/M13/LU3/V1/
68 Discussion on RSA If we encrypt a plain text using S s private key and send it to R,R must be able to decrypt it with S s public key. Assume Plain text is encrypted with S s private key and get cipher text = (14) 3 mod (33)=5 Decrypting with S s Public key we get (5) 7 mod (33) =78125 mod(33) ={(2367 x 33) + 14} mod (33) =14 V.Rajaraman SAD/M13/LU3/V1/
69 Discussion RSA Vs DES RSA Public key has two keys a private secret key and a public open key. RSA implemented as a program (software) It is computationally complex to encode plain text and decode cipher text using RSA DES Same key for encryption and decryption It is a single key system - Also called symmetric key system V.Rajaraman SAD/M13/LU3/V1/
70 Discussion RSA Vs DES DES computationally simple-implemented in hardware - thus very fast Each communication between two businesses can use a different key provided key is securely exchanged If key can be sent separately encrypted using RSA, then a recipient can use this to decrypt DES encrypted message. We look next at combining DES and RSA. V.Rajaraman SAD/M13/LU3/V1/
71 Combining RSA And DES KEY ENCRYPT DECRYPT RECOVERED KEY SENDER Public key Of the receiver Private key Of the receiver RECEIVER PLAIN TEXT DES DES PLAIN TEXT CIPHER TEXT V.Rajaraman SAD/M13/LU3/V1/
72 Combining RSA And DES Advantages: Key is sent along with the plain text. Encrypted using RSA Key small-fast to encrypt/decrypt Each transaction using DES can have a different keyhigher security and also fast.key directory not needed. V.Rajaraman SAD/M13/LU3/V1/
73 Digital Signature Requirements Needed to ensure that a message received from say A is indeed from him Signature should be tied to the message sent by A Sending Step Sender sends key using RSA system Sender sends plain text M using DES Receiver decrypts cipher text using DES and the key received from sender call it MR V.Rajaraman SAD/M13/LU3/V1/
74 Digital Signature Sender hashes plain text "M' using a hashing function - let the hashed text be "H" Hashed text "H" encrypted by sender using his Private key DS is his signature as H encrypted with his private key DS decrypted by receiver using sender's Public key and obtains "H" V.Rajaraman SAD/M13/LU3/V1/
75 Digital Signature (Contd) Authentication step Receiver hashes MR" using hash function and gets HR" Receiver compares H" with HR" If they match then it is a signed authenticated plain text TM is signed as sender has encrypted the hashed text using his private key which he only knows.if H=(MR)(HASHED) = HR where MR is the received message then MR must have been sent by sender. He cannot repudiate. V.Rajaraman SAD/M13/LU3/V1/
76 Signing A Message Using Digital Signature R s Private key R s Public key K ENCRYPT KE DECRYPT Forgery K K SENDER M ENCRYPT ME DECRYPT MR RECEIVER no Hash H ENCRYPT DS DECRYPT H Equal HR Hash S s Private key S s Public key yes Signature OK Accept M V.Rajaraman SAD/M13/LU3/V1/
77 Certificate Authority For Digital Signature As the hashed message in Digital Signature system is decrypted using senders public key,this key must be certified as belonging to sender by an independent authority Certification needed to ensure authenticity of public keys of organizations as public key is used to verify signature V.Rajaraman SAD/M13/LU3/V1/
78 Certificate Authority For Digital Signature Certification authority keeps data base of public keys of organizations participating in e-commerce after verifying their credentials. Potential business partners can authenticate public keys by sending request to certifying authority who certifies after receiving a fee for his services V.Rajaraman SAD/M13/LU3/V1/
79 Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce they are Credit card payments Electronic cheque payments Micro or small payments for internet based services such as music download. Electronic-cash payments Each of these requires a different system of payment. We will examine first credit card payments. V.Rajaraman SAD/M13/LU4/V1/2004 1
80 Review Of Manual Credit Card Payment Four parties are invoked in credit card payments. They are: Customer having a credit card Merchant accepting credit cards (such as VISA, MASTER CARD etc) Bank which issues credit cards to customers and collects payments from customers V.Rajaraman SAD/M13/LU4/V1/2004 2
81 Review Of Manual Credit Card Payment Acquirer which is financial institution that establishes an account with a merchant,validates credit card information sent electronically by merchant and authorises sale based on customer s credit status. Acquirer accepts credit cards of several card companies and guarantees payment to merchants. Acquirer gets reimbursed by bank issuing credit card. V.Rajaraman SAD/M13/LU4/V1/2004 3
82 Sequence Of Transactions In Manual Credit Card Payment Step 1: Customer presents credit card after purchase. Merchant swipes it on his special phone and enters amount Step 2: Data from merchant s terminal goes to acquirer via a private telephone line Step 3: Acquirer checks with the issuing bank validity of card and credit-available V.Rajaraman SAD/M13/LU4/V1/2004 4
83 Sequence Of Transactions In Manual Credit Card Payment Step 4: Acquirer authorizes sale if all OK and sends approval slip which is printed at merchant s terminal. Step 5: Merchant takes customer s signature on the slipverifies it with the signature on card and delivers the goods. Step 6: The acquirer pays the money to merchant and collects it from the appropriate issuing bank. The bank sends monthly statement to customer and collects outstanding amount. V.Rajaraman SAD/M13/LU4/V1/2004 5
84 Block Diagram Of Steps In Credit Card Transaction Customer Step1 Step5 Merchant Step 4 Step2 Step6 Step6 Acquirer Step3 Step3 Issuing bank Steps correspond to that given in previous 2 PPT s V.Rajaraman SAD/M13/LU4/V1/2004 6
85 Credit Card In E-commerce Main Problems Main Problem is: if a merchant had only a web presence, a Customer needs to be reassured that the merchant is genuine. 1. Customers Signature cannot be physically verified.customer needs electronic signature. 2. Secrecy of credit card number has to be ensured. 3. Dispute settlement mechanism must be worked out. V.Rajaraman SAD/M13/LU4/V1/2004 7
86 Secure Electronic Transaction Protocol Standardised credit card payments in e-commerce by major card companies such as Visa, MasterCard etc. To use SET protocol it is assumed that 1. Each party involved in e-commerce transaction has a public and private key.a public key encryption is used. 2. All parties have their public keys certified. 3. A standard hashing algorithm is used to create message digest for signature verification. V.Rajaraman SAD/M13/LU4/V1/2004 8
87 Main Features Secure Electronic Transaction Protocol Customers credit card number is not revealed to a merchant. It is revealed only to the acquirer who authorises payment. Purchase invoice details are not revealed to the acquirer.only the credit card number and total amount are revealed to him Purchase invoice + credit card number is digitally signed by the customer.in case of a dispute an arbitrator can use this to settle the dispute. (Computer protocol runs to 262 pages and may be found in V.Rajaraman SAD/M13/LU4/V1/2004 9
88 Dual Signature Scheme Secure Electronic Transaction Protocol Dual signature scheme is an innovation in SET protocol Steps followed in the protocol are: 1. Customer purchase information has 3 parts (i) Purchase Order (PO) (ii) Credit Card Number(CCN) (iii) Amount to be paid 2. Merchant should know (PO + Amount)=POA 3. Acquirer should know (CCN+Amount)=CCA V.Rajaraman SAD/M13/LU4/V1/
89 Secure Electronic Transaction Protocol 4. Hash POA using standard Hash algorithm such as RSA s MD5.Call it POD. 5. Hash CCA using MD5. Call it CCD 6. Concatenate POD and CCD.Call it (POD CCD) 7. Hash (POD CCD) giving PPD V.Rajaraman SAD/M13/LU4/V1/
90 Secure Electronic Transaction Protocol 8. PPD is encrypted using Private key of customer.this is customer s digitally signed purchase order DS = Encrypt (PPD) with C PRK C PRK is Private key of customer. This is sent to merchant by customer.ds is called Dual Signature as a private key is used to sign two separate digests concatenated together. 9. POA separately encrypted by customer using merchant s public key and sent to merchant 10. Merchant decrypts it using his private key.he thus gets Purchase order +Amount V.Rajaraman SAD/M13/LU4/V1/
91 Secure Electronic Transaction Protocol 11. CCD and DS also sent to merchant. From CCD merchant cannot find CCN. 12. Merchant can decrypt DS using customer s public key and get PPD. Customer must have a certified public key for verification. 13. Merchant can compute H(POD CCD) If H(POD CCD)=PPD,then customer s signature is OK. 14. Merchant forwards to acquirer CCA,POD,DS each separately encrypted using acquirer s public key. V.Rajaraman SAD/M13/LU4/V1/
92 Secure Electronic Transaction Protocol 15. Acquirer s forwards to bank. 16.Bank finds CCN and Amount.Verifies balance amount.bank also verifies customer s digital signature using CCD,POD and DS.If all OK acquirer is informed. 17. Acquirer OK s transaction to merchant 18. Merchant supplies item.gets payment from acquirer.bank collects from customer. V.Rajaraman SAD/M13/LU4/V1/
93 C U S T O M E R P.O+Amount C.C No + Amount POA CCA Dual Signature System To Merchant To Bank Hash Hash POD PPD Concatenate Hash Encrypt DS CCD POD CCD Private key Of customer C PRK Dual signature POA: (Purchase Order + Amount) POD: Purchase Order Digest CCA: (Credit card + Amount) CCD: (Credit card + Amount)Digest : Concatenation operator which strings together POD and CCD PPD : Purchase Payment Digest C PRK : Private Key of Customer V.Rajaraman SAD/M13/LU4/V1/
