Web Enabled Business Process - 5
Web Enabled Business Process - 5
Notes
Structure:
5.1 Electronic Data Interchange (EDI)
5.1.1 The Business of EDI
5.2 EDI Hardware and Software
5.2.1 The Tools of EDI
5.2.2 EDI Standards
5.2.3 EDI without Standards
5.2.4 Development of Standards Committees
5.2.5 National and International Standards Bodies
5.3 EDI Software
5.4 EDI Hardware Platforms
5.5 Computer Networks
5.5.1 Characteristics of a Computer Network
5.5.2 Network Cables
5.5.3 Distributors
5.5.4 Router
5.5.5 Network Card
5.5.6 Universal Serial Bus (USB)
5.6 Web Servers
5.6.1 Web Server Architecture
5.7 Types of EPS
5.7.1 Credit Card
5.7.2 Debit Card
5.7.3 Smart Card
5.7.4 E-Money
5.7.5 Electronic Fund Transfer
5.8 PayPal
5.9 Summary
5.10 Check Your Progress
5.11 Questions and Exercises
5.12 Key Terms
5.13 Check Your Progress: Answers
5.14 Case Study
5.15 Further Readings
Objectives
After going through this unit, you should be able to know:
● What is EDI?
Notes
2. Business documents: These are any of the documents that are typically
exchanged between businesses. The most common documents exchanged via
EDI are purchase orders, invoices and advance ship notices. But there are
many, many others such as bill of lading, customs documents, inventory
documents, shipping status documents and payment documents.
3. Standard format: Because EDI documents must be processed by computers
rather than humans, a standard format must be used so that the computer will
be able to read and understand the documents. A standard format describes
what each piece of information is and in what format (e.g., integer, decimal,
mm-dd-yy). Without a standard format, each company would send documents
using its company-specific format and, much as an English-speaking person
probably doesn’t understand Japanese, the receiver’s computer system
doesn’t understand the company-specific format of the sender’s format.
● There are several EDI standards in use today, including ANSI, EDIFACT,
TRADACOMS and ebXML. And, for each standard, there are many
different versions, e.g., ANSI 5010 or EDIFACT version D12, Release A.
When two businesses decide to exchange EDI documents, they must
agree on the specific EDI standard and version.
● Businesses typically use an EDI translator – either as in-house software or
via an EDI service provider – to translate the EDI format so the data can
be used by their internal applications and thus enable straight through
processing of documents.
3. Business partners: The exchange of EDI documents is typically between two
different companies, referred to as business partners or trading partners. For
example, Company A may buy goods from Company B. Company A sends
orders to Company B. Company A and Company B are business partners.
Opportunities
This revolution in hardware speed, power and flexibility, combined with an
increasingly robust selection of high-quality software products allows business to get a
substantially higher return for each dollar they invest in computer technology. It has
allowed business to solidify the information needs of their internal processes.
Even with dramatic improvements in internal processes, progress can come to a
screeching halt if the supply and distribution chain is not similarly enhanced. So as the
internal processes have been put under control, it has also forced management to focus
on opportunities in their customer and supplier relationships – the areas of traditional EDI
are ignored.
So, the revolution in computer technology has led to another revolution: the
replacement of dictatorial or adversarial relationships between customers and suppliers,
with information partnerships. In fact, for some time in the lexicon of EDI, two businesses
engaged in electronic trading of information have been referred to as “trading partners”.
The problem was that it took management a long time to realize that partnership had
to extend much further than just agreeing to trade electronic versions of paper
documents. By breaking down the adversarial barriers between vendors and customers,
another order of magnitude increase in speed and flexibility could be introduced.
The true value of EDI, and the significant return on the technology investment,
comes when business can begin to trade or share core information. The traditional
scenario of EDI implementation painted a picture where commonly used paper
documents were replaced by electronic versions of the same documents. Purchase
orders, shipment notifications, invoicing, and accounts payable began to participate in
the process.
Now, visualize the same scenario between a hypothetical distributor of automotive
parts, called Fast Part, and its retail outlets and suppliers.
Fast Part receives regular daily updates from all of its retailer outlets, transmitted
directly from the Point of Sale registers. An up-to-the-minute inventory balance for its
retail stores and distribution warehouses is maintained. On a nightly basis, inventory
consumption of each supplier’s products is transmitted directly to the manufacturers.
The manufacturer of a key component reviews the inventory consumption and
identifies an increase in demand in one region. Accordingly, they adjust their production
schedules at a local plant to meet that demand. At the same time, they electronically
schedule transportation to pick up shipments and notify their Fast Part of expected
shipping dates, quantities, and carriers.
For larger shipments, the manufacturer has agreed to ship directly to the retail outlet,
rather than to Fast Part’s distribution centers. As the item is produced, some of it is
packaged as per the specifications for shelf-stocking and labelling specifications, while
Notes
other portions of the shipment are packaged for bulk storage. As each shipment is loaded
onto the carrier, the containers are scanned or otherwise automatically identified to verify
the accuracy of the order. Shipping documents are then transmitted to Fast Part, and an
electronic invoice is sent.
As Fast Part receives the electronic shipment notification, warehouse, routing
tickets for the material are prepared in advance. Some material will be identified as
needed for immediate shipment, and in order to expedite movement of this material,
shipping labels will already be prepared, and outbound shipments will be scheduled.
When the shipment is received, it is scanned and routed automatically. Material
scheduled for shipment is cross-docked, and the rest is delivered to pre-assigned
inventory locations. Inventory is automatically updated, and the receipt triggers a
payment authorization, which is sent to the central office. When the authorization is
matched with the electronic invoice, an automatic funds transfer is authorized.
One must keep in mind that in the scenario described above; Fast Part is both a
customer and a supplier. So on the outbound side of the process, moving material from
the distribution center to the retail outlets; Fast Part can apply the same steps.
As Fast Part receives Point of Sale information, it will automatically schedule
replenishment of the inventory consumed. Rather than shipping in “replenishment units”
based on each store’s basic operation shelf-stock quantity, Fast Part will replace exact
quantities, adjusting them based on known inventory trends.
Shipment notifications will be sent to the retail outlets, and in the same manner that
the vendors drop-shipped to retail outlets, the distribution center can place orders for
large customers that can be shipped directly to the customer.
All of these steps are achievable and go a long way to defining the current
environment of Electronic Commerce using EDI as an enabling technology.
This example has used a basic vendor/distributor/customer relationship. Another
example from the food brokerage industry serves to highlight the changes this enabling
technology has made possible, and the extent to which document trading partnerships
have become true business partnerships:
● A manufacturer receives a large order and makes adjustments to their master
production schedule. The production schedule updates for key components are
sent to the vendors. The vendors adjust their own production schedules and
confirm shipping dates and quantities to support the manufacturer’s new
production schedule. During the manufacturing process, product defect data is
collected and transmitted to the vendor on a daily basis, allowing the vendor to
keep its process within the required statistical limits for free-to-stock
certification of the material.
