65
7 - 1 Copyright © 2001 by Harcourt, Inc. All rights reserved E-commerce Payment Systems and Security

E Payments Class Feb 19

Embed Size (px)

DESCRIPTION

An overview of E-payments

Citation preview

Page 1: E Payments Class Feb 19

7 - 1Copyright © 2001 by

Harcourt, Inc. All rights reserved

E-commerce Payment Systems and Security

Page 2: E Payments Class Feb 19

7 - 2Copyright © 2001 by

Harcourt, Inc. All rights reserved

Electronic money

• Electronic commerce needs– speed– security– privacy– internationalization

• Paper-based systems are inadequate

Page 3: E Payments Class Feb 19

7 - 3Copyright © 2001 by

Harcourt, Inc. All rights reserved

Page 4: E Payments Class Feb 19

7 - 4Copyright © 2001 by

Harcourt, Inc. All rights reserved

2001 Daniel L. Silver 4

Traditional Payment Methods

Payment: The transfer of money from one individual or legal entity to another

• Cash• Personal Cheques• Money orders (Bank note)• Credit cards• Debit cards

Page 5: E Payments Class Feb 19

7 - 5Copyright © 2001 by

Harcourt, Inc. All rights reserved

E-Commerce Payment Systems

• Credit Cards• Electronic Funds Transfer (EFT)• Card-based Digital Cash• Computer-based Digital Case

Page 6: E Payments Class Feb 19

7 - 6Copyright © 2001 by

Harcourt, Inc. All rights reserved

• Electronic funds transfer (EFT): EFT involves electronic transfer of money by financial institutions.

• Payment cards : They contain stored financial value that can be transferred from the customer's computer to the businessman's computer.

• Credit cards : They are the most popular method used in EPSs and are used by charging against the customer credit.

Page 7: E Payments Class Feb 19

7 - 7Copyright © 2001 by

Harcourt, Inc. All rights reserved

• Smart cards: They include stored financial value and other important personal and financial information used for online payments.

• Electronic money (e-money/e-cash): This is standard money converted into an electronic format to pay for online purchases.

Page 8: E Payments Class Feb 19

7 - 8Copyright © 2001 by

Harcourt, Inc. All rights reserved

• Online payment: This can be used for monthly payment for Internet, phone bills, etc.

• Electronic wallets (e-wallets) : They are similar to smart cards as they include stored financial value for online payments.

Page 9: E Payments Class Feb 19

7 - 9Copyright © 2001 by

Harcourt, Inc. All rights reserved

• Micro-payment systems : They are similar to e-wallets in that they include stored financial value for online payments; on the other hand, they are used for small payments, such as kurus in Turkey .

Page 10: E Payments Class Feb 19

7 - 10Copyright © 2001 by

Harcourt, Inc. All rights reserved

• Electronic gifts : They are one way of sending electronic currency or gift certificates from one individual to another. The receiver can spend these gifts in their favorite online stores provided they accept this type of currency

Page 11: E Payments Class Feb 19

7 - 11Copyright © 2001 by

Harcourt, Inc. All rights reserved

E-Commerce Payment Systems

Characteristics of Electronic Money Security Authentication Scale of Purchase

Credit Card High High Small to Medium

EFT High High Small to Large

Card-Based Digital Cash

Medium High Nano to Medium

Computer-Based Digital Cash

High High Nano to Medium

Page 12: E Payments Class Feb 19

7 - 12Copyright © 2001 by

Harcourt, Inc. All rights reserved

Page 13: E Payments Class Feb 19

7 - 13Copyright © 2001 by

Harcourt, Inc. All rights reserved

Credit Cards• A very common method of payment • Cards are issued by a bank• Unique 16-digit number (including check

digits) and an expiration date • Third party authorization companies

verify purchases

Page 14: E Payments Class Feb 19

7 - 14Copyright © 2001 by

Harcourt, Inc. All rights reserved

Credit card• Safe, secure, and widely used• Secure servers and clients support

the use of credit cards• Credit card suppliers are working to

improve security (SET)• Does not support person-to-person

transfers• Does not have the privacy of cash

Page 15: E Payments Class Feb 19

7 - 15Copyright © 2001 by

Harcourt, Inc. All rights reserved

• Most popular payment method• Especially for B2C e-commerce• 1st generation: No protection, only

provide credit card number for processing• 2nd generation: SSL for protecting the

transfer of credit card information• 3rd generation: SET for secure credit card

authorization• 4th generation: Portable smart cards?