94 Secure Electronic Transaction Protocol - Step1 : [(POA) EM + (CCA) EB + CCD +DS] to Merchant - Step2 : Merchant sends [(CCA) EB + DS + POD] to Acquirer - Step3 : Acquirer sends (CCA) EB + DS +POD to Bank. - Bank finds (CC No. + amount) sees if OK Computes H(CCD POD) Decrypts DS with customer s public key If (DS) CPK = H(CCD POD) Signature verified V.Rajaraman SAD/M13/LU4/V1/
95 Secure Electronic Transaction Protocol - Step4 : OK to acquirer if credit and signature OK - Step5 : Ok to Merchant - Merchant finds H(H(POA) CCD)=PPD - Decrypts DS with public key of customer.if match signature verified. - Step6 : Sends delivery details - Step7 : Bill to customer V.Rajaraman SAD/M13/LU4/V1/
96 Secure Electronic Transaction Protocol Merchant Step 1 Step5 Step2 Step6 Customer Acquirer Step3 Step4 Bank Step 7 V.Rajaraman SAD/M13/LU4/V1/
97 Secure Electronic Transaction Protocol Step1: Customer fills Purchase order, amount and credit card number in his PC. A software in PC strips it into two parts Purchase Order + Amount (POA), Credit Card No. + Amount(CCA) POA is encrypted using merchants. Public key and CCA with bank s public key.these are sent with customer s public key certificates, CCD and DS. Merchant verifies DS. Step2: Merchant forwards to acquirer DS and CCD (These are encrypted using acquirer s public key) Step3: Acquirer forwards to bank. Bank decrypts CCA with its private key.checks validity of credit card and balance. If OK informs acquirer V.Rajaraman SAD/M13/LU4/V1/
98 Secure Electronic Transaction Protocol Step4: Acquirer OK s transaction to merchant and credits merchant's account. Step5: Merchant accepts customer s order and proceeds to dispatch items. Step6: At the end of the month bank sends bill to customer. (All these done by clicks of mouse button) V.Rajaraman SAD/M13/LU4/V1/
99 Electronic Cheque Payment Most cheque based transactions will be between businesses -thus special hardware attached to PC s for signing payments Signature encrypted by hardware All public keys of business partners authenticated by certifying agencies V.Rajaraman SAD/M13/LU4/V1/
100 Steps in transaction Electronic Cheque Payment 1 Purchaser sends purchase order and payment advice signed with his private key to vendor.he also sends his public key certificate encrypted with vendor's public key to vendor 2 Vendor decrypts with his private key, checks certificate and cheque, attaches deposit slip, encrypts with bank's public key and sends it to bank. he also sends his public key certificate 3 Bank checks signatures, credits and clears cheque 4 Credit advice goes to vendor,& consolidated debit advice sent to purchaser periodically V.Rajaraman SAD/M13/LU4/V1/
101 Purchaser Clearing Cheque Payment Electronically Vendor Signature Card Order form Signature Card Debit Advice Purchaser s Bank Clearing House Order Cheque Signature Certificate Secure Envelope Vendor s Bank Deposit Cheque Credit Advice Deposit slip Cheque Signature Certificates Endorsement Certificate V.Rajaraman SAD/M13/LU4/V1/
102 Payments Of Small Amounts On Internet Netbill's Proprietary System Customer charged only when information delivered Vendor guaranteed payment when information delivered Netbill is the intermediary V.Rajaraman SAD/M13/LU4/V1/
103 Major Steps Payments Of Small Amounts On Internet When customer accepts quote for information, vendor sends encrypted information without key to customer Payment order sent to vendor with checksum of information obtained. It is signed by customer Vendor sends to NET BILL copy of purchase order and the key for decryption NET BILL checks credit of customer. If ok it sends key to customer. Credits vendor account and debits customer account. Key sent to customer to decrypt information Customer decrypts information V.Rajaraman SAD/M13/LU4/V1/
104 Paying for Small Internet Transactions Customer 1. Request for information. 2. Quote 3. Order 4. Encrypted Text 5. Customer Bill+key 6. Ok to vendor 7. Key to customer Customer s Bank Credit in Account Net Bill s Server Net Bill s Server 7 Batch Payment Vendor Vendor s Bank V.Rajaraman SAD/M13/LU4/V1/
105 Electronic Cash Cash for small payments Cash preserves anonymity Cash should not be traceable We will discuss only traceable cash payments V.Rajaraman SAD/M13/LU4/V1/
106 Electronic Cash (contd.) STEPS 1.Customer withdraws coins in various denominations signed by bank STRUCTURE------> serial no, denomination, signature of bank Bank stores issued coins copy 2.Customer pays vendor using signed coins 3.Bank checks whether it is current or spent 4.If current it authorises dispatch of goods and credits vendor account with electronic coins V.Rajaraman SAD/M13/LU4/V1/
107 Electronic Cash(contd) Cheaper than credit card transaction DES normally used for these transaction as it is cheap and amounts involved is small V.Rajaraman SAD/M13/LU4/V1/
108 Electronic Cash Payment Amt ID Signature ABC ABC Customer Yes Vendor 3 OK? Bank 1. Withdraw 2. Pay 3. Check if OK 4. Replying OK 5. Accept order Spent Coins Amt ID.... V.Rajaraman SAD/M13/LU4/V1/
109 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions 13.1 By Electronic Commerce we mean: a. Commerce of electronic goods b. Commerce which depends on electronics c. Commerce which is based on the use of internet d. Commerce which is based on transactions using computers connected by telecommunication network 13.2 For carrying out B2B e-commerce the following infrastructure is essential: (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v)secure electronic communication link connecting businesses a. i, ii, iii b. ii, iii, iv c. ii, iii, iv, v d. i, ii, iii, iv, v 13.3 For carrying out B2C e-commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v) Secure electronic communication link connecting businesses a. i, iv b. i, iii, iv c. ii, iii d. i, ii, iii, iv 13.4 For carrying out C2C e-commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v)secure electronic communication link connecting businesses a. i and ii V. Rajaraman/IISc. Bangalore M13/V1/July 04/1 Indian Institute of Science Bangalore
110 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions b. ii and iv c. i and iii d. i and iv 13.5 Advantages of B2C commerce are (i) Business gets a wide reach to customers (ii) Payment for services easy (iii)shop can be open 24 hours a day seven days a week (iv)privacy of transaction always maintained a. i and ii b. ii and iii c. i and iii d. iii and iv 13.6 B2C commerce a. includes services such as legal advice b. means only shopping for physical goods c. means only customers should approach customers to sell d. means only customers should approach business to buy 13.7 Advantages of B2C commerce to customers are (i)wide variety of goods can be accessed and comparative prices can be found (ii) shopping can be done at any time (iii)privacy of transactions can be guaranteed (iv)security of transactions can be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv 13.8 Disadvantages of e-commerce in India are (i) internet access is not universally available (ii) Credit card payment security is not yet guaranteed (iii) Transactions are de-personalized and human contact is missing (iv) Cyberlaws are not in place a. i and ii V. Rajaraman/IISc. Bangalore M13/V1/July 04/2 Indian Institute of Science Bangalore
111 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions b. ii and iii c. i, ii, iii d. i, ii, iii, iv 13.9 Electronic Data Interchange is necessary in a. B2C e-commerce b. C2C e-commerce c. B2B e-commerce d. Commerce using internet EDI requires a. representation of common business documents in computer readable forms b. data entry operators by receivers c. special value added networks d. special hardware at co-operating Business premises EDI standards are a. not universally available b. essential for B2B commerce c. not required for B2B commerce d. still being evolved EDIFACT is a standard a. for representing business forms used in e-commerce b. for transaction for e-commerce c. for ftp in e-commerce d. protocol used in e-commerce EDIFACT standard was developed by a. American National Standard Institute b. International Standard Institute c. European Common Market d. United Nations Economic Commission for Europe ANSI X.12 is a standard developed by a. American National Standard Institute b. International Standard Institute c. European Common Market d. United Nations Economic Commission for Europe V. Rajaraman/IISc. Bangalore M13/V1/July 04/3 Indian Institute of Science Bangalore
112 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions In B2B e-commerce (i) Co-operating Business should give an EDI standard to be used (ii) Programs must be developed to translate EDI forms to a form accepted by application program (iii) Method of transmitting/receiving data should be mutually agreed (iv) It is essential to use internet a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet EDI over internet uses a. MIME to attach EDI forms to messages b. FTP to send business forms c. HTTP to send business forms d. SGML to send business forms For secure EDI transmission on internet a. MIME is used b. S/MIME is used c. PGP is used d. TCP/IP is used EDI standard a. is not easily available b. defines several hundred transaction sets for various business forms c. is not popular d. defines only a transmission protocol By security in e-commerce we mean (i) Protecting an organization s data resource from unauthorized access (ii) Preventing disasters from happening V. Rajaraman/IISc. Bangalore M13/V1/July 04/4 Indian Institute of Science Bangalore