● A customer in a retail outlet asks about an out-of-stock item. From the cash
register, the clerk finds it in a store on the other side of town. Rather than ask
the customer to travel to the other store, the clerk reserves the material, and
schedules a delivery of the item that afternoon. Within minutes, the clerk
advises the customer that the item can be available at a specific time.
● A customer calls a frozen food delivery service and orders eight items, to be
delivered that afternoon. A delivery truck, already on its route can fill the order
with items already on the truck. With a small handheld unit, the driver calls up
the order, and a printed invoice is generated. When the driver returns to the
truck, the transaction is communicated to his office where a credit card
transaction is sent.
In the EDI language, a single business document, such as a purchase order, invoice
or advance ship notice, is called a “transaction set” or “message.” And, a transaction set
is comprised of data elements, segments and envelopes.
There are three steps to sending EDI documents: (1) Prepare the documents,
(2) Translate the documents into EDI format and (3) Transmit the EDI documents to your
partner.
build an EDI document. The sources of data and the methods available to generate the
Notes
electronic documents can include:
● Human data entry via screens
● Exporting PC-based data from spreadsheets or databases
● Reformatted electronic reports into data files
● Enhancing existing applications to automatically create output files that are
ready for translation into an EDI standard
● Purchasing application software that has built-in interfaces for EDI files
Step 3: Connect and transmit your EDI documents to your business partner
Once your business documents are translated to the appropriate EDI format, they
are ready to be transmitted to your business partner. You must decide how you will
connect to each of your partners to perform that transmission. There are several ways,
the most common of which include: (1) to connect directly using AS2 or another secure
internet protocol, (2) connect to an EDI Network provider (also referred to as a VAN
provider) using your preferred communications protocol and rely on the network provider
to connect to your business partners using whatever communications protocol your
partners prefer, or (3) a combination of both, depending on the particular partner and the
volume of transactions you expect to exchange.
Benefits of EDI
EDI continues to prove its major business value by lowering costs, improving speed,
accuracy and business efficiency. The greatest EDI benefits often come at
the strategic business level.
According to a recent research study from Forrester, EDI continues to prove its
worth as an electronic message data format. This research states that “the annual
volume of global EDI transactions exceeds 20 billion per year and is still growing.” For
buyers that handle numerous transactions, using EDI can result in millions of dollars of
annual savings due to early payment discounts. From a financial perspective alone, there
are impressive benefits from implementing EDI. Exchanging documents electronically
improves transaction speed and visibility while decreasing the amount of money you
spend on manual processes. But cost savings is far from the only benefit of using EDI.
But let’s start with cost savings anyway:
● Expenses associated with paper, printing, reproduction, storage, filing, postage
and document retrieval are all reduced or eliminated when you switch to EDI
transactions, lowering your transaction costs by at least 35%.
● A major electronics manufacturer calculates the cost of processing an order
manually at $38 compared to just $1.35 for an order processed using EDI.
● Errors due to illegible faxes, lost orders or incorrectly taken phone orders are
eliminated, saving your staff’s valuable time from handling data disputes
The major benefits of EDI are often stated as speed and accuracy:
Notes
● EDI can speed up your business cycles by 61%. Exchange transactions in
minutes instead of the days or weeks of wait time from the postal service.
● Improves data quality, delivering at least a 30-40% reduction in transactions
with errors—eliminating errors from illegible handwriting, lost faxes/mail and
keying and re-keying errors.
● Using EDI can reduce the order-to-cash cycle time by more than 20%,
improving business partner transactions and relationships.
However, the increase in business efficiency is also a major factor:
● Automating paper-based tasks allows your staff to concentrate on higher-value
tasks and provides them with the tools to be more productive.
● Quick processing of accurate business documents leads to less reworking of
orders, fewer stock outs and fewer cancelled orders
● Automating the exchange of data between applications across a supply chain
can ensure that business-critical data is sent on time and can be tracked in real
time. Sellers benefit from improved cash flow and reduced order-to-cash
cycles.
● Shortening the order processing and delivery times means that organizations
can reduce their inventory levels.
In many cases, the greatest EDI benefits come at the strategic business level:
● Enables real-time visibility into transaction status. This in turn enables faster
decision-making and improved responsiveness to changing customer and
market demands, and allows businesses to adopt a demand-driven business
model rather than a supply-driven one.
● Shortens the lead times for product enhancements and new product delivery.
● Streamlines your ability to enter new territories and markets. EDI provides a
common business language that facilitates business partner on boarding
anywhere in the world.
● Promotes corporate social responsibility and sustainability by replacing
paper-based processes with electronic alternatives. This will both save you
money and reduce your CO2 emissions.
options or requirements for software to collect data internally is outside the scope of this
Notes
study.
In-house Development
Definition, design and development of computer software are an expensive and
time-consuming process. The ready availability of commercial third-party packages will
generally dictate against the internal development of in-house translation packages,
since the annual cost of software licensing for third-party software will be substantially
less than the cost of developing and maintaining packages internally. In addition, the time
required for internal software development will extend appreciably the time it will take to
deploy an EDI package.
This does not say that internal development is out of the question. There may be
compelling reasons for developing a translation package internally. If the Fast Part
Company owned or controlled its distribution and retail outlets, it could be cost-effective
to create a customized EDI package tailored specifically to the company’s distribution
needs. The major drawback to such an approach is that implementation of new
transaction types will require additional development not only within the internal systems,
but within the EDI translation software.
Custom Packages
If Fast Part wished to introduce EDI into their supplier relationships but found that a
large number of their vendors had no EDI capability, an effective way for Fast Part to gain
a high level of subscription might be to provide a low-cost customized translation
package to those customers which contained only those transaction sets that Fast Part
wished to utilize. If Fast Part wished to add new transaction sets, these could be provided
to partners as upgrades, or as low-cost enhancements, on a per-transaction basis.
This option can also prove to be cost-effective for a company that is already fully
committed to trading partnerships with its major suppliers, but is having difficulty
achieving complete coverage with the smaller suppliers. The cost to Fast Part might be
justifiable if it allowed them to convert a small handful of remaining traditional suppliers to
electronic relationships. As Fast Part becomes more and more committed to exclusively
electronic partnerships, the cost of retaining tradition suppliers will increase, and it might
at that point be cost-effective to offer such a packaged option to its traditional suppliers
as an encouragement to covert.
Integrated Solutions
If Fast Part is purchasing software to upgrade their information management
systems, management should certainly include EDI capability as an important point in
their evaluation criteria. They should look for packages that already contain an EDI
translation module, or at minimum, provided for preparing output files for a translation
module from a third party. Any EDI capability should meet not only current but planned
needs. If the Fast Part MIS department has to go back to the software vendor with a
costly enhancement request every time a new EDI process is added, they will find their
expansion requirements needlessly constrained both by cost and by the developer’s
schedule.