Page 16: E Payments Class Feb 19

7 - 16Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

Credit Card Protocols• SSL 1 or 2 parties have private keys• TLS (Transport Layer Security)

– IETF version of SSL

• i KP (IBM)• SEPP (Secure Encryption Payment Protocol)

– MasterCard, IBM, Netscape• STT (Secure Transaction Technology)

– VISA, Microsoft

• SET (Secure Electronic Transactions)– MasterCard, VISA all parties have certificates

OBSOLETE

VERY SLOWACCEPTANCE

Page 17: E Payments Class Feb 19

7 - 17Copyright © 2001 by

Harcourt, Inc. All rights reserved

Computer-based Digital Cash• Digicash can be used to withdraw

and deposit electronic cash over the Internet

• Anonymity• Need a digital bank account• Person-to-person transfers• Uses public-key encryption

Page 18: E Payments Class Feb 19

7 - 18Copyright © 2001 by

Harcourt, Inc. All rights reserved

Card-based Digital Cash

• Electronic parallel of notes and cash• Prepaid cards• Smart cards

– Combines many functions• Privacy of cash• Can be lost or stolen

Page 19: E Payments Class Feb 19

7 - 19Copyright © 2001 by

Harcourt, Inc. All rights reserved

Electronic funds transfer• Introduced in the late 1960s by banks• Electronic check writing• Fast and flexible• All transaction must pass through the

banking system and are recorded– No anonymity

Page 20: E Payments Class Feb 19

7 - 20Copyright © 2001 by

Harcourt, Inc. All rights reserved

E-Commerce Payment Systems

Use of EFT for Consumer Purchase

$ $

Purchase Item withDebit Card

TransmissionElectronically

Submitted

ClearinghouseTransfers Funds

Funds Creditedto Store Account

Page 21: E Payments Class Feb 19

7 - 21Copyright © 2001 by

Harcourt, Inc. All rights reserved

E-Commerce Payment Systems

Purchasing with Digital Cash$

CreateAccount

Receive DigitalCash and Store on PC

Purchase Itemwith Digital Cash

Receive Item via Delivery Service

$Digital

Cash toBank

FundsfromBank

Bank Dealingin Digital Cash

Store AcceptingDigital Cash

Page 22: E Payments Class Feb 19

7 - 22Copyright © 2001 by

Harcourt, Inc. All rights reserved

SET: Seven business requirements (according to SET Book 1)

• Provide confidentiality of payment information • Ensure the integrity of all transmitted data• Provide cardholder’s authentication• Provide merchant’s authentication• Ensure the use of the best security practices and system design

techniques• Create a protocol that is independent on the transport layer

protocol• Facilitate interoperability• (Please read Book 1: Business Description at

http://www.setco.org/download.html/#spec)

Page 23: E Payments Class Feb 19

7 - 23Copyright © 2001 by

Harcourt, Inc. All rights reserved

Network Architecture of SET System

Merchant

Certificate authority

Payment gateway/ Acquirer Internet

Authorization and Capture

Existing financial network

Authorization and Capture

Issuer

Cardholder

Payment/Inquiry

Page 24: E Payments Class Feb 19

7 - 24Copyright © 2001 by

Harcourt, Inc. All rights reserved

Digital Certificate System for SET

Root CA

Brand CA(e.g Visa

or Master)

Geopolitical CA(e.g. Visa Asia)

Merchant CA Cardholder CA Payment gateway CA

User level CA

Page 25: E Payments Class Feb 19

7 - 25Copyright © 2001 by

Harcourt, Inc. All rights reserved

Steps in Generation of a Dual Signature

Step 1: Find the message digest of OI and PI

Step 2:Concatenate H[OI] and H[PI] and find the message digest

Step 3:Encrypt HPIOI with cardholder’s private signature key (using RSA encryption)

OI PI

H[OI] H[PI]

HPIOI = H[H[PI] || H[OI]]

Dual SignatureCardholder’s private signature key

Reference: W. Stallings, Cryptography and Network Security, Prentice Hall, 1999.