113 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions (iii) Authenticating messages received by an organization (iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations a. i, ii b. ii, iii c. iii, iv d. i, iii, iv A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user s application programs Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-commerce Filtering of packets by firewall based on a router has facilities to a. i, iii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services c. to allow corporate users to use all internet services V. Rajaraman/IISc. Bangalore M13/V1/July 04/5 Indian Institute of Science Bangalore
114 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions d. to prevent corporate users from using internet services Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii) monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with security problems (iv) disallows all internet users from accessing intranet a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii) Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients and monitors them (iv) prevents outsiders from accessing IP addresses within the intranet a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv A hardened firewall host on an Intranet is a. a software which runs in any of the computers in the intranet b. a software which runs on a special reserved computer on the intranet c. a stripped down computer connected to the intranet d. a mainframe connected to the intranet to ensure security By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii) efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies databases from retrieval V. Rajaraman/IISc. Bangalore M13/V1/July 04/6 Indian Institute of Science Bangalore
115 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions (iv) to preserve secrecy of information stored in databases if an unauthorized person retrieves it a. i and ii b. ii and iii c. iii and iv d. i and iv Encryption can be done a. only on textual data b. only on ASCII coded data c. on any bit string d. only on mnemonic data By applying permutation (31254) and substitution by 5 characters away from current character (A F, B G etc..) the following string ABRACADABRA becomes a. FGWCAAADRBF b. RABCAAADRBF c. WFGHFFFIWGF d. None of the above The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character +3 (A D, etc). The plain text after decryption is: Cipher text : PDLJDLXHVQC a. MAIGAIUESNZ b. IAMAGENIUSZ c. LDPDJHPLXVZ d. IAMAGENIUSC By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption The acronym DES stands for a. Digital Evaluation System b. Digital Encryption Standard V. Rajaraman/IISc. Bangalore M13/V1/July 04/7 Indian Institute of Science Bangalore
116 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions c. Digital Encryption System d. Double Encryption Standard DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys DES (i) is a symmetric key encryption method (ii) guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii c. i and iii d. iii and iv DES using 56 bit keys a. Cannot be broken in reasonable time using presently available computers b. Can be broken only if the algorithm is known using even slow computers. c. Can be broken with presently available high performance computers. d. It is impossible to break ever Triple DES uses a. 168 bit keys on 64-bit blocks of plain text b. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds. c. Works with 144 bit blocks of plain text and applies DES algorithm once. d. Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice ripple DES a. Cannot be broken in reasonable time using presently available computers. b. Can be broken only if the algorithm is known using even slow computer. c. Can be broken with presently available high performance computers. d. It is impossible to break ever. V. Rajaraman/IISc. Bangalore M13/V1/July 04/8 Indian Institute of Science Bangalore
117 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys Public key encryption method is a system a. which uses a set of public keys one for each participant in e-commerce b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him. c. which uses the RSA coding system. d. which is a standard for use in e-commerce Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B s private key c. A encrypts message using B s public key d. A encrypts message using his public key In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A s public key b. Even if B knows who sent the message it cannot be decrypted c. It cannot be decrypted at all as no one knows A s private key d. A should send his public key with the message Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission V. Rajaraman/IISc. Bangalore M13/V1/July 04/9 Indian Institute of Science Bangalore
118 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system c. using an algorithm to implement DES instead of using hardware d. designing DES with high security and not publicizing algorithm used by it DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii) to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv) as it is required in e-commerce a. i and ii b. ii and iii c. iii and iv d. i and iv A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender A digital signature is required (i) to tie an electronic message to the sender s identity (ii) for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all transactions a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii) must be hardware implementable (iii) two different messages should not give the same hashed message (iv) is not essential for implementing digital signature V. Rajaraman/IISc. Bangalore M13/V1/July 04/10 Indian Institute of Science Bangalore
119 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions a. i and ii b. ii and iii c. i and iii d. iii and iv Hashed message is signed by a sender using a. his public key b. his private key c. receiver s public key d. receiver s private key While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption and hashed message using DES c. sends both message and hashed message using DES d. sends both message and hashed message using public key encryption The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES Certification of Digital signature by an independent authority is needed because a. it is safe b. it gives confidence to a business c. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership d. private key claimed by a sender may not be actually his The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services V. Rajaraman/IISc. Bangalore M13/V1/July 04/11 Indian Institute of Science Bangalore
120 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions In SET protocol a customer encrypts credit card number using a. his private key b. bank s public key c. bank s private key d. merchant s public key In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank s public key d. using digital Signature system One of the problems with using SET protocol is a. the merchant s risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to keep a database of the public keys of all customers d. the bank has to keep a database of digital signatures of all customers The bank has to have the public keys of all customers in SET protocol as it has to a. check the digital signature of customers b. communicate with merchants c. communicate with merchants credit card company d. certify their keys In electronic cheque payments developed, it is assumed that most of the transactions will be a. customers to customers b. customers to business c. business to business d. banks to banks In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys V. Rajaraman/IISc. Bangalore M13/V1/July 04/12 Indian Institute of Science Bangalore
121 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions In the NetBill s protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii) the vendor is guaranteed payment when information is delivered (iii) the customer must have a certified credit card (iv) the customer must have a valid public key a. i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv In NetBill s protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he receives payment (iii) Checksum of encrypted information received by customer is attached to his payment order (iv) Vendor does not encrypt information purchased by customer a. i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions In Electronic cash payment (i) a customer withdraws coins in various denominations signed by the bank (ii) the bank has a database of issued coins (iii) the bank has a database of spent coins (iv) the bank cannot trace a customer a. i, ii b. i, ii, iii V. Rajaraman/IISc. Bangalore M13/V1/July 04/13 Indian Institute of Science Bangalore
122 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions c. i, ii, iii, iv d. ii, iii, iv V. Rajaraman/IISc. Bangalore M13/V1/July 04/14 Indian Institute of Science Bangalore
123 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions Key to Objective Questions 13.1 d 13.2 c 13.3 a 13.4 c 13.5 c 13.6 a 13.7 a 13.8 c 13.9 c a b a d 13.14a b c a b b d c a c b b b c b c d c c b a b a c c b a b b b c a 13.46b a c b c b a c c a b d c a c c d b b b V. Rajaraman/IISc. Bangalore M13/V1/July 04/15 Indian Institute of Science Bangalore