Personal Computers
The business seeking to implement EDI for the first time probably already has a PC
that can be used to run an EDI translation package and communications software. In
addition, even if such hardware is either not available, or is outdated, it can be obtained
at a relatively small cost. The principal requirements for installing most PC-based
packages are not any more demanding than today’s word processing or spreadsheet
packages.
Proprietary Systems
For companies that remain committed to a specific hardware platform, how limited
their EDI choices are will be determined by the specific hardware. If the hardware
manufacturer has a fairly large market presence, the chances are good that a package
can be found to run on that hardware. But if the hardware platform is one for which there
Notes
is little commercial software available, the selection is likely to be very limited.
For software packages designed specifically for proprietary hardware, the price tag
is likely to be significantly higher than for an equivalent package designed for a UNIX
workstation, because of the more limited market and the more specialized technical
expertise required. Also this disparity can be expected to grow, because as RISC-based
open systems computers have gained popularity. Many software vendors are turning
from strictly proprietary software to development of packages that will run under the UNIX
operating system on a variety of RISC platforms with only minor modifications and
differences.
RISC/UNIX Systems
RISC (Reduced Instruction Set Computing) computers, because of their power,
have put mainframe computing in a PC-sized package. They have gained popularity for
client-server applications where a local PC will contain a software package that access
remote databases.
Another feature of the RISC/UNIX systems is their “open architecture” design. Open
Architecture for the EDI user means that the data on the system can be much more
easily shared with software on other platforms through standardized file access
protocols.
These UNIX systems are available in a wide range of configurations that span the
performance spectrum. At the low end, the platforms are comparable in power to the
larger PCs, with the added advantage of supporting multiple users. At the high end, they
compare favourably to mainframe capability.
This has helped companies that previously had difficulty finding third party packages.
With widely available UNIX based packages, EDI solutions can be easily integrated into
their existing hardware environment.
EDI Communications
The last major component of the EDI tool set is communication capability. This
aspect of EDI has evolved from one of the most unmanageable and complex to one of
the easiest to cope with. Where the EDI trading partner is faced with too many choices in
the areas of software and hardware, the evolution of the “Value Added Network” or VAN
service industry has greatly simplified the range of reasonable choices for
telecommunications options and other Electronic Commerce capabilities.
Early pioneers in EDI were faced with technically complicated and costly choices
when it came to communicating their trading partners. So, early use of EDI tended to be
within rather than between companies, and was limited to those who could afford to
develop and maintain extensive internal electronic networks.
Proprietary Networks
Let’s examine a slightly different scenario where Fast Part is the company
promoting EDI. In this situation, assume that Fast Part already has a fairly extensive
private network in place for exchanging data with their retail outlets. If they wish to
encourage suppliers to link electronically with them, they understand that they must
provide some sort of assistance to many of their suppliers.
Fast Part chooses to integrate their suppliers into their private network. While this
may seem at first glance to be a sound option, Fast Part will probably be in for a rude
awakening as they discover some of the drawbacks of maintaining a service network for
their suppliers.
● Cost: The cost maintaining and supporting the network will fall largely on Fast
Part. They can pass on only a limited portion of the actual cost of the network.
● Security: By allowing access to their private network, Fast Part must develop
sophisticated security controls to prevent users from entering their systems
and obtaining critical data.
● Maintenance: Fast Part must now be able to provide network support to a
much larger number of users. As their business turns more and more to
electronic information exchange, the viability of their business depends more
heavily on the availability of the network.
● Redundancy: While it might be possible for Fast Part retailers to be cut off
because of a network failure, they cannot now afford the possibility that paying
customers will be without service. A network failure could result in lost business,
so redundancy must be built in. Also, now Fast Part must be in the business of
providing customer service to their suppliers.
Value-added Networks
Fortunately, Fast Part has a viable and cost-effective alternative to either of the two
examples described above. The solution lies in the Value-added Network, which grew
directly out of the growth of private networks. Some companies that developed large
internal networks saw the potential market opportunity in providing such services to
external customers. This opportunity developed into a unique service industry – the
“Value-added Network” service provider, or VAN.
What would have become a serious overhead burden to the Fast Part Company as
it extended its private network becomes an asset to the user of the VAN.
● Cost: The cost of using a VAN is relatively cheap. While billing methodologies
differ from one VAN to another, subscribers will typically pay per-transaction
charges, and a pro-rated charge based on data volume. While it is somewhat
more expensive than postage, a cost-benefit analysis that figures in reduced
handling costs and the cost-avoidance of alternate methods of network
communication will certainly find that VAN services are reasonably priced.
● Security: Security is provided, because access to a VAN allows the user to
send and receive information only to and from their own electronic mailbox.
The VAN handles all transfer of information from the sender’s mailbox into the
receiver’s mailbox, isolating the two entities completely. Fast Part need have
no concerns that a supplier will gain access to their systems and be able to
Notes
electronically snoop through their internal data files.
● Maintenance and redundancy: Fast Part does not have to worry about any
network maintenance. If a telephone line is down, either the VAN or the phone
company will provide alternative service.
● Accountability: By subscribing to the service of a VAN, Fast Part will be able
to quantify explicitly their networking costs. While billing services vary, most
VANs provide detailed breakdowns of billing charges, in much the same way
that credit card companies provide similar services to their corporate accounts.
● Additional benefits: VANs can also provide ‘on the network’ translation when
EDI software is too expensive or unavailable. The support of experienced EDI
VAN personnel, both for implementation and continuing operations should not
be minimized. Full service EDI and Electronic Commerce specialists such as
GE Information Services provide extensive capabilities and support on a global
basis for their customers.
Implementing EDI
This review of EDI has stressed the numerous advantages of employing electronic
data interchange in a wide range of business activities. This section will provide an
overview of the major requirements for EDI implementation, with some observations
about some land mines that can be avoided along the way.
Implementing EDI in a business need not be difficult, and the benefits can be
substantial. To assure success, there are several key areas where some understanding
and advanced planning is required. Recognizing some of the potential pitfalls and
avoiding them, especially with an initial implementation, will go a long way toward
assuring success.
Define a Strategy
It is important from the outset to understand that EDI is a tool. It is not a panacea. As
a company’s management team begins to plan its EDI strategy, a careful assessment of
the problems the company wishes to address is critical. Such a review can help to insure
that applying an EDI solution will actually contribute to solving problems and rather
symptoms.
Without a strategic analysis, it is very easy to solve the wrong problem. If Fast Part
successfully implements a project that reduces retail order processing time from days to
hours, but has failed to understand that reducing delivery time from weeks to days is the
real problem, the benefits of the improvement will go unnoticed. Or, worse yet, the effort
put into an EDI implementation will be written off as a bad investment, and further
implementations may be curtailed or eliminated.