Page 26: E Payments Class Feb 19

7 - 26Copyright © 2001 by

Harcourt, Inc. All rights reserved

Generation of a Digital Envelope

DigitalEnvelope

DESEncryption

RSAEncryption

keyrandom

MEncrypted by keyrandom

Encrypted by keypublic_exchange,VBS

keyrandom

keypublic_exchange,VBS

M

Page 27: E Payments Class Feb 19

7 - 27Copyright © 2001 by

Harcourt, Inc. All rights reserved

General SET Information Flow

(5) Authorization request

(6) Authorization response

(7) Capture request

(2) Purchase initialization response(1) Purchase initialization request

(3) Purchase request

(4) Purchase response

Inquiry request (optional)

Inquiry response (optional)

Merchant

(8) Capture response

CardholderAcquirer(Payment Gateway)

Acquirer(Payment Gateway)

Page 28: E Payments Class Feb 19

7 - 28Copyright © 2001 by

Harcourt, Inc. All rights reserved

Securing Transactions• Security Issues• Encryption and Signing

–Private Key Encryption–Public Key Encryption

• SET and SSL• Internet Security

Page 29: E Payments Class Feb 19

7 - 29Copyright © 2001 by

Harcourt, Inc. All rights reserved

Security Issues• The openness of the Internet makes

security more difficult• Computer technology can be used to

attack the Internet• Many people worry about the safety of

transactions on the Internet/Web• Need to control access to

Page 30: E Payments Class Feb 19

7 - 30Copyright © 2001 by

Harcourt, Inc. All rights reserved

Encryption• Encryption is as old as writing• Sensitive information needs to be remain

secure• Critical to electronic commerce• Encryption hides the meaning of a

message• Decryption reveals the meaning of an

encrypted message

Page 31: E Payments Class Feb 19

7 - 31Copyright © 2001 by

Harcourt, Inc. All rights reserved

Securing Transactions

Public Key Encryption

SenderSender ReceiverReceiverEncrypt Decrypt

Receiver’sPublic

Key

Receiver’sPrivate

Key

Page 32: E Payments Class Feb 19

7 - 32Copyright © 2001 by

Harcourt, Inc. All rights reserved

Securing Transactions

Signing with Public Key System

SenderSender ReceiverReceiverSign Verify

Sender’sPublicKey

Sender’sPrivate

Key

Page 33: E Payments Class Feb 19

7 - 33Copyright © 2001 by

Harcourt, Inc. All rights reserved

Secure Electronic Transaction (SET)

• Backed by Visa and MasterCard• Based on cryptography and digital

certificates• Digital certificates uniquely identify the

parties to a transaction– An electronic credit card– Registries for authentication

• A digital signature is used to guarantee a sender’s identity

Page 34: E Payments Class Feb 19

7 - 34Copyright © 2001 by

Harcourt, Inc. All rights reserved

• Developed by Visa and MasterCard• Designed to protect credit card

transactions• Confidentiality: all messages encrypted• Trust: all parties must have digital

certificates• Privacy: information made available only

when and where necessary

Page 35: E Payments Class Feb 19

7 - 35Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

Participants in the SET System

Page 36: E Payments Class Feb 19

7 - 36Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

SET Business Requirements• Provide confidentiality of payment and

ordering information• Ensure the integrity of all transmitted

data• Provide authentication that a cardholder

is a legitimate user of a credit card account

• Provide authentication that a merchant can accept credit card transactions through its relationship with a financial institution

Page 37: E Payments Class Feb 19

7 - 37Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

SET Business Requirements (cont’d)

• Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction

• Create a protocol that neither depends on transport security mechanisms nor prevents their use

• Facilitate and encourage interoperability among software and network providers

Page 38: E Payments Class Feb 19

7 - 38Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

SET Transactions

Page 39: E Payments Class Feb 19

7 - 39Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

SET Transactions

• The customer opens an account with a card issuer.– MasterCard, Visa, etc.

• The customer receives a X.509 V3 certificate signed by a bank.– X.509 V3

• A merchant who accepts a certain brand of card must possess two X.509 V3 certificates.

– One for signing & one for key exchange

• The customer places an order for a product or service with a merchant.

• The merchant sends a copy of its certificate for verification.

