07 SET Secure Electronic Transaction__ By Rupesh Jain

07 SET Secure Electronic Transaction__ By Rupesh Jain

2023年6月27日发(作者:)

SET Secure Electronic Transaction

Abstract

With the business of ecommerce booming, more and more sensitive transaction

information is being passed around on the web. Even using secure channel, Credit card

information are constantly at risk of being stolen from merchant side. The purpose of this

paper is to discuss salient features of Secure Electronic Transaction protocol to avoid this

problem.

Introduction

SET is a protocol designed to ensure that merchant and cardholders can conduct business

over insecure networks.

SET uses cryptography to provide confidentiality and security ,ensure payment integrity,

and authenticate both the merchant and the cardholder .this security means that merchants

are protected from purchases with an authorized payment card and can deny purchases to

cardholders are protected from merchant imposters or theft of their of their payment card

numbers.

SET Roles

The participants listed below plays an important role in a SET Transaction

Card Holder: The cardholder is analogous to the average person who uses a payment card

to purchase goods or services

Merchant: This is the business or organization who sells goods or services to the

cardholder in the case of a SET transaction over the internet.

Issuer: The issuer is a financial institution that provides the cardholder with payment

card. The issuer responsibility to guarantee payment on behalf of its cardholder.

Acquirer: The acquirer is the financial institution that processes payment card

authorizations and payment for the merchant. The acquirer’s responsibility is to obtain

payment authority from the cardholder’s issuer.

1Payment Gateway: A payment gateway is an institution that works on the behalf of the

acquirer to process the merchant’s payment messages, including payment instruction

from the cardholders. The gateway bridges communication between SET and the existing

credit card.

Certificate Authority: The certificate authority provides certification for the merchant,

cardholder, and payment gateway. Certification provides a means of assuring that the

parties involved in a transaction

• The diagram is from IBM ITSO Secure Electronic transactions

2SET Purchase Transaction

Fig shows what might happen in SET purchase transaction.

Card holder Merchant Gateway Certificate Authority

Certificate

Retrieval

Purchase

13

24

5

76

Authorization

98

10

Capture

11

12

13

Credit

SET Message

Non SET Message

Fig 1: Basic transaction flow

1) The gateway obtains the certificates it need from the certificate authority.

2) The merchant obtain from the certificate authority.

3) The cardholder obtains its certificates from the certificate authority.

34) The cardholder shops at the merchant’s shopping experience and decides what

goods or services he /she wishes to buy.

5) The merchant sends the cardholder certificates needed in the purchase transaction.

6) The cardholder sends a request to purchase the item that he/she has selected. This

message contains information about and the cardholders order and the

cardholder’s payment information – such as the cardholder’s card information.

The merchant gets the order information and sends the cardholder’s payment card

information onto the payment gateway. The merchant is never privy to the

cardholder’s payment information and therefore has no way of obtaining the

cardholder’s payment information payment card information. This security

measure is designed to protect the cardholder.

7) The merchant and payment gateway share authorization information. This

consists of the merchant sending the payment gateway information such as the

cardholder’s payment card information and the amount the transaction. The

payment gateway can either authorize or decline the transaction based on the

information received from the merchant later, no money changes hands during the

authorization phase.

8) The merchant sends a message to the cardholder ‘finalizing’ the transaction. The

card-holder sees this at the end of the transaction.

9) This step is optional but allows the merchant to change or eliminate money

authorized in step #7.

10) The merchant and the gateway share capture information. A request is send from

the merchant to the gateway to capture money that has been authorized- this

capture request can be for a single authorization amount or multiple amounts. The

gateway processes the capture request through its existing payment card financial

network.

11) If an error has occurred capturing cardholder funds, messaging between the

merchant and the gateway takes place in order to reverse the capture. This step is

optional and only happens if there has been a capture error has been occurred.

12) The merchant and payment gateway exchange messages in order to credit a

cardholder’s account.

413) If a credit has been granted by mistake the merchant and payment gateway can

exchange message in order to reverse the granted credit.

SET Software Components:

Each of the participants in the SET transaction uses a piece of software that works on

their behalf to perform transaction. Basically four participants can be involved: the

cardholder, the merchant, the certificate authority and the banking institutions.

The brief list of the software components

The Wallet – the front end for the cardholder

The Merchant Server – the merchant’s SET Software

The Certificate Authority – handles the SET participant’s certificates

The Gateway – bridges the merchant with its acquirer legacy systems

The Wallet:

A wallet is the cardholder’s SET application. If the cardholder wishes to purchase goods

or services from a SET-enabled merchant, he/she needs to have a wallet. The wallet

allows the card –holder to make secure payment card transactions over the internet using

SET protocol.