Plan Carefully
Much of the work of planning and implementation can be eased if objectives have
been carefully defined. Implementing a company-wide comprehensive EDI solution
cannot be integrated into the existing framework of a company’s business in one step. It
Notes
must be applied carefully, step by step.
An important aspect of implementation planning is involving all concerned parties at
all steps of the project. Good communication is essential, so that newly installed EDI
capabilities will change the way business is done, not disrupt it.
One of the most valuable ways of providing good communication and project
management is to define an EDI coordinator’s position. This position should be filled by
an individual with strong knowledge of both the business requirements being addressed,
and the technical requirements of EDI.
A critical step in implementation planning is the testing process. Before users are
actually committed to depending on their new EDI function, they must be comfortable that
the process actually works reliably, all the time. This must be proven beyond doubt by
carefully constructed testing and validation procedures. In most cases, since data is
being transferred to another trading partner, it will be necessary to assure both internal
and external users that correct information is being traded.
Training
Most companies understand that training is an integral part implementing any new
process or procedure in their business. EDI is no exception. Training will be required in
the user community because job functions will change, sometimes dramatically. Training
may be required in several different areas:
● General understanding of EDI. This training should be developed early, since
unless a company already has an investment in EDI, it is critical that
employees learn what to expect of the process.
● Technical hardware and software training. If new hardware is being
acquired, technical and operational support training may be needed. Vendors
may offer a variety of training options, either as a part of the purchase cost, or
as an extra adder. Such vendor-supplied training may range from limited
“train-the-trainer” programs, to extensive on-site user training.
● User training for certification in new procedures. If sufficient in-house
expertise is available, such training, particularly in the area of user certification,
can and probably should be done internally. Many industry experts and
consulting groups provide such training, and it should be tailored to the specific
needs of the company.
Notes
5.5.4 Router
A router is a type of device which acts as the central point among computers and
other devices that are part of a network. A router is equipped with holes called ports and
computers and other devices are connected to a router using network cables. Nowadays,
router comes in wireless modes using which computers can be connected without any
physical cable.
Notes
When you register a web address, also known as a domain name, such as
tutorialspoint.com, you have to specify the IP address of the web server that will host the
site. You can load up with Dedicated Servers that can support your web-based
operations.
There are four leading web servers − Apache, IIS, lighttpd and Jagsaw. Now, we will
see these servers in bit more detail.
Apart from these Web Servers, there are other Web Servers also available in the
Notes
market but they are very expensive. Major ones are Netscape’s iPlanet, Bea’s Web Logic
and IBM’s WebSphere.
lighttpd
The lighttpd, pronounced lightly is also a free web server that is distributed with the
FreeBSD operating system. This open source web server is fast, secure and consumes
much less CPU power. Lighttpd can also run on Windows, Mac OS X, Linux and Solaris
operating systems.
You can have detailed information about this server at lighttpd.
Jigsaw Server
Notes
Jigsaw (W3C’s Server) comes from the World Wide Web Consortium. It is open
source and free and can run on various platforms like Linux, UNIX, Windows, and Mac
OS X Free BSD, etc. Jigsaw has been written in Java and can run CGI scripts and PHP
programs.
pay the credit card bill. It is usually credit card monthly payment cycle. Following are the
Notes
actors in the credit card system.
Ɣ The card holder – customer
Ɣ The merchant – seller of product who can accept credit card payments
Ɣ The card issuer bank – card holder’s bank
Ɣ The acquirer bank – the merchant’s bank
Ɣ The card brand – for example, Visa or Mastercard.
5.7.4 E-Money
E-Money transactions refer to situation where payment is done over the network
and amount gets transferred from one financial body to another financial body without
Internet
Online payments involve the customer transferring money or making a purchase
online via the internet. Consumers and businesses can transfer money to third parties
from the bank or other account, and they can also use credit, debit and prepaid cards to
make purchases online.
Current estimates are that over 80% of payments for online purchases are made
using a credit card or debit card. At present, most online transactions involve payment
with a credit card. While other forms of payment such as direct debits to accounts or
prepaid accounts and cards are increasing, they currently represent a less developed
Notes
transaction methodology.
Mobile Payments
Mobile phones are currently used for a limited number of electronic transactions.
However, the percentage seems likely to increase as mobile phone manufacturers
enable the chip and software in the phone for easier electronic commerce.
Consumers can use their mobile phone to pay for transactions in several ways.
Consumers may send an SMS message, transmit a PIN number, and use WAP to make
online payments, or perform other segments of their transaction with the phone. As
phones develop further, consumers are likely to be able to use infrared, Bluetooth and
other means more frequently to transmit full account data in order to make payments
securely and easily from their phone.
Additionally, merchants can obtain an authorization for a credit or debit card
transaction by attaching a device to their mobile phone. A consortium in the US also
recently announced Power Swipe, for example, which physically connects to a Nextel
phone, weighs 3.1 ounces, and incorporates a magnetic stripe reader, infrared printing
port, and pass-through connector for charging the handset battery.
Biometric Payments
Electronic payments using biometrics are still largely in their infancy. Trials are
underway in the United States, Australia and a limited number of other countries. Most
biometric payments involve using fingerprints as the identification and access tool,
though companies like Visa International are piloting voice recognition technology and
retina scans are also under consideration. Essentially, a biometric identifier such as a
fingerprint or voice could replace the plastic card and more securely identifies the person
undertaking the transaction. The electronic payment is still charged to a credit card or
other account, with the biometric identifier replacing the card, check or other transaction
mechanism.
EBPP
Notes
EBPP is essentially the same thing as electronic billing. With this system, a
company will send an electronic statement to a customer. For example, this is common
with utility providers or mortgage lenders. Instead of sending a paper bill, the company
will send an e-mail to a customer. At that point, the customer will then look at the bill by
checking their e-mail or logging into a secure website. Once the customer has reviewed
the bill, they can then make a payment in the appropriate amount to the biller.
Two Types of Electronic Bill Presentment and Payment
There are two main types of electronic bill presentment and payment that are
commonly used in the industry today. The first type of electronic bill presentment and
payment is referred to as a biller-direct system. This system is commonly used with utility
companies today. For example, the utility company will send an electronic bill to the
customer and the customer will make a payment directly to the company. There is no
intermediary used in this transaction.
The other type of electronic bill presentment and payment is known as the
bank-aggregator strategy. With this strategy, an individual works with a bank in order to
make electronic payments to multiple billers simultaneously. This is often referred to as
online banking or online bill pay. With this system, an individual will log into an online
bank account and specify the amount and date of a payment. Typically, the consumer will
have all of the bills that they regularly pay set up in the online banking system. At that
point, the individual can then simply log into an account, select the payments that need to
be made and then press submit. The bank will then handle sending all the payments to
the appropriate places. Some banks will send out these payments immediately, while
others take a little bit more time. In fact, some banks may take anywhere from 3 to 5 days
to send out these payments to the appropriate places.