Page 40: E Payments Class Feb 19

7 - 40Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

SET Transactions

• The customer sends order and payment information to the merchant.

• The merchant requests payment authorization from the payment gateway prior to shipment.

• The merchant confirms order to the customer.• The merchant provides the goods or service to the

customer.• The merchant requests payment from the payment

gateway.

Page 41: E Payments Class Feb 19

7 - 41Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

Key Technologies of SET

• Confidentiality of information: DES• Integrity of data: RSA digital signatures

with SHA-1 hash codes• Cardholder account authentication: X.509v3

digital certificates with RSA signatures • Merchant authentication: X.509v3 digital

certificates with RSA signatures• Privacy: separation of order and payment

information using dual signatures

Page 42: E Payments Class Feb 19

7 - 42Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

Dual Signature for SET

• Concept: Link Two Messages Intended for Two Different Receivers:– Order Information (OI): Customer to Merchant– Payment Information (PI): Customer to Bank

• Goal: Limit Information to A “Need-to-Know” Basis:– Merchant does not need credit card number.– Bank does not need details of customer order.– Afford the customer extra protection in terms of privacy

by keeping these items separate.• This link is needed to prove that payment is intended for this

order and not some other one.

Page 43: E Payments Class Feb 19

7 - 43Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

Why Dual Signature?

• Suppose that customers send the merchant two messages:• The signed order information (OI).• The signed payment information (PI).• In addition, the merchant passes the payment

information (PI) to the bank.• If the merchant can capture another order information (OI)

from this customer, the merchant could claim this order goes with the payment information (PI) rather than the original.

Page 44: E Payments Class Feb 19

7 - 44Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

Dual Signature Operation

• The operation for dual signature is as follows:– Take the hash (SHA-1) of the payment and order information.– These two hash values are concatenated [H(PI) || H(OI)] and then the

result is hashed.– Customer encrypts the final hash with a private key creating the dual

signature.

DS = EKRC [ H(H(PI) || H(OI)) ]

Page 45: E Payments Class Feb 19

7 - 45Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

DS Verification by Merchant

• The merchant has the public key of the customer obtained from the customer’s certificate.

• Now, the merchant can compute two values:H(PIMD || H(OI))DKUC[DS]

• Should be equal!

Page 46: E Payments Class Feb 19

7 - 46Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

DS Verification by Bank

• The bank is in possession of DS, PI, the message digest for OI (OIMD), and the customer’s public key, then the bank can compute the following:

H(H(PI) || OIMD)DKUC [ DS ]

Page 47: E Payments Class Feb 19

7 - 47Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

What did we accomplish?

• The merchant has received OI and verified the signature.• The bank has received PI and verified the signature.• The customer has linked the OI and PI and can prove the linkage.

Page 48: E Payments Class Feb 19

7 - 48Copyright © 2001 by

Harcourt, Inc. All rights reserved

SET EncryptionRequest is Sent toE-commerce Server

E-Commerce ServerVerifies Transaction

Purchaseis Requested

MerchantSends Recordto Bank

Transactionis Approved Bank Credits

Merchant’s Account

Secure Electronic Transmission (SET)

Page 49: E Payments Class Feb 19

7 - 49Copyright © 2001 by

Harcourt, Inc. All rights reserved

Secure Sockets Layer (SSL) • Created by Netscape for secure message

transmission. • Uses public-key encryption• Browser is the client• Netscape servers can be enabled for SSL• Other servers can be enabled by installing

the Netscape SSLRef program library

Page 50: E Payments Class Feb 19

7 - 50Copyright © 2001 by

Harcourt, Inc. All rights reserved

SET Components• Cardholder wallet• Merchant server• Payment gateway

Page 51: E Payments Class Feb 19

7 - 51Copyright © 2001 by

Harcourt, Inc. All rights reserved

The SET process• Certificate authority• Computerworld quick study

– http://www2.computerworld.com/home/features.nsf/all/980629qs

Page 52: E Payments Class Feb 19

7 - 52Copyright © 2001 by

Harcourt, Inc. All rights reserved

SET pros and cons• Merchant cannot decipher credit card

details• SSL is well-established and simpler

Page 53: E Payments Class Feb 19

7 - 53Copyright © 2001 by

Harcourt, Inc. All rights reserved

SMU CSE 5349/7349

SET Overhead

Simple purchase transaction:• Four messages between merchant and customer• Two messages between merchant and payment gateway• 6 digital signatures• 9 RSA encryption/decryption cycles• 4 DES encryption/decryption cycles• 4 certificate verifications

Scaling:• Multiple servers need copies of all certificates

Page 54: E Payments Class Feb 19

7 - 54Copyright © 2001 by

Harcourt, Inc. All rights reserved

Overview of E-cash• What are the two distinctive characteristics for cash?

– Anonymity and transferability• Ecash was developed by DigiCash and is now provided

by ecashtechnologies (http://www.ecashtechnologies.com)

• Its founder David Chaum is a well known expert in the area of digital cash.

• Ecash allows anonymous and secure electronic cash payment over the Internet.

• Since 1995, Mark Twain bank (USA) has been providing Ecash services.

• Ecash is based on an innovative blind signature method.

Page 55: E Payments Class Feb 19

7 - 55Copyright © 2001 by

Harcourt, Inc. All rights reserved

Basic Operation of E-cash system

Pay by the coins

Check the validity of the coins and whether they have been spent and credit the account accordingly

Debit the account and sign the blinded coins

Send the blinded coins to the bank

Return the signed blinded coins

Deposit the coins

Confirm the deposit

Ship goods or perform the service

Generate the blinded coins

Unblind the coins

Customer Bank VBS (Merchant)

Page 56: E Payments Class Feb 19

7 - 56Copyright © 2001 by

Harcourt, Inc. All rights reserved

• A smart card is about the size of a credit card, made of a plastic with an embedded microprocessor chip that holds important financial and personal information. The microprocessor chip is loaded with the relevant information and periodically recharged.

• In addition to these pieces of information, systems have been developed to store cash onto the chip. The

Page 57: E Payments Class Feb 19

7 - 57Copyright © 2001 by

Harcourt, Inc. All rights reserved

• The money on the card is saved in an encrypted form and is protected by a password to ensure the security of the smart card solution. In order to pay via smart card it is necessary to introduce the card into a hardware terminal.

Page 58: E Payments Class Feb 19

7 - 58Copyright © 2001 by

Harcourt, Inc. All rights reserved

• The device requires a special key from the issuing bank to start a money transfer in either direction. Smart cards can be disposable or rechargeable.

• A popular example of a disposable smart card is the one issued by telephone companies.

• After using the pre-specified amount, the card can be discarded

Page 59: E Payments Class Feb 19

7 - 59Copyright © 2001 by

Harcourt, Inc. All rights reserved

Page 60: E Payments Class Feb 19

7 - 60Copyright © 2001 by

Harcourt, Inc. All rights reserved

Schematic overview of a smart card

A Smart Card

RAM I/O

CPU

ROM EPROM

Microchip with mechanical contacts

Page 61: E Payments Class Feb 19

7 - 61Copyright © 2001 by

Harcourt, Inc. All rights reserved

Internet Security• Use data access control• Fix Known Security Holes• System Administrator’s Role

–SATAN –NMap

• Computer Emergency Response Team (CERT)

Page 62: E Payments Class Feb 19

7 - 62Copyright © 2001 by

Harcourt, Inc. All rights reserved

Data access control• Controlling who has access

– However, goal is often to attract not restrict visitors

• Authentication mechanismsClass ExamplesPersonal memory Name, account number, passwordPossessed object Plastic card, key , IP addressPersonal characteristic Fingerprint, eyeprint, signature

Page 63: E Payments Class Feb 19

7 - 63Copyright © 2001 by

Harcourt, Inc. All rights reserved

Firewall• A device placed between an

organization’s network and the Internet• Monitors and controls traffic between the

Internet and Intranet• Approaches

– Restrict packets to those with designated IP addresses

– Restrict access to applications

Page 64: E Payments Class Feb 19

7 - 64Copyright © 2001 by

Harcourt, Inc. All rights reserved

Internet SecurityFirewall Around Network

Page 65: E Payments Class Feb 19

7 - 65Copyright © 2001 by

Harcourt, Inc. All rights reserved

Internet Security• 4 Basic Firewall Actions

– Packet can be dropped entirely– Alert network administrator– Return failed message to sender– Action can be logged only

• IP Spoofing