Analysis of E-Commerce Security Protocols SSL and SET



Similar documents
What is an SSL Certificate?

Electronic Commerce and E-wallet

Chapter 10. e-payments

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Evaluate the Usability of Security Audits in Electronic Commerce

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Cornerstones of Security

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS

Information Security

ISM/ISC Middleware Module

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Securing your Online Data Transfer with SSL

CRYPTOGRAPHY IN NETWORK SECURITY

How To Understand And Understand The Security Of A Key Infrastructure


Building Customer Confidence through SSL Certificates and SuperCerts

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Security Digital Certificate Manager

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

SSL A discussion of the Secure Socket Layer

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Research Article. Research of network payment system based on multi-factor authentication

The Benefits of the thawte ISP Program

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Security: Focus of Control. Authentication

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Managing SSL Security in Multi-Server Environments

Tel: Tel: +44 (0) Comodo Group.

SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS

Advanced Authentication

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Savitribai Phule Pune University

Is your data safe out there? -A white Paper on Online Security

PrivyLink Internet Application Security Environment *

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Network Security Protocols

Properties of Secure Network Communication

Chapter 1: Introduction

CHAPTER 1 INTRODUCTION

Credit card: permits consumers to purchase items while deferring payment

What is network security?

Understanding digital certificates

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

Security Digital Certificate Manager

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Chapter 17. Transport-Level Security

X.509 Certificate Revisited

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

Virtual Private Networks

The e-payment Systems

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Strong Security in Multiple Server Environments

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

Overview. SSL Cryptography Overview CHAPTER 1

Electronic Payment Systems. Dr Sherif Kamel

CTS2134 Introduction to Networking. Module Network Security

Online Payment Process. Name Kathleen Kaye Acosta Nr Course E-Business Technologies SS2008 Professor Dr. Eduard Heindl

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

ERserver. iseries. Secure Sockets Layer (SSL)

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Single Sign-On Secure Authentication Password Mechanism

Sync Security and Privacy Brief

RFID based Bill Generation and Payment through Mobile

Extended SSL Certificates

understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

GT 6.0 GSI C Security: Key Concepts

PCI Data Security Standards (DSS)

Installation and usage of SSL certificates: Your guide to getting it right

Content Teaching Academy at James Madison University

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

A Noval Approach for S/MIME

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

ETSI TR V1.2.1 ( )

TLS and SRTP for Skype Connect. Technical Datasheet

DRAFT Standard Statement Encryption

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

On-line Payment and Security of E-commerce

Detailed Concept of Network Security

Strong Encryption for Public Key Management through SSL

Apache Security with SSL Using Linux

Lecture 9 - Network Security TDTS (ht1)

Data Protection: From PKI to Virtualization & Cloud

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Longmai Mobile PKI Solution

Transcription:

Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce is the major achievement of this era. In E-commerce, the transaction takes place over the network. During various phases of an electronic transaction, the information such as product specification, order details, payment, and delivery information travels over the comparison of the two most popular E-commerce transactions secure protocols SSL and SET. Keywords Electronic Payment, SSL, SET, E-Commerce. 1. INTRODUCTION Recent growth in Internet usage has increased the problem of privacy a lot. Every one using the web for E-commerce needs to be concern about the security of their personal information. But how it can be ensured is a big question and need to be solved. Following are the drawbacks of online payment systems regarding security: Unauthorized transactions or stealing money. Hacking of personal data and use it for identity theft. Attacking on data and make it corrupts. Take advantage of the convenience and speed of the electronic system to mask illegitimate or illegal transactions i.e., money laundering. Take advantage of the efficiency of the electronic system to facilitate funding of illegal. Thus Security is the major concern in E-commerce, which is the subject of this paper. Section II give the brief introduction of E- commerce, section III explain various electronic payment system, section IV discuss Security aspect of E-commerce, section V we will find a comparison study between two major E- commerce security protocols: SSL and SET, section VI about conclusion. 2. E-COMMERCE [1,5] It is the ability to do business on-line via the Internet. With Internet based E-commerce, new types of transaction are appearing: Parties in the transaction such as business, consumers and government Things involved such as tangible and intangible good and services. Also, it enhances the processes of the business and changes the way it delivers services to clients. In contrast, E- commerce comes also with some problems such as authentication and identification. Using a non-proprietary open network, Internet, with its associated security and reliability issues. Free client administration. On going Service availability. Geographically distributed parties. Parties identity without physical contact. Support of off-line contact between parties through email, voice, fax, etc. The ability to collect data and parties profiles. The typical E-commerce business application framework suppose to provide and support complete workflow function, where E-commerce has a massive workflow starts from account opening and end at payment protocol. Also, it should have a useful user interface foundation and service provision. Therefore, it is designed to consolidate main sub frameworks, and a service pool: Object Management Framework: this is responsible for sorting and retrieving all objects in the application. It also responsible for isolating the application from the underlying database. Business Logic Framework: the purpose of this to encapsulate the business rules and process independently of the user interface. User Interface Framework: the usage of this framework is to isolate the basic notion of a form from the underlying window system and operating system. Generic Service Pool: This can be called a virtual machine provides services to all other frameworks in a sufficiently abstracted form. So, the services can be implemented in several ways. 3. ELECTRONIC PAYMENTS METHODS [1]