NACHA
NACHA stands for National Automated Clearing House Association. This is an
organization that helps set the standards for the Automated Clearing House. The
Automated Clearing House or ACH is the system that is commonly used to distribute
electronic payments in the banking industry. This organization works to help prevent
fraud with this type of billing and payment system. Financial institutions generally follow
the guidelines that are set by NACHA.
VeriSign
VeriSign Inc. is an American company based in Reston, Virginia, United States that
operates a diverse array of network infrastructure, including two of the Internet’s thirteen
root name servers, the authoritative registry for the .com, .net, and .name generic
top-level domains and the .cc and .tv country-code top-level domains, and the back-end
systems for the .jobs, .gov, and .edu top-level domains. VeriSign also offers a range of
security services, including managed DNS, Distributed Denial of Service (DDoS)
mitigation and cyber-threat reporting.
In 2010, VeriSign sold its authentication business unit – which included SSL
certificate, PKI, VeriSign Trust Seal, and VeriSign Identity Protection (VIP) services – to
Symantec for $1.28 billion. The deal capped a multi-year effort by VeriSign to narrow its
focus to its core infrastructure and security business units.
VeriSign’s former CFO Brian Robins announced in August 2010 that the company
would move from its original location of Mountain View, California, to Dulles in Northern
Virginia by 2011 due to 95% of the company’s business being on the East Coast.
5.8 PayPal
PayPal Holdings Inc. is an American company operating a worldwide online
payments system. Online money transfers serve as electronic alternatives to traditional
paper methods like checks and money orders. PayPal is one of the world’s largest
internet payment companies. The company operates as an acquirer, performing payment
processing for online vendors, auction sites and other commercial users, for which it
charges a fee.
Established in 1998, PayPal had its IPO in 2002, and became a wholly owned
subsidiary of eBay later that year. In 2014, PayPal moved $228 billion in 26 currencies
across more than 190 nations, generating total revenue of $7.9 billion (44% of eBay’s
total profits). The same year, eBay announced plans to spin-off PayPal into an
independent company by mid-2015 and was complete on July 18, 2015.
Services
As of 2015, PayPal operates in 203 markets and has 159 million active, registered
accounts. PayPal allows customers to send, receive, and hold funds in 26 currencies
worldwide.
PayPal’s services allow people to make financial transactions online by granting the
ability to transfer funds electronically between individuals and businesses. Through
PayPal, users can send or receive payments for online auctions on websites like eBay,
purchase or sell goods and services, or donate money or receive donations. It is not
necessary to have a PayPal account to use the company’s services. PayPal launched
Student Accounts for teenagers in August 2009, allowing parents to set up a student
account, transfer money into it, and obtain a debit card for student use. The program
provides tools to teach how to spend money wisely and take responsibility for actions. In
November 2009, PayPal opened its platform, allowing other services to get access to its
Notes
code and to use its infrastructure in order to enable peer-to-peer online transactions.
In 2008, PayPal acquired the online credit product Bill Me Later, which has since
been rebranded as PayPal Credit, and provides services for Community Capital Bank,
the lender of PayPal Credit accounts. Founded in 2000, Bill Me Later Inc. was acquired
by eBay Inc. in 2008, and is a PayPal company headquartered in Timonium, Maryland,
with additional offices in Hunt Valley, Maryland, Chandler, Arizona and San Francisco,
California. PayPal Credit offers shoppers ‘access to an instant online revolving line of
credit at thousands of vendors that accept PayPal, subject to credit approval. PayPal
Credit allows consumers to shop online in much the same way as they would with a
traditional credit card. The rebranding of Bill Me Later as PayPal Credit also means that
consumers can use PayPal Credit to fund transactions virtually anywhere PayPal is
accepted.
The PayPal app is available online or at the iTunes App Store and Google Play. One
year after acquiring Braintree, PayPal introduced its “One Touch” service, which allows
users to pay with a one-touch option on participating merchant’s websites or apps. On
November 28, 2011, PayPal reported Black Friday brought record mobile engagement
including a 538% increase in global mobile payment volume when compared with Black
Friday 2010.
In 2012, the company launched “PayPal Here”, a small business mobile payment
system that includes a combination of a free mobile app and a small card reader that
plugs into a smartphone. PayPal launched an updated app for iOS and Android in 2013
that expanded its mobile app capabilities by allowing users to search for local shops and
restaurants that accept PayPal payments, order ahead at participating venues, and
access their PayPal Credit accounts (formerly known as Bill Me Later).
Phase 1
In the first phase, payment volumes were coming mostly from the eBay auction
website. The system was very attractive to auction sellers, most of which were individuals
or small businesses that were unable to accept credit cards, and for consumers as well.
In fact, many sellers could not qualify for a credit card Merchant account because they
lacked a commercial credit history. The service also appealed to auction buyers because
they could fund PayPal accounts using credit cards or bank account balances, without
divulging credit card numbers to unknown sellers. PayPal employed an aggressive
marketing campaign to accelerate its growth, depositing $10 in new users’ PayPal
accounts.
Phase 2
Until 2000, PayPal’s strategy was to earn interest on funds in PayPal accounts.
However, most recipients of PayPal credits withdrew funds immediately. Also, a large
majority of senders funded their payments using credit cards, which cost PayPal roughly
2% of payment value per transaction.
To solve this problem, PayPal tailored its product to cater more to business
accounts. Instead of relying on interests earned from deposited funds, PayPal started
Phase 3
After fine-tuning PayPal’s business model and increasing its domestic and
international penetration on eBay, PayPal started its off-eBay strategy. This was based
on developing stronger growth in active users by adding users across multiple platforms,
despite the slowdown in on-eBay growth and low-single-digit user growth on the eBay
site. A late 2003 reorganization created a new business unit within PayPal—Merchant
Services—to provide payment solutions to small and large e-Commerce merchants
outside the eBay auction community. Starting in the second half of 2004, PayPal
Merchant Services unveiled several initiatives to enroll online merchants outside the
eBay auction community, including:
● Lowering its transaction fee for high-volume merchants from 2.2% to 1.9%
(while increasing the monthly transaction volume required to qualify for the
lowest fee to $100,000)
● Encouraging its users to recruit non-eBay merchants by increasing its referral
bonus to a maximum of $1,000 (versus the previous $100 cap)
● Persuading credit card gateway providers, including Cyber Source and Retail
Decisions USA, to include PayPal among their offerings to online merchants.
● Hiring a new sales force to acquire large merchants such as Dell, Apple’s
iTunes, and Yahoo! Stores, which hosted thousands of online merchants
● Reducing fees for online music purchases and other “micropayments”
● Launching PayPal Mobile, which allowed users to make payments using text
messaging on their cell phones
Local Restrictions
Countries not supported by PayPal include Iraq, Afghanistan, and Pakistan, in
addition to the countries on the US economic sanction list.