124 System Analysis and Design Prof. V.Rajaraman SUMMARY OF MODULE The sharing of business information, maintaining business relationships and conducting business transactions by using telecommunication networks is usually defined as Electronic Commerce. 2. E-commerce is normally categorised as Business to Business (B2B), Business to Customer (B2C) and Customer to Customer (C2C) 3. The major advantages of E-Commerce are anytime, anywhere transaction, reduction in cost of transactions, reduction in time to market products, faster interbusiness transaction and faster transfer of funds. 4. The major disadvantages of E-commerce are poor security of transactions unless special precautions are taken, loss of privacy, lack of legislation to settle disputes and menace of hackers. 5. E-Commerce architecture consists of the following layers: The lowest layer in the physical network which may be a LAN connected by unshielded twisted pair wires, Public Switched Telephone Networks, WAN using optical fibre etc. The next layer is the logical network such as internet, intranet and extranet (all of which use TCP/IP protocol). Resting on this is the world wide web and services on it such as web pages, browsers, and search engines. Above this is the security layer which deals with encryption, digital signatures etc. Resting on this are Electronic Data Interchange and Electronic payment services. All these layers are necessary to write application systems. 6. At the physical level most organizations use local area networks using unshielded twisted pair cables and Ethernet protocol. The cheapest method of interconnecting organizations is to use Public Switched Telephone Network. Indian Institute of Science Bangalore
125 System Analysis and Design Prof. V.Rajaraman 7. Internet is the most important logical network which enables E-Commerce. The internet protocol called TCP/IP is universally used. Organizational private networks which use TCP/IP protocol are called intranets. Organizational intranets are often connected by a private secure communication link. Such a network is called an Extranet. 8. World wide web is a global multimedia information service available on the internet. It supports web pages prepared using hyper text markup language 9. Web pages are located using a scheme known as Universal Resource Locator (URL) which is its address. Web browsers are used to locate web pages. 10. Web pages are created using a language known as hypertext markup language (HTML). Words can be picked and tagged to connect the page with other related pages. 11. It is imperative for every organization to have a website in today's internet world which publicise their functions. The page must be attractively designed and updated regularly. 12. Electronic Data Interchange (EDI) is essential in E-Commerce. EDI replaces printed forms by a standard electronic format which can be interpreted correctly by computer programs of cooperating businesses. 13. EDI standards have been published by American Network National Standards Institute and by United Nations Economic Commission for Europe. The United Nations standard is called EDIFACT and may become the standard for international commerce. 14. Value Added Network Services provide electronic post boxes to their clients to exchange EDI documents. They guarantee security and delivery of documents. Indian Institute of Science Bangalore
126 System Analysis and Design Prof. V.Rajaraman They also provide services to convert an organization's forms to standard format such as EDIFACT. 15. If internet is used for exchanging business documents Secure Multipurpose Internet Mail Extension (S/MIME) standard is recommended. 16. An organizaion's intranet is connected to the internet via a proxy server or a hardware unit. This is called a firewall. Firewall protects an organization's computers from unauthorised intruders. 17. Messages exchanged between organizations using the internet can be easily tapped by eaves droppers. It is thus necessary to scramble them to prevent eavesdroppers from understanding the messages. It is done by encrypting messages. 18. Message (plain text) is encrypted by transposing characters of the plain text by a specified permutation and substituting characters by other characters. The encrypted text is called ciphertext. 19. This general idea is used in a standard encryption method called Digital Encryption Standard (DES). DES encrypts 64 bit blocks with a 56 bit key. 20. DES has been implemented as a hardware device. DES hardware may be attached to a computer's output port so that messages sent from the computer are encrypted. The receiver can decrypt it if he is given the key. 21. A system in which the encrypting and decrypting keys are same is called a symmetric key system. 22. The main problem with a symmetric key system is the need to distribute the key securely to all participating businesses. Symmetric key encryption/decryption is fast. 23. Two key based system called RSA system does not require distributing secret keys. Indian Institute of Science Bangalore
127 System Analysis and Design Prof. V.Rajaraman It has two keys for each participant in the communication, a private key and a public key. If A wants to send a message to B, A encrypts the message using B's public key. B decrypts it using his private key. Thus there is no key distribution problem. It is, however, slower than the symmetric key system. 24. RSA system is based on the fact that it is difficult to factor two prime components from their product, particularly, when the prime numbers are large. 25. In RSA system, a message encrypted with a private key, can be decrypted with the corresponding public key. This is used in digital signature. 26. In order to sign a message the sender hashes the message with a known algorithm to get a message digest MD. MD is encrypted with the sender's private key and sent to the intended receiver. Let us call it MD e. The message itself is encrypted with a symmetric key and sent. The recipient decrypts the message and computes the message digest MD using the known hashing algorithm. He then decrypts the encrypted message digest MD e using the sender's public key. If (MD e ) decrypted = MD then the message is not a forgery as only the sender knows his private key. This signature ties the signature to the message and cannot be repudiated by the sender. 27. To ensure that public keys of organizations do belong to them there are certification authorities which check the legitimacy of organizations and issue public key certificates. 28. In E-Commerce payments are made as credit card payments, cheque payments or cash payments. Besides this a system to make small payments for information goods (such as files, books etc.) downloaded from the internet is needed. 29. Credit card payments are made using a protocol called Secure Electronic Indian Institute of Science Bangalore
128 System Analysis and Design Prof. V.Rajaraman Transaction (SET protocol). It uses RSA system and digital signatures. 30. Cheque payments are made between organizations using digitally signed cheques and public key certificates issued by a certifying authority. 31. Payment for small transactions is made using digital coins issued by banks to customer after debiting the customer's account. A digital coin consists of amount, identification number and banks signature. These coins are given in exchange for goods. The bank reimburses the vendor after checking its signature and ensuring that the coin has not been spent earlier. 32. A system called NetBill has been proposed for small payment for information services on the internet. It ensures that a key is given to a customer for decrypting information only after payment is received by the vendor. It also guarantees delivery of contracted information by the vendor. Indian Institute of Science Bangalore
129 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems Worked Examples 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers. Assume that the distributor has stocks of books of a large number of publishers and book sellers order books as and when their stock is low. Distributors give 1 month s time to booksellers for payment Warehouse of Bookseller Stock goes below level(1) Book Received(6) Reminder if bill not paid within one month (14) Acknowledge order and send bill(5) Bookseller Enquire Availability (2) Distributor s website Distributor s warehouse Book supplied to bookseller (6) Receipt to seller(13) Display various books(3) Places order (4) Send cheque(7) Distributor s bank Cheque sent after verification of seller s public key certificates (8) Ok s Cheque (11) Send cheque for clearance (9) Credit to distributor s bank A/C (13) Ok s clearance (10) Clearing house Book seller s bank Debit advice to book seller s bank (12) Information flow (Normally electronically) Physical item flows 13.2 Explain B2C e-commerce of a customer reserving airline tickets from his home or place of work. B2C e-commerce involves the business between an individual and an organization. For the case given in question, the customer has to visit the site of the travel agency or a broker and get the status of the availability of tickets. If ticket is (8) Acknowledge order and sends ticket V. Rajaraman/IISc. Bangalore M13/V1/July 04/1 Indian Institute of Science Bangalore
130 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems available he/she will book the ticket and input the credit card details. He/She will be given the details of delivery of ticket. The block diagram below depicts the total process (1) Request Service (8) Bill to Customer Customer (2) Display information on various flights (3) Places order with credit card details Website of travel agency (4) Credit card details (5) Ok s Credit card Travel agency s bank A/C Credit Card companies computer (8) Credit to travel agency s A/C Customer s Bank (7) Debit advice giving credit card no 13.3 Explain C2C e-commerce with an appropriate example Here the selling and purchasing is carried out between two individuals. One is a seller and the other is a buyer. The items are usually used items, collector s items such as stamps/coins or antiques. The seller posts the description of the item and the expected price of the item on a web site maintained by a company which acts as a middle man or broker. For example: Consider a company Y which acts as a broker. Suppose an indivi-dual A has to sell some items, so it will post the description of the items in Y s site. A person B is interested to purchase some items, then he/she will visit Y s site. Here we can have three cases. Case I: The broker Y can just acts as an advertising agency and make the two persons meet each other and carry out further transaction. For this it gets some commission from both the parties. This is described in the block diagram below: V. Rajaraman/IISc. Bangalore M13/V1/July 04/2 Indian Institute of Science Bangalore
131 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems Negotiations are made and deal is finalized (5) Send the mail id of A(4) Places order (6) Request for items (3) Website of Y Post Description of items (1) B Display items (2) A Case II: The broker Y can act as an advertising agency, make the two persons negotiate the price. Then Y takes all responsibilities until the item is delivered. For this it gets some commission from both the parties. This is described in the block diagram below: Negotiations are made and deal is finalized (5) Places order with credit card details(7) Pays the amount received after taking commission(13) Send the mail id of A(4) Request for items (3) Website of Y Communication regarding the price settled (6) Post Description of items (1) B Display items (2) A Acknowledge order (10) Send credit card details (8) Ok s credift card(9) Credit Card companies computer V. Rajaraman/IISc. Bangalore M13/V1/July 04/3 Indian Institute of Science Bangalore
132 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems Bill sent to B(12) Y s Bank A/C Credit to Y s A/C (11) Shiping Advice (11) B s bank Debit advice giving Credit card no (9) Items delivered to B (11) Y s warehouse Information flow (Normally electronically) Physical items flow Case III: The broker Y can act as an advertising agency and displays items posted by the seller with prices. Both the buyer and seller will not have knowledge of each other. Y takes all responsibilities until the item is delivered. For this he gets some commission from both the parties. This is described in the block diagram below: Places order with credit card details(4) Pays the amount received after taking commission(12) Request for items (3) Information flow (Normally electronically) Website of Y Post Description of items (1) Display items (2) A B 13.4 What do you understand by EDI? Is EDI used in B2C or B2B e- Commerce? Acknowledge Why is order EDI important in e-commerce? EDI stands (7) for Electronic Data Interchange. It is a standard electronic format Ok s credift used for purchase orders, invoices etc. When Send such credit electronic forms card(6) are received they can be interpreted correctly by recipient s card details computer program and used. (5) EDI is used in B2B e-commerce. It is important in e-commerce because there is no manual intervention and data transfer is faster. As the format Credit is Card agreed between two organizations, communication is simple. companies Y s Bank A/C computer Bill sent to B(11) Credit to Y s A/C (11) Shiping Advice (9) B s bank Debit advice giving Credit card no (8) Items delivered to B (10) Y s warehouse V. Rajaraman/IISc. Bangalore M13/V1/July 04/4 Indian Institute of Science Bangalore
133 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems 13.5 What is VAN? What services do VANs provide? What are the advantages and disadvantages of VAN? VAN stands for Value Added Networks which provide services to Businesses which are members VANs provide post boxes for each of its subscribers who want to use their services. Some VANs provide conversion of forms to standard EDI format. The disadvantage of VAN services is high cost Why is security important in e-commerce? What are the security issues to be taken into account while designing a security system for e- Commerce? Since in e-commerce the transaction and communication takes place between two entities using PSTN, security issue is important. The different security issues that are taken into account, while designing a security system for e-commerce are given below: As internet connects several networks one has to be sure that unauthorised persons do not gain access to the company s confidential information. Both hardware and software solutions are needed to ensure this. The communication between companies should be protected from snoopers. When a company receives a message, it must be sure from whom it has come. In electronic communication system there should be digital signature so that the receiver knows that it has come from an authorised business. It should also ensure that the authentication of digital signature must be maintainable in a court of law in case of disputes What is a firewall? What are the functions of a firewall? A firewall is a set of related programs, located at a network gateway server that protects the resources of private network from other networks. Basically firewall, working closely with a router program, filters all network packets to determine whether to forward them toward their destination. The different functions of firewall are: Protection from vulnerable service Control access to site system Concentrated security Enhance privacy Logging and statistics on Network use and misuse 13.8 What is a hardened firewall host? What are its functions? In what way is it different from proxy application gateway? The hardened firewall is a computer that will require inside or outside users to connect to the trusted applications in it before connecting to external world. The major functions of hardened firewall are: Security processes are concentrated on one machine Names of systems on LAN, address etc., are hidden from outsiders Network service management is simplified by locating services such as ftp, , search engines etc., in the firewall machine. V. Rajaraman/IISc. Bangalore M13/V1/July 04/5 Indian Institute of Science Bangalore
134 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems The difference between hardened firewall and proxy application gateway is that for hardened firewall the inside or outside users are required to connect to the trusted application in firewall machine before connecting to any machine. All the information will pass through this computer, hence it is more secure Given a plain text: THIS IS A SAMPLE SENTENCE FOR ENCRYPTION. Apply the permutation (231564) and the substitution: (letter letter + 6 ) and obtain the cipher text. Step 1: write the message in block of 6 characters THISIS ASAMPL ESENTE NCEFOR ENCRYP TION Step 2: follow permutation(231564) HITISS SAAPLM SEETEN CENORF NCEYPR TION Step 3: make substitution (Letter Letter + 6) NOZOYY YGGVRS YKKZKT IKTUXL TIKEVXZOUT What is DES? Explain what DES does when the following hexadecimal plain text is input to a DES hardware. A1907FBCD FED14E890ABCA5 DES is a symmetric cryptographic algorithm. It is a block cipher, and encrypts data in 64-bit blocks. The same algorithm and key are used for both encryption and decryption. The key length is 56 bits. The key is usually expressed as a 64-bit number, but every eighth bit is used for parity checking and is ignored. These parity bits are the least-significant bits of the key bytes. After the initial permutation, the block is broken into a right half and a left half, each 32 bits long. Then there are 16 rounds of identical operations, called Function f, in which the data are combined with the key. After the sixteenth round, the right and left halves are joined, and a final permutation (the inverse of the initial permutation) finishes off the algorithm. In each round as shown in the figure (page 210) the key bits are shifted, and then 48 bits are selected from the 56 bits of the key. The right half of the data is expanded to 48 bits, combined with 48 bits of a shifted and permuted key via an XOR, then again converted to 32 new bits, and permuted again. These four operations make up Function f. The output of Function f is then combined with the left half via another XOR. The result of these operations becomes the new right half; the old right half becomes the new left half. These operations are repeated 16 times, making 16 rounds of DES. If Bi is the result of the i th iteration, Li and Ri are the left and right halves of Bi, Ki is the 48-bit key for round i, and f is the function and does all the substituting and permuting and XORing with the key, then a round looks like: Li = Ri 1 Ri = Li 1 f(r i 1, Ki) For more information on DES please refer to book APPLIED CRYPTOGRAPHY written by Bruce Schneier. V. Rajaraman/IISc. Bangalore M13/V1/July 04/6 Indian Institute of Science Bangalore
135 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems Plain Text IP Lo Ro f K 1 L 1 =R 0 R 1 =L 1 f(r 1,K 2 ) f K 2 L 2 =R 1 R 2 =L 1 f(r 1,K 2 ) L 15 =R 14 R 15 =L 14 f(r 14,K 15 ) f K 16 R 16 =L 15 f(r 15,K 16 ) L 16 =R 15 IP -1 Cipher text V. Rajaraman/IISc. Bangalore M13/V1/July 04/7 Indian Institute of Science Bangalore
136 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems What do you understand by symmetric key cryptography? What are the main advantages and disadvantages of symmetric key cryptography? The cryptography in which the same key is used for encryption and decryption and known to both parties while exchanging information is known as symmetric key or private key cryptography. The disadvantage of this method is, the difficulty in securely distributing the keys to authorised What is public key encryption? In what way is it different from private key encryption? Why is it important in e-commerce? The encryption in which two keys are used for encryption and decryption is called public key encryption. One of these keys is known as public key which is available to anyone wanting to send encrypted message. It is different from private key encryption in the sense that it uses two keys. One key is used for encryption and other is used for decryption. A private encryption, on the other hand uses one key for both encryption and decryption. Public key system is important in e-commerce because the public key of an organization is publicized globally. The customers encrypt a message using receiving organization s public key, which is decrypted by the receiving organization using its private key. Similarly the organization encrypts the message using particular customer s public key which is then decrypted by the customer using their private key. With this secure communication can be established which is an important aspect of e-commerce What are the main differences between DES based encryption and RSA based encryption? Is it possible to combine these two systems? If so explain how? The main difference between DES based encryption and RSA based encryption is DES uses a single key for both encryption and decryption whereas RSA uses two keys for the same DES is faster as it is implemented through hardware RSA is secure but slow since it uses complex computational procedure. Breaking the key is not easy Yes, one can combine the two keys. DES can be used to encrypt/decrypt messages using one key. The key itself can be sent using RSA. persons Give a block diagram of a system for transmitting a signed purchase order from business 1 to business 2. See Fig of text What types of electronic payment systems are required in e-commerce? Why are there different types of payment systems? Explain the necessary characteristics of each type of payment system and give an example each of where it is used. The different types of electronic payment systems required in e-commerce are: cash payments, credit card payments and cheque payments. Each of these payments have their own advantages and disadvantages Cash payment is used for small transactions and mostly used for C2C e- Commerce V. Rajaraman/IISc. Bangalore M13/V1/July 04/8 Indian Institute of Science Bangalore
137 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems Credit card is used for middle size transactions and mostly used for B2C e- Commerce Cheque payment system is used for voluminous transactions and mostly used for B2B e-commerce The characteristics of e-cash or electronic cash payments are: e-cash must have monetary value e-cash must be interoperable i.e., exchangeable for other e-cash, paper-cash, goods and services It must be storable and retrievable The characteristics of credit card transactions are: The credit card number entered by the customer should be encrypted The merchant should not have the knowledge of the credit card number of the customer The characteristics of cheque payment are: Both the parties involved in business should have public key certificates The cheque should be cleared by a clearing house before any transaction occurs Necessary dedicated hardware device is required for signing and encrypting the order Explain SET protocol used in credit card transactions. What is the main interesting aspect of SET protocol which gives confidence to customers transacting business using the internet? See Sec steps 1 to 7 The main interesting aspect of SET protocol which gives the confidence to the customer is that the merchant does not know the credit card number of the customer What are the main characteristics of cash payment in contrast with cheque payment? Why are governments not sympathetic to large cash transactions in e-commerce? Cash payments are used in C2B applications which involve small payments whereas cheque payment system is generally used in B2B applications in which higher amount of transactions are carried out. Cheque payments are much more secure and traceable compared to cash payments. A sophisticated scheme called transaction blinding has been invented, using which cash payments cannot be traced. As governments do not like untraceable large cash transactions it is not sympathetic to large cash transactions in e-commerce Explain how cash transactions take place in e-commerce. What special precautions should be taken by a bank to ensure that a customer does not double spend the same electronic coins issued to him/her? Cash Transaction in e-commerce A customer can withdraw coins in various denomination from his bank and keeps in his PC. The withdrawal takes place by the customer giving a serial V. Rajaraman/IISc. Bangalore M13/V1/July 04/9 Indian Institute of Science Bangalore
138 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Worked Out Problems number and denomination of each coin and requesting his bank to digitally sign it. The signed coins are of the form: (serial no., denomination, signature of bank). The bank will store a copy of issued coins. The customer pays a vendor by cash by sending the signed coin. The vendor sends it to the issuing bank (or to his bank which may deal with the issuing bank via a clearing house). The bank checks whether it has been signed by it and not yet spent. If it is OK it informs the vendor, who now can despatch the goods. The bank transfers the cash to the vendor s account. The coin is stored in the spent amount database of the bank so that if the coin is presented again it can be dishonored. Bank manages spent amount database which stores the information about the coin spent by the customer. If the customer tries to reuse the coin bank can easily trace it out from the spent amount database V. Rajaraman/IISc. Bangalore M13/V1/July 04/10 Indian Institute of Science Bangalore
139 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions 13.1 By Electronic Commerce we mean: a. Commerce of electronic goods b. Commerce which depends on electronics c. Commerce which is based on the use of internet d. Commerce which is based on transactions using computers connected by telecommunication network 13.2 For carrying out B2B e-commerce the following infrastructure is essential: (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v)secure electronic communication link connecting businesses a. i, ii, iii b. ii, iii, iv c. ii, iii, iv, v d. i, ii, iii, iv, v 13.3 For carrying out B2C e-commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v) Secure electronic communication link connecting businesses a. i, iv b. i, iii, iv c. ii, iii d. i, ii, iii, iv 13.4 For carrying out C2C e-commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards V. Rajaraman/IISc. Bangalore M13/V1/July 04/1 Indian Institute of Science Bangalore
140 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions (iv) Secure Payment Services (v)secure electronic communication link connecting businesses a. i and ii b. ii and iv c. i and iii d. i and iv 13.5 Advantages of B2C commerce are (i) Business gets a wide reach to customers (ii) Payment for services easy (iii)shop can be open 24 hours a day seven days a week (iv)privacy of transaction always maintained a. i and ii b. ii and iii c. i and iii d. iii and iv 13.6 B2C commerce a. includes services such as legal advice b. means only shopping for physical goods c. means only customers should approach customers to sell d. means only customers should approach business to buy 13.7 Advantages of B2C commerce to customers are (i)wide variety of goods can be accessed and comparative prices can be found (ii) shopping can be done at any time (iii)privacy of transactions can be guaranteed (iv)security of transactions can be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv V. Rajaraman/IISc. Bangalore M13/V1/July 04/2 Indian Institute of Science Bangalore
141 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions 13.8 Disadvantages of e-commerce in India are (i) internet access is not universally available (ii) Credit card payment security is not yet guaranteed (iii) Transactions are de-personalized and human contact is missing (iv) Cyberlaws are not in place a. i and ii b. ii and iii c. i, ii, iii d. i, ii, iii, iv 13.9 Electronic Data Interchange is necessary in a. B2C e-commerce b. C2C e-commerce c. B2B e-commerce d. Commerce using internet EDI requires a. representation of common business documents in computer readable forms b. data entry operators by receivers c. special value added networks d. special hardware at co-operating Business premises EDI standards are a. not universally available b. essential for B2B commerce c. not required for B2B commerce d. still being evolved EDIFACT is a standard a. for representing business forms used in e-commerce b. for transaction for e-commerce c. for ftp in e-commerce d. protocol used in e-commerce EDIFACT standard was developed by a. American National Standard Institute V. Rajaraman/IISc. Bangalore M13/V1/July 04/3 Indian Institute of Science Bangalore
142 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions b. International Standard Institute c. European Common Market d. United Nations Economic Commission for Europe ANSI X.12 is a standard developed by a. American National Standard Institute b. International Standard Institute c. European Common Market d. United Nations Economic Commission for Europe In B2B e-commerce (i) Co-operating Business should give an EDI standard to be used (ii) Programs must be developed to translate EDI forms to a form accepted by application program (iii) Method of transmitting/receiving data should be mutually agreed (iv) It is essential to use internet a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet EDI over internet uses a. MIME to attach EDI forms to messages b. FTP to send business forms c. HTTP to send business forms d. SGML to send business forms For secure EDI transmission on internet a. MIME is used b. S/MIME is used V. Rajaraman/IISc. Bangalore M13/V1/July 04/4 Indian Institute of Science Bangalore
143 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions c. PGP is used d. TCP/IP is used EDI standard a. is not easily available b. defines several hundred transaction sets for various business forms c. is not popular d. defines only a transmission protocol By security in e-commerce we mean (i) Protecting an organization s data resource from unauthorized access (ii) Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations a. i, ii b. ii, iii c. iii, iv d. i, iii, iv A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user s application programs Firewall as part of a router program a. filters only packets coming from internet V. Rajaraman/IISc. Bangalore M13/V1/July 04/5 Indian Institute of Science Bangalore
144 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-commerce Filtering of packets by firewall based on a router has facilities to a. i, iii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services c. to allow corporate users to use all internet services d. to prevent corporate users from using internet services Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii) monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with security problems (iv) disallows all internet users from accessing intranet a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii) Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients and monitors them (iv) prevents outsiders from accessing IP addresses within the intranet a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv V. Rajaraman/IISc. Bangalore M13/V1/July 04/6 Indian Institute of Science Bangalore
145 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions A hardened firewall host on an Intranet is a. a software which runs in any of the computers in the intranet b. a software which runs on a special reserved computer on the intranet c. a stripped down computer connected to the intranet d. a mainframe connected to the intranet to ensure security By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii) efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies databases from retrieval (iv) to preserve secrecy of information stored in databases if an unauthorized person retrieves it a. i and ii b. ii and iii c. iii and iv d. i and iv Encryption can be done a. only on textual data b. only on ASCII coded data c. on any bit string d. only on mnemonic data By applying permutation (31254) and substitution by 5 characters away from current character (A F, B G etc..) the following string ABRACADABRA becomes a. FGWCAAADRBF b. RABCAAADRBF c. WFGHFFFIWGF V. Rajaraman/IISc. Bangalore M13/V1/July 04/7 Indian Institute of Science Bangalore
146 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions d. None of the above The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character +3 (A D, etc). The plain text after decryption is: Cipher text : PDLJDLXHVQC a. MAIGAIUESNZ b. IAMAGENIUSZ c. LDPDJHPLXVZ d. IAMAGENIUSC By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption The acronym DES stands for a. Digital Evaluation System b. Digital Encryption Standard c. Digital Encryption System d. Double Encryption Standard DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys DES (i) is a symmetric key encryption method (ii) guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii V. Rajaraman/IISc. Bangalore M13/V1/July 04/8 Indian Institute of Science Bangalore
147 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions c. i and iii d. iii and iv DES using 56 bit keys a. Cannot be broken in reasonable time using presently available computers b. Can be broken only if the algorithm is known using even slow computers. c. Can be broken with presently available high performance computers. d. It is impossible to break ever Triple DES uses a. 168 bit keys on 64-bit blocks of plain text b. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds. c. Works with 144 bit blocks of plain text and applies DES algorithm once. d. Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice ripple DES a. Cannot be broken in reasonable time using presently available computers. b. Can be broken only if the algorithm is known using even slow computer. c. Can be broken with presently available high performance computers. d. It is impossible to break ever Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys Public key encryption method is a system a. which uses a set of public keys one for each participant in e-commerce b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him. c. which uses the RSA coding system. d. which is a standard for use in e-commerce. V. Rajaraman/IISc. Bangalore M13/V1/July 04/9 Indian Institute of Science Bangalore
148 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B s private key c. A encrypts message using B s public key d. A encrypts message using his public key In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A s public key b. Even if B knows who sent the message it cannot be decrypted c. It cannot be decrypted at all as no one knows A s private key d. A should send his public key with the message Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system c. using an algorithm to implement DES instead of using hardware d. designing DES with high security and not publicizing algorithm used by it DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii) to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv) as it is required in e-commerce a. i and ii b. ii and iii V. Rajaraman/IISc. Bangalore M13/V1/July 04/10 Indian Institute of Science Bangalore
149 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions c. iii and iv d. i and iv A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender A digital signature is required (i) to tie an electronic message to the sender s identity (ii) for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all transactions a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii) must be hardware implementable (iii) two different messages should not give the same hashed message (iv) is not essential for implementing digital signature a. i and ii b. ii and iii c. i and iii d. iii and iv Hashed message is signed by a sender using a. his public key b. his private key c. receiver s public key d. receiver s private key V. Rajaraman/IISc. Bangalore M13/V1/July 04/11 Indian Institute of Science Bangalore
150 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption and hashed message using DES c. sends both message and hashed message using DES d. sends both message and hashed message using public key encryption The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES Certification of Digital signature by an independent authority is needed because a. it is safe b. it gives confidence to a business c. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership d. private key claimed by a sender may not be actually his The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services In SET protocol a customer encrypts credit card number using a. his private key b. bank s public key c. bank s private key d. merchant s public key In SET protocol a customer sends a purchase order V. Rajaraman/IISc. Bangalore M13/V1/July 04/12 Indian Institute of Science Bangalore
151 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions a. encrypted with his public key b. in plain text form c. encrypted using Bank s public key d. using digital Signature system One of the problems with using SET protocol is a. the merchant s risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to keep a database of the public keys of all customers d. the bank has to keep a database of digital signatures of all customers The bank has to have the public keys of all customers in SET protocol as it has to a. check the digital signature of customers b. communicate with merchants c. communicate with merchants credit card company d. certify their keys In electronic cheque payments developed, it is assumed that most of the transactions will be a. customers to customers b. customers to business c. business to business d. banks to banks In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys In the NetBill s protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii) the vendor is guaranteed payment when information is delivered V. Rajaraman/IISc. Bangalore M13/V1/July 04/13 Indian Institute of Science Bangalore
152 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions (iii) the customer must have a certified credit card (iv) the customer must have a valid public key a. i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv In NetBill s protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he receives payment (iii) Checksum of encrypted information received by customer is attached to his payment order (iv) Vendor does not encrypt information purchased by customer a. i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions In Electronic cash payment (i) a customer withdraws coins in various denominations signed by the bank (ii) the bank has a database of issued coins (iii) the bank has a database of spent coins (iv) the bank cannot trace a customer a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv V. Rajaraman/IISc. Bangalore M13/V1/July 04/14 Indian Institute of Science Bangalore
153 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/Electronic Commerce Multiple Choice Questions Key to Objective Questions 13.1 d 13.2 c 13.3 a 13.4 c 13.5 c 13.6 a 13.7 a 13.8 c 13.9 c a b a d 13.14a b c a b b d c a c b b b c b c d c c b a b a c c b a b b b c a 13.46b a c b c b a c c a b d c a c c d b b b V. Rajaraman/IISc. Bangalore M13/V1/July 04/15 Indian Institute of Science Bangalore
154 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Question Bank Question Bank 13.1 Define E-Commerce. What are the different types of E-Commerce? 13.2 Explain B2B E-Commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers. Assume that the distributor has stocks of books of a large number of publishers and book sellers order books as and when their stock is low. Distributors give 1 month's time to booksellers for payment Explain B2C E-Commerce of a customer reserving airline tickets from his home or place of work Explain C2C E-Commerce with an appropriate example List the advantages and disadvantages of E-Commerce Explain the system architecture of E-Commerce by looking at it as a set of layers with the physical network at the bottom layer and applications at the top layer Define internet. Why is internet important in E-Commerce? 13.8 What do you understand by EDI? Is EDI used in B2C or B2B E-Commerce? Why is EDI important in E-Commerce? 13.9 What are two major EDI standards used in E-Commerce? Which is the standard accepted for Government transactions in India? What is VAN? What services do VANs provide? What are the advantages and disadvantages of VAN? If internet is to be used for EDI which mail standard is used? If is to be used to exchange EDI between two businesses what are the points on which they should agree? Why is security important in E-Commerce? What are the security issues to be taken into account while designing a security system for E-Commerce? What is a firewall? What are the functions of a firewall? What is packet screening? Which hardware device performs packet screening? What is a proxy application gateway? What are the functions of this gateway? What is a hardened firewall host? What are its functions? In what way is it different from proxy application gateway? Given a plain text: THIS IS A SAMPLE SENTENCE FOR ENCRYPTION. V. Rajaraman/IISc. Bangalore M13/V1/July 04/1 Indian Institute of Science Bangalore
155 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Question Bank Apply the permutation (231564) and the substitution: (letter letter + 6 ) and obtain the cipher text What is DES? Explain what DES does when the following hexadecimal plain text is input to DES hardware. A1907FBCD FED14E890ABCA What do you understand by symmetric key cryptography? What are the main advantages and disadvantages of symmetric key cryptography? What is public key encryption? In what way is it different from private key encryption? Why is it important in E-Commerce? What are the main differences between DES based encryption and RSA based encryption? Is it possible to combine these two systems? If so explain how? Given two prime numbers 23 and 41 design a RSA system. Explain with an example how it works What is a digital signature? Why is it necessary in E-Commerce? What are the necessary conditions a hash function used in digital signature should satisfy? Give a block diagram of a system for transmitting a signed purchase order from business 1 to business What is a certifying authority? Why is a certifying authority required in E-Commerce? How a certifying authority does perform its tasks? What types of electronic payment systems are required in E-Commerce? Why are there different types of payment systems? Explain the necessary characteristics of each type of payment system and give an example each of where it is used Explain SET protocol used in credit card transactions. What is the main interesting aspect of SET protocol which gives confidence to customers transacting business using the internet? In using SET protocol who has to keep a data base of public keys of all customers? How the customer does assured that he will not be double charged for the same item purchased? What are the main differences between electronic cheque payment and credit card payment in E-Commerce? Explain cheque transaction protocol used in E-Commerce Why is a different payment system needed for small payment for internet services? Explain how one such system functions. How does the system make sure that payment V. Rajaraman/IISc. Bangalore M13/V1/July 04/2 Indian Institute of Science Bangalore
156 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Question Bank is made only after information for which payment has been made is actually delivered to the customer? What are the main characteristics of cash payment in contrast with cheque payment? Why are governments not sympathetic to large cash transactions in E-Commerce? Explain how cash transactions take place in E-Commerce. What special precautions should be taken by a bank to ensure that a customer does not double spend the same electronic coins issued to him/her? V. Rajaraman/IISc. Bangalore M13/V1/July 04/3 Indian Institute of Science Bangalore
157 System Analysis and Design Prof. V.Rajaraman System Analysis and Design/E-Commerce Pointers References 1. Most of the material in this chapter are taken from Chapter 16, Electronic Commerce of the book Analysis and Design of Information Systems (2 nd edition) by V.Rajaraman, Prentice-Hall of India, New Delhi, There are many books on E-Commerce, which describe E-Commerce in detail. Among these are: E.Awad, Electronic Commerce, Prentice-Hall of India, New Delhi 2002.This book takes managers perspective and not very strong on technology aspects of E-Commerce. All the examples have a strong American bias as the book is primarily intended for students in America. The language is clear but the book is verbose. What can be said in 100 pages is said in 400 pages as it includes all kinds of gossip not relevant to students wanting the learn the subject. 3. D.Minoli and E.Minoli, Web Commerce Technology Handbook, Tata McGraw-Hill, New Delhi, This book is strong in technology and has wide coverage. 4. W. Stallings, Network Security Essentials, Pearson Education Asia, New Delhi, Has good presentation on DES, Triple DES, RSA and SET protocol. 5. Most traditional Systems Analysis and Design book such as the one by Kendall and Kendall do not separately discuss E-Commerce; they have a cursory treatment at various places in the book. V. Rajaraman/IISc. Bangalore M13/V1/July 04/1 Indian Institute of Science Bangalore
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Electronic Payment Systems
Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce they are Credit card payments Electronic cheque
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
Electronic Commerce. 4. Payment Schemes. V Rajaraman. In this part, we will describe payments using credit cards and cheques in e-commerce.
Electronic Commerce 4. Payment Schemes V Rajaraman In this part, we will describe payments using credit cards and cheques in e-commerce. V Rajaraman is with the Jawaharlal Nehru Centre for Advanced Scientific
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Network Security. Network Security. Security in Computer Networks
Network Security Network Security introduction cryptography authentication key exchange Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete) Intruder may eavesdrop remove, modify, and/or
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Chapter 10. e-payments
Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
Framework of e-commerce
Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Security in Distributed Systems. Network Security
Security in Distributed Systems Introduction Cryptography Authentication Key exchange Computer Science Lecture 18, page 1 Network Security Intruder may eavesdrop remove, modify, and/or insert messages
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
E-commerce refers to paperless exchange of business information using following ways.
E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary
Case-study: SwissAir The Internet Business Old model: check flight info online Step 1. Toward customers e-ticketing, electronic check-in frequent flyer miles Web site personalization (and statistics!)
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Standardised Electronic Invoicing for the Increased Efficiency of Australian Small Business
Standardised Electronic Invoicing for the Increased Efficiency of Australian Small Business 31st May 2015 - Revision 0 Author: James Dwyer About the Author Introduction Immediate Benefits of a Nationally
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Electronic Commerce. 6. Electronic Data Interchange and XML. V Rajaraman
Electronic Commerce 6. Electronic Data Interchange and XML V Rajaraman B2B e-commerce requires participating businesses to exchange business forms such as purchase order and invoice electronically without
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
ICOM 5018 Network Security and Cryptography
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Firewall Architecture
NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT
AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014
Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes
Unit- IV. SYLLABUS: Electronic Data Interchange, EDI Applications in Business, EDI implementation, MIME, and value added networks.
Unit- IV SYLLABUS: Electronic Data Interchange, EDI Applications in Business, EDI implementation, MIME, and value added networks. Electronic Data Interchange Electronic Data Interchange (EDI) - interposes
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
How to Create E-Commerce Web Site
How to Create E-Commerce Web Site By A. Sittikorn Direksoonthorn BIS 3687: E-Banking and Payment System Assumption University 1/2004 Be on the Web, or Be out of Business Quick Win Agenda Encryption in
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
Technical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
EDI 101 An Introduction to EDI. NewEDI 1
EDI 101 An Introduction to EDI NewEDI 1 Table of Contents Introduction...3 What is EDI?...4 How EDI Works...7 Why Use EDI...9 What EDI Solutions are Available?...11 Need More Help?...13 Glossary of EDI
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