There are several payment methods supporting electronic payments over the internet: Electronic payment cards (credit, debit, charge) Virtual credit cards E-wallets (or e-purses) Smart cards Electronic cash (several variations) Wireless payments Stored-value card payments Loyalty cards Person-to-person payment methods Payments made electronically at kiosks 4. SECURITY ASPECT OF E-COMMERCE SECURITY [4,6,7] Security in E-commerce is very important part since communication can be easily intercepted, messages can be inserted, and the absolute identity of involved parties may be uncertain. There is a lack of a consistent and coherent set of protocols to cover the needs of merchants and consumers. However, one should minimize the effects of security failures on cyberspace for reliable electronic commerce systems. Security tries to accomplish the following tasks: Authentication which identifies buyer and also makes sure that person is who he/she claims to be. Used methods are i.e. digital signature, finger prints, password or smartcards etc. Data integrity which means, that there must be a way to verify that data is not changed during the transactions. Confidentially must be preserved, so information concerning the tarns action are need to know basis. Non repudiation, which means that person who did the payments is not able afterwards deny doing so. Among other considerations, it needs to consider the following important issues: cryptographic keys or implied security model suggests the client enrolment. Confidentiality Requirements: Even if the critical aspect of E-commerce security is transaction authentication, confidentiality requirements are a significant design issue. This confidentiality requirements issue is independent from the selection of a security model. Obviously, when the confidentiality mechanisms are considered, the selection of SKC or PKC does matter. 5 E-COMMERCE SECURITY PROTOCOLS 5.1 Secure Sockets Layer (Ssl) [11,12] In 1994, Netscape developed its first standard of Secure Socket Layer (SSL) to implement secure environment to exchange the information over the Internet and made it public for implementation in fall 1994. SSL is a security protocol protects communications between any SSL-enabled client and server software running on a network that uses TCP/IP, Gopher, FTP, Telnet etc. SSL approach is to add a layer on top of the existing network transport protocol and beneath the application. This approach applied by adding an intermediate step, requiring negotiation of secure transmission options, to the establishment of a network connection. Data flowing between the client and the server on that connection is encrypted before transmission and decrypted before it can be used by the receiving system. SSL Secured Connection Steps: SSL steps to establish a secured connection between the customer client and server. The figure shows the typical SSL connection establishment in order to transfer sensitive data over the internet (e.g. online shopping). During SSL connection establishment only the server is authenticated using a digital certificate (authentication of the user usually occurs through user name and password after the SSL connection has been established). SSL also offers the option for client authentication based on digital certificates. Electronic Identification Strategy: It requires cryptographic security techniques to ensure transaction authentication and choose between secret key cryptography (SKC) MACing (Message Authentication Code) or public key cryptography (PKC) digital signatures. Level of Security: The determination of a security level will have impact on the type of electronic identification means given to clients. The choice is between logical securities in software-based authentication, or physical security if a security device is introduced into the picture. Client Authentication Strategy: With the PKC digital signatures, this issue is rooted in the PKI security model, and the role of certification authorities (CA). Where with SKC, the foremost options are the manual delivery of Fig 1: Ssl Secured Connection Steps

Advantages of SSL Transparency - since SSL provides security at the session layer, its presence is completely invisible either to the merchants Web shop software or the customer. This is especially important for merchants because there s no cost for integrating SSL with their existing systems, other than the cost of installing the certificate. Ease of use for customers - SSL is already built into commonly used Web browsers and there is no need to install any additional software. Low complexity - the system is not complex, resulting in minimal impact on transaction speed. Disadvantage of SSL SSL has some serious problems when it comes to meet the security challenges of today financial sector. The merchant cannot reliably identify the cardholder. SSL does provide the possibility of client authentication with the use of client certificates; such certificates are not obligatory and are rarely used. Furthermore, even if the client possesses a certificate, it is not necessarily linked with his credit card. SSL only protects the communication link between the customer and the merchant. The merchant is allowed to see the payment information. SSL can neither guarantee that the merchant will not misuse this information, nor can it protect it against intrusions whilst it is stored at the merchant s server. Without a third-party server, SSL cannot provide assurance of non-repudiation. SSL indiscriminately encrypts all communication data using the same key strength, which is unnecessary because not all data need the same level of protection. For example, a credit card number needs stronger encryption than an order item list. Using the same key strength for both creates unnecessary computational overhead. 5.2 Secure Electronic Transactions (Set)[9] It is a standardized industry wide protocol specification designated to secure payment transactions and authenticate the parities involved in the transaction in any type of networks including Internet. VISA and MasterCard developed the SET standard with collaboration from leading software companies such as Microsoft, Netscape, RSA, VeriSign, and other. SET was created to provide the trust needed for consumers. The protocol uses cryptography and digital certificates to provide confidentiality of the information, ensure payment integrity, and authenticate merchants, banks, and cardholders during SET transaction. Fig 2: Secure Electronic Transactions SET Specifications: SET uses RSA Data security public key cryptography in order to encrypt and decrypt transaction packets along with the use of digital certificates and digital signature for authentication of all parties to the transaction and validation that information has not been tampered with. SET makes online transactions even safer by using digital certificates to verify that consumers and merchants are both authorized to use and accept Visa cards. It's the electronic equivalent of a consumer looking for a Visa decal in a merchant's store window, and a merchant checking the consumer's signature on the back of a Visa card. Merchants worldwide are currently adopting SET. SET incorporates the use of public key cryptography to protect the privacy of personal and financial information. As a result, with SET, consumers' payment card information is protected all the way to the financial institution. The merchant cannot read this information in the payment transaction. With SET, cardholders can validate that the Internet merchant is legitimate through the merchant's digital certificate. SET software automatically checks that merchant has a valid certificate representing their relationship with their financial institution. This provides consumers with the confidence that their payments will be handled with the same Visa promise that they trust today. Advantages of SET Protocol Confidentiality, authentication and data integrity was verified by a large collection of security proofs based on formal methods.