There are three Basic PayPal e-Commerce widgets that you can use on your site:
● PayPal Single Product Widget: Displays a single product for sale.
● PayPal Product Catalog Widget: Add this to your page to display more than
one product for sale.
● Donation Collection Widget: Allows people to make donations and
contributions to your cause.
To be able to use these widgets, you need to sign up on www.paypal.com for a free
Premier or Business account (a link is provided from Yola – see below). Once your
account with PayPal has been created, you are ready to add PayPal buttons to your site.
Notes
6. On the PayPal screen, click the “Start Now” link. This will take you to a screen
where you can create your account.
7. Fill in all your personal information and create your account.
8. Add the PayPal widgets to your site
1. Drag and drop the PayPal Product Catalog Widget onto your page.
2. A dialog box will open where you can add your PayPal e-mail address as well
as start to add details of the products you are selling.
3. Click on the “Click here to add one” link or “+ Add Product” button to begin
adding your products.
4. You can then add, and edit, the settings of the particular product you are
selling. Important Note: Each of your products must have a unique Title and
Description. If you give your products the same Title or Description, they will be
added to the cart as the same product.
5. Continue to add products to your page until you are satisfied with the number
of products you have added.
6. Click “Save” to add the catalog to your page.
7. You can easily go back and edit the settings, or add more products, by clicking
“Edit” on the top left corner of the Catalog Widget.
5.9 Summary
EDI replaces postal mail, fax and e-mail. While e-mail is also an electronic approach,
the documents exchanged via e-mail must still be handled by people rather than
computers. Having people involved slows down the processing of the documents and
Notes
also introduces errors. Instead, EDI documents can flow straight through to the
appropriate application on the receiver’s computer (e.g., the Order Management System)
and processing can begin immediately. A typical manual process looks like this, with lots
of paper and people involvement:
● Business documents: These are any of the documents that are typically
exchanged between businesses. The most common documents exchanged via
EDI are purchase orders, invoices and advance ship notices. But there are
many, many others such as bill of lading, customs documents, inventory
documents, shipping status documents and payment documents.
● Standard format: Because EDI documents must be processed by computers
rather than humans, a standard format must be used so that the computer will
be able to read and understand the documents. A standard format describes
what each piece of information is and in what format (e.g., integer, decimal,
mm-dd-yy). Without a standard format, each company would send documents
using its company-specific format and, much as an English-speaking person
probably doesn’t understand Japanese, the receiver’s computer system
doesn’t understand the company-specific format of the sender’s format.
● There are several EDI standards in use today, including ANSI, EDIFACT,
TRADACOMS and ebXML. And, for each standard, there are many different
versions, e.g., ANSI 5010 or EDIFACT version D12, Release A. When two
businesses decide to exchange EDI documents, they must agree on the
specific EDI standard and version.
● Businesses typically use an EDI translator – either as in-house software or via
an EDI service provider – to translate the EDI format so that the data can be
used by their internal applications and thus enable straight through processing
of documents.
● Business partners: The exchange of EDI documents is typically between two
different companies, referred to as business partners or trading partners. For
example, Company A may buy goods from Company B. Company A sends
orders to Company B. Company A and Company B are business partners.
Return on Intangibles
The centrality of physical assets is becoming less important in today’s commercial
reality. In the past, the intangible assets helped businesses to be competitive in their
industry but strong emphasis was also put on their physical assets such as plants and
equipment along with good management (HR), customer relations and support and
IT infrastructure to achieve competitive advantage. However, these intangibles have had
little or no value when separated from a business’s physical core. Intellectual property
added value and was considered as part of the cost of doing business but not a source of
revenue to the business in itself. Developers were not be able to effectively collaborate
with manufacturers to produce the goods causing returns to be small and the
manufacturers would eat into the developer’s profits during the negotiations; the cost of
collaborating between developers and manufacturers was too high.
The internet has allowed companies to give more emphasis to the intangibles and
bring them to the front line and turn their value into revenue. Making communications and
collaboration between companies easy and inexpensive, e-Commerce allows intangible
assets to be leveraged across a much larger buyer base. As e-Commerce offers a model
with no more time and space constrains, companies no longer have to co-locate with the
tangible means of production.
A good example is eBay. With almost no physical assets, eBay was valued at $1.88
billion dollars at the IPO, surpassing Sotheby’s value of $1.02 billion dollars. Physical
assets are not important to businesses within the eEconomy as was in the Industrial age.
But instead it is a company’s intellectual property and customer relationships that drive
e-Commerce businesses and result in positive cash flow and returns.
Once again, a sour note to more established enterprises with large physical assets
and overhead. Such businesses also have great intellectual property, loyal customer
base and market insight gained through years of experience. However, the profit margins
that can be leveraged through these intangibles are all minimized by the inefficiency and
high cost of their physical assets.
No Time to Spare
The last revolutionary effect of e-Commerce on strategy stems directly from the fact
of its very virtuality. In the past, businesses wanting to enter the marketplace had to
depend upon the design, means of production, marketing, planning and sales being
coordinated by a central vertical enterprise converging finally at a physical location; the
storefront. This meant a daunting and expensive task for new sellers wishing to enter the
market. If they did not have the right elements all in place and a proper vision of the
future and were unable to bring all the necessary elements together, it meant that they
would not be able to participate in the game and succeed. All these individual elements
had to be performed under one roof, creating the vertical model thanks to the limiting
nature of traditional business in terms of the high costs of collaboration and poor
communications between partners.
These classical restrictions do not apply in the e-Commerce business model as
coordination can be achieved easily, virtually, at a very low cost. Entire supply chains can
be created quickly through linking desktops together. The physical locations of the seller,
the warehouse and the payment processor and whether it is three independent
companies is a fact that is immaterial to the buyer of e-Commerce storefronts. All the
buyer expects is that the quality, price and service are met according to their wants.
This all looks like a great opportunity for any business person looking to carve out a
small piece of the market. Unless you are an established enterprise, in which case the
online e-Commerce sellers are a real dangerous threat. What is to prevent any random
person from registering a URL and entering your market and stealing your share? Not
much, and it is being done everyday, putting established businesses on their knees. On
the other hand, with the industry experience and expertise that established firms have,
along with their existing customer base, what is stopping these businesses from doing
the same? The answer is fear of change and the costs involved in adapting. But
unfortunately, there is not much choice in the matter. If you want to survive, you must
adapt and evolve. Forward thinking CEOs will always maintain their competitive
advantage and survive in an even fiercer marketplace.
Senior executives are notorious for not being proactive. Always being reactive and
not willing to embrace the changes in the marketplace, especially in terms of the real
threat posed by the online sellers. Always thinking in brick-and-mortar terms and being
unable to process the virtual world of e-Commerce. Meeting the new challengers in the
marketplace and emerging victorious can only be achieved by beating the newcomers at
their own game. It’s time to start thinking outside the box and restructuring your business
to adapt to the new market.
A prime example of an established enterprise having difficulty competing with the
newly emerging eBusinesses is that of Blockbuster vs. Netflix. Blockbuster is an
enterprise that has enjoyed many years of success within the market, as one of the
largest video rental and sales franchises in the world. Netflix, being a new e-Commerce
enterprise offering a value proposition to the customers of Blockbuster, has managed to
steal a segment of their market. As the threat was perceived to be real and dangerous,
Blockbuster has implemented a value-added feature to their regular in-store rentals by
allowing customers to rent films online (which they receive in the mail) and exchange
them at a physical storefront if they wish, giving them the added option of exchanging the
viewed DVD for a new one at a local Blockbuster franchise. Whereas the clients of Netflix
have no such option but to mail the DVDs back and eagerly wait for their newly selected
Notes
films to arrive in the post.
The first step in such a frightening evolution is to re-evaluate your business model,
putting less emphasis on the physical infrastructure. Keep in mind the golden rule: ‘Stick
to your core activities. If you are not the absolute best in the industry for performing a
function that can be bought from another provider, DO NOT DO IT YOURSELF”.
Notes
Structure:
6.1 Threats
6.1.1 Delivery Methods
6.1.2 Growth of Web Threats
6.1.3 Prevention and Detection
6.2 Measure to Counter Threats
6.2.1 STRIDE
6.2.2 STRIDE Threats and Countermeasures
6.2.3 Network Threats and Countermeasures
6.3 Application Threats and Countermeasures
6.3.1 Input Validation
6.3.2 Buffer Overflows
6.3.3 Cross-site Scripting
6.3.4 SQL Injection
6.3.5 Canonicalization
6.3.6 Authentication
6.4 Authorization
6.4.1 Elevation of Privilege
6.4.2 Disclosure of Confidential Data
6.4.3 Data Tampering
6.4.4 Luring Attacks
6.5 Configuration Management
6.5.1 Unauthorized Access to Administration Interfaces
6.5.2 Unauthorized Access to Configuration Stores
6.5.3 Retrieval of Plaintext Configuration Secrets
6.5.4 Lack of Individual Accountability
6.5.5 Overprivileged Application and Service Accounts
6.6 Cryptography
6.6.1 History of Cryptography
6.7 Encryption and Decryption
6.7.1 RSA Encryption
6.7.2 RSA Decryption
6.8 RSA Analysis
6.8.1 ElGamal Cryptosystem
6.8.2 Generation of ElGamal Key Pair
6.9 Elliptic Curve Cryptography (ECC)
6.10 Cryptography Digital Signatures
6.11 Model of Digital Signature
6.12 Importance of Digital Signature
Objectives
After going through this unit, you should be able to know:
Ɣ Significance of cryptography to maintain the privacy of computer data
Ɣ Security Services of Cryptography
Ɣ Cryptography Primitives
Ɣ Components of a Cryptosystem
Ɣ Types of Cryptosystems
Ɣ Digital Signature
Ɣ A Case Study based on this Unit
6.1 Threats
A web threat is any threat that uses the World Wide Web to facilitate cybercrime.
Web threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS
protocols, but may also employ other protocols and components, such as links in e-mail
or IM, or malware attachments or on servers that access the Web. They benefit
cybercriminals by stealing information for subsequent sale and help absorb infected PCs
into botnets. Web threats pose a broad range of risks, including financial damages,
identity theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-Commerce and
online banking.
It is a type of threat related to information technology (IT). The IT risk, i.e., risk
affecting has gained an increasing impact on society due to the spread of IT processes.
Examples
In September 2008, malicious hackers broke into several sections of
BusinessWeek.com to redirect visitors to malware hosting websites. Hundreds of pages
were compromised with malicious JavaScript pointing to third-party servers.
In August 2008, popular social networking sites were hit by a worm using social
engineering techniques to get users to install a piece of malware. The worm installs
comments on the sites with links to a fake site. If users follow the link, they are told they
need to update their Flash Player. The installer then installs malware rather than the
Flash Player. The malware then downloads a rogue anti-spyware application, AntiSpy
Spider.
In May 2008, websites worldwide were compromised with a malicious JavaScript.
Initially, a half million websites worldwide were infected with a SQL injection which
leveraged a ZLOB variant which then downloaded additional Trojan onto users’ PCs.
Then websites in China, Taiwan and Singapore were compromised followed shortly
thereafter by humanitarian, government and news sites in the UK, Israel and Asia. In this
attack, the compromised websites led, through a variety of redirects, to the download of a
Trojan.
protection—protection in the cloud, at the Internet gateway, across network servers and
Notes
on the client.
6.2 Measure to Counter Threats
When you incorporate security features into your application’s design,
implementation, and deployment, it helps to have a good understanding of how attackers
think. By thinking like attackers and being aware of their likely tactics, you can be more
effective when applying countermeasures. This unit describes the classic attacker
methodology and profiles the anatomy of a typical attack.
This unit analyzes Web application security from the perspectives of threats,
countermeasures, vulnerabilities, and attacks. The following set of core terms are defined
to avoid confusion and to ensure they are used in the correct context.
Ɣ Asset. A resource of value such as the data in a database or on the file system,
or a system resource
Ɣ Threat. A potential occurrence — malicious or otherwise — that may harm an
asset
Ɣ Vulnerability. A weakness that makes a threat possible
Ɣ Attack (or exploit). An action taken to harm an asset
Ɣ Countermeasure. A safeguard that addresses a threat and mitigates risk
This unit also identifies a set of common network, host, and application level threats,
and the recommended countermeasures to address each one. The unit does not contain
an exhaustive list of threats, but it does highlight many top threats. With this information
and knowledge of how an attacker works, you will be able to identify additional threats.
You need to know the threats that are most likely to impact your system to be able to
build effective threat models.
By understanding the basic approach used by attackers to target your Web
application, you will be better equipped to take defensive measures because you will
know what you are up against. The basic steps in attacker methodology are summarized
below and illustrated in Figure 6.1:
Ɣ Survey and assess
Ɣ Exploit and penetrate
Ɣ Escalate privileges
Ɣ Maintain access
Ɣ Deny service
Figure 6.1
6.2.1 STRIDE
Threats faced by the application can be categorized based on the goals and
purposes of the attacks. A working knowledge of these categories of threats can help you
organize a security strategy so that you have planned responses to threats. STRIDE is
Notes
the acronym used at Microsoft to categorize different threat types. STRIDE stands for:
Ɣ Spoofing. Spoofing is attempting to gain access to a system by using a false
identity. This can be accomplished using stolen user credentials or a false IP
address. After the attacker successfully gains access as a legitimate user or
host, elevation of privileges or abuse using authorization can begin.