It is a plug –in program that is separate from your browser, but works in conjunction with

your browser to perform certain tasks. The wallet performs the task of handling the

cardholder’s SET purchase.

5

Fig 2- Software components of SET

The Merchant Server (POS):

Wallet

Internet

Financial

Networks

Certificate Authority

Certificate Authority

Gateway

Internet

Internet

Merchant Server

A merchant server, or point of sale (POS), is the merchant’s SET software –it is the link

between the merchant and the cardholders SET software, and the merchant and the

financial payment gateways.

6

SET Message

Non SET Message

Browser

4

5WalletMerchant

Server

34

12Merchant

Shopping

1) The cardholder browses the merchant’s shopping experience. The Web pages that

are part of the shopping experience present a ‘virtual catalog’ of goods and

services the merchant has for sale to the cardholder. The cardholder selects the

items that he/she wishes to purchase.

2) The cardholder selects to pay for the goods and services selected, usually by

clicking a ‘pay now’ button on a webpage.

3) The shopping experience informs the merchant server of the details of the

transaction.

4) The merchant server sends a message to the cardholder via the shopping

experience for starting the wallet.

75) The wallet and merchant server process the transaction according to the rules of

the set .At this point ,other entities start to get involved (the gateway , the

acquiring bank etc) but this is the beginning of the actual SET transaction

The Certification Authority

A certificate authority is responsible for issuing digital certificates serve to identify

participants in a SET transaction; therefore certificate authorities are responsible for

guaranteeing that the individuals or organizations that have the certificates are who claim

to be.

A certificate authority is generally a third party organization, and is not associated with

the other entities involved in the SET transaction. The certificate authority grants

certificates to the card holder (wallet), the merchant (merchant server), and the

merchant’s issuing bank (gateway).

SET uses Dual Signature

The purpose of the dual signature is to link two different recipients. In online transaction

1) The Order Information is send to the merchant.

2) The Payment Information is send to the Bank.

HPOMDPIPIMDKRcDual

Signature

HEOI ||

H

Fig 3: Construction of Dual Signature

OIMD

8 PI = Payment Information PIMD = PI message digest

OI = Order Information OIMD = OI message digest

H = Hash Function (SHA -1) POMD = Payment Order message digest

|| = Concatenation E = Encryption (RSA)

KRc = Customers private signature Key

As from the fig, the customer sends the merchant two messages – a signed OI and a

signed PI – and the merchant passes on to bank. To keep the OI and PI integrated, the

customer takes the hash (using SHA-1) of the PI and the hash of the OI. These two

hashes are then concatenated and the hash of the result is taken. Finally, the customer

encrypts the final hash with his or her private signature key, creating the dual signature.

DS=Ekrc[H(H(PI)||H(OI))]

Where krc is the customer’s private signature key

Case 1: Merchant is in possession of the dual signature, OI, the message digest for the PI

(PIMD) and the public key of the customer taken from customer certificate.

Using this merchant can compute the following two quantities:

H(PIMD||H(OI))andDkuc[DS]

Where kuc is the customer customer’s public signature key.

If these two quantities are equal then merchant has verified the signature.

Case 2:

Bank is in possession of the dual signature, PI, the message digest for the OI

(OIMD) and the public key of the customer taken from customer certificate.

Using this bank can compute the following two quantities

H(H(PI)||OIMD)andDkuc[DS]

If these two quantities are equal then the bank has verified the signature.

9

+

PI

E

+

Digital Envelope

Passed on

by

merchant

to

payment

tDual Signature

++

PIMD

E

+

OI

OIMD

KUb

+

Dual Signature

+

Cardholder Certificate

Request Message

Fig 5: Cardholder sends Purchase Request

All of the above items are encrypted with Ks. The final item is the

Digital envelope.

This

is formed by encrypting payment gateway public key-exchange key. Digital envelope

must be opened (decrypted) before the other items listed previously can be read. The

value of the Ks is not available to the merchant. Therefore the merchant cannot read any

of this payment related information.

Received by

merchant

10Request Message

+

Digital Envelope

Passed on

by

merchant

to

payment

t

+

POMD

H

|| ||

PIMD

+

OI

E OIMD

Compare

+

Dual Signature

D

POMD

+

Cardholder Certificate

KUc

Reference:

Fig 6:

Merchant verifies Customer Purchase Request

11

Reference:

1)

Section 17.3 Secure Electronic Transactions in Cryptography and Network

Security

2)

Using SET for Secure Electronic Commerce .Upper Saddle River

3)

IBM Red Book :Credit Card Payment on the web in theory and practice

12

发布者:admin,转转请注明出处:http://www.yc00.com/web/1687804640a46520.html

相关推荐

发表回复

评论列表(0条)

  • 暂无评论

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

关注微信