In the standard variant of the protocol, SET prevents merchants from seeing the customer payment information, since this information is encrypted using the payment gateway s public key. To ensure merchant privacy, SET prevents the payment gateway from seeing the order information. Disadvantages of SET The customer must install additional software, which can handle SET transactions. The customer must have a valid digital certificate. Implementing SET is more costly than SSL for merchants as well. Adapting their systems to work with SET is more complicated than adapting them to work with SSL Business banks must hire companies to manage their payment gateways, or install payment gateways by themselves. Despite being designed with security in mind, SET also has some security issues. In a variant of the SET protocol, the merchant is allowed to see the customer payment information, just as with SSL. SET employs complex cryptographic mechanisms that may have an impact on the transaction speed. 6. CONCLUSION E-commerce is the ability to do business through the Internet. It is not just present of computers and absence of papers. It has more than this. E-commerce security is the major issue keeping many commerce organizations afraid from using Internet for their business. Secured Socket Layer (SSL) and Secured Electronic Transactions (SET) are the major popular E- commerce security protocols. Each one of them has its domain of use, its products, its strategy, and its own encryption procedure. Doing a comparison study between SSL and SET is not an easy thing. Using SSL or SET depends on user consideration. A comparison study shows the design issue of each one, its way of securing E-commerce, authenticates parties, using key exchange, and its encryption methodologies. While there are still lots of efforts focused on E-commerce security, it is not an easy decision to use Internet to exchange critical data such as credit card number, passwords, or any sensitive private information. 7. REFERENCES [1] Singh Sumanjeet, Emergence Of Payment Systems In The Age Of Electronic Commerce: The State Of Art, Global Journal Of International Business Research Vol. 2. No. 2. 2009 [2] Levi A., Koç C. (2001) 17th Annual Computer Security Applications Conference (ACSAC'01), 0286. [3] Electronic Payment System- ISA 767 (2008) Secure Electronic Commerce George Mason University [4] Anup K. Ghosh. Certifying E-Commerce Software For Security. National Institute For Standards And Technology (NIST), 1999. [5] Asuman Dogac, Electronic Commerce. Journal Of Database Management, Fall 1999. [6] Marcus J. Ranum. Electronic Commerce And Security. V- One Corporation, White Paper. Http://Www.V-One.Com [7] Shannon Matthews. Survey Reveals Ecommerce Security Systems Are Not Convincing Internet Users. World Research Inc. Aug. 20, 1999. Http://Www.Techmall.Com [8] Anup K. Ghosh. Securing Electronic Commerce: Moving Beyond Cryptography. Journal Of Electronic Commerce, 1999. [9] "SET Secure Electronic Transaction LLC. " Purchase, NY: SET Secure Electronic Transaction LLC, 2001. Available From Www.Setco.Org [10] Marcus Goncalves. Industrial Networks Are Not Ready For E-Commerce. ARC Insights, Issue: 99-023, March 1999. [11] Mayu Mishina. Is electronic commerce a good idea for you? AS/400 Systems Management, July 1998. Netscape Corp. Appendix E, Introduction to SSL. Page 213-229. [12] Taher Elgamal. The Secure Sockets Layer Protocol (SSL). Danvers IETF Meeting, April 1995. [13] Nikos Drakos. Security & Electronic Commerce:SSL Protocol. Security & Electronic Commerce Appendix, University of Leeds. 1997. [14] Marvin A. Sirbu. Credits and debits on the Internet. IEEE- Spectrum, Feb. 1997.

Authenticity Privacy Integrity Non Expansion Transactio Convenience Acceptability repudiation n cost SSL Fair Uses Fair Uses Uses Hash None Good Same Good Good only the Actual card functions consumer s number to to ensure account make integrity. information transaction at to establish the risk of identity. information being stolen. SET Good Uses SET certificates and consumer s account information to check identity. Fair Uses Actual card number t o make transaction at the risk of information being stolen. Uses digital signature to ensures integrity. Uses digital signature to ensures integrity Fair Process is complex. A higher bit Fair consumer s need to apply for SET certificates. Poor Need to construct entirely open PKI An Evaluated Comparison