Ɣ Tampering. Tampering is the unauthorized modification of data, for example,
as it flows over a network between two computers.
Ɣ Repudiation. Repudiation is the ability of users (legitimate or otherwise) to
deny that they performed specific actions or transactions. Without adequate
auditing, repudiation attacks are difficult to prove.
Ɣ Information disclosure. Information disclosure is the unwanted exposure of
private data. For example, a user views the contents of a table or file he or she
is not authorized to open, or monitors data passed in plaintext over a network.
Some examples of information disclosure vulnerabilities include the use of
hidden form fields, comments embedded in Web pages that contain database
connection strings and connection details, and weak exception handling that
can lead to internal system level details being revealed to the client. Any of this
information can be very useful to the attacker.
Ɣ Denial of service. Denial of service is the process of making a system or
application unavailable. For example, a denial-of-service attack might be
accomplished by bombarding a server with requests to consume all available
system resources or by passing it malformed input data that can crash an
application process.
Ɣ Elevation of privilege. Elevation of privilege occurs when a user with limited
privileges assumes the identity of a privileged user to gain privileged access to
an application. For example, an attacker with limited privileges might elevate
his or her privilege level to compromise and take control of a highly privileged
and trusted process or account.
Threat Countermeasures
Use strong authentication.
Do not store secrets (for example, passwords) in plaintext.
Spoofing user identity
Do not pass credentials in plaintext over the wire.
Protect authentication cookies with Secure Sockets Layer (SSL).
Use data hashing and signing.
Tampering with data Use digital signatures.
Use strong authorization.
Use tamper-resistant protocols across communication links.
Information Gathering
Network devices can be discovered and profiled in much the same way as other
types of systems. Attackers usually start with port scanning. After they identify open ports,
they use banner grabbing and enumeration to detect device types and to determine
operating system and application versions. Armed with this information, an attacker can
attack known vulnerabilities that may not be updated with security patches.
Countermeasures to prevent information gathering include:
Ɣ Configure routers to restrict their responses to footprinting requests.
Ɣ Configure operating systems that host network software (for example, software
firewalls) to prevent footprinting by disabling unused protocols and
unnecessary ports.
Sniffing
Sniffing or eavesdropping is the act of monitoring traffic on the network for data such
as plaintext passwords or configuration information. With a simple packet sniffer, an
attacker can easily read all plaintext traffic. Also, attackers can crack packets encrypted
by lightweight hashing algorithms and can decipher the payload that you considered to
be safe. The sniffing of packets requires a packet sniffer in the path of the server/client
communication.
Countermeasures to help prevent sniffing include:
Amity Directorate of Distance and Online Education
E-Commerce Security 173
Ɣ Use strong physical security and proper segmenting of the network. This is the
Notes
first step in preventing traffic from being collected locally.
Ɣ Encrypt communication fully, including authentication credentials. This
prevents sniffed packets from being usable to an attacker. SSL and IPSec
(Internet Protocol Security) are examples of encryption solutions.
Spoofing
Spoofing is a means to hide one’s true identity on the network. To create a spoofed
identity, an attacker uses a fake source address that does not represent the actual
address of the packet. Spoofing may be used to hide the original source of an attack or to
work around network access control lists (ACLs) that are in place to limit host access
based on source address rules.
Although carefully crafted spoofed packets may never be tracked to the original
sender, a combination of filtering rules prevents spoofed packets from originating from
your network, allowing you to block obviously spoofed packets.
Countermeasures to prevent spoofing include:
Ɣ Filter incoming packets that appear to come from an internal IP address at your
perimeter.
Ɣ Filter outgoing packets that appear to originate from an invalid local IP address.
Session Hijacking
Also known as man-in-the-middle attacks, session hijacking deceives a server or a
client into accepting the upstream host as the actual legitimate host. Instead the
upstream host is an attacker’s host that is manipulating the network, so the attacker’s
host appears to be the desired destination.
Countermeasures to help prevent session hijacking include:
Ɣ Use encrypted session negotiation.
Ɣ Use encrypted communication channels.
Ɣ Stay informed of platform patches to fix TCP/IP vulnerabilities, such as
predictable packet sequences.
Denial of Service
Denial of service denies legitimate users’ access to a server or services. The SYN
flood attack is a common example of a network level denial-of-service attack. It is easy to
launch and difficult to track. The aim of the attack is to send more requests to a server
than it can handle. The attack exploits a potential vulnerability in the TCP/IP connection
establishment mechanism and floods the server’s pending connection queue.
Countermeasures to prevent denial of service include:
Ɣ Apply the latest service packs.
Ɣ Harden the TCP/IP stack by applying the appropriate registry settings to
increase the size of the TCP connection queue, decrease the connection
establishment period, and employ dynamic backlog mechanisms to ensure that
the connection queue is never exhausted.
Ɣ Use a network Intrusion Detection System (IDS) because these can
automatically detect and respond to SYN attacks.
Footprinting
Examples of footprinting are port scans, ping sweeps, and NetBIOS enumeration
that can be used by attackers to glean valuable system-level information to help prepare
for more significant attacks. The type of information potentially revealed by footprinting
includes account details, operating system and other software versions, server names,
and database schema details.
Countermeasures to help prevent footprinting include:
Ɣ Disable unnecessary protocols.
Ɣ Lock down ports with the appropriate firewall configuration.
Ɣ Use TCP/IP and IPSec filters for defense in depth.
Ɣ Configure IIS to prevent information disclosure through banner grabbing.
Ɣ Use an IDS that can be configured to pick up footprinting patterns and reject
suspicious traffic.
Password Cracking
Notes
If the attacker cannot establish an anonymous connection with the server, he or she
will try to establish an authenticated connection. For this, the attacker must know a valid
username and password combination. If you use default account names, you are giving
the attacker a head-start. Then the attacker only has to crack the account’s password.
The use of blank or weak passwords makes the attacker’s job even easier.
Countermeasures to help prevent password cracking include:
Ɣ Use strong passwords for all account types.
Ɣ Apply lockout policies to end-user accounts to limit the number of retry
attempts that can be used to guess the password.
Ɣ Do not use default account names, and rename standard accounts such as the
administrator’s account and the anonymous Internet user account used by
many Web applications.
Ɣ Audit failed logins for patterns of password hacking attempts.
Denial of Service
Denial of service can be attained by many methods aimed at several targets within
your infrastructure. At the host, an attacker can disrupt service by brute force against
your application, or an attacker may know of a vulnerability that exists in the service your
application is hosted in or in the operating system that runs your server.
Countermeasures to help prevent denial of service include:
Ɣ Configure your applications, services, and operating system with denial of
service in mind.
Ɣ Stay current with patches and security updates.
Ɣ Harden the TCP/IP stack against denial of service.
Ɣ Make sure your account lockout policies cannot be exploited to lock out
well-known service accounts.
Ɣ Make sure your application is capable of handling high volumes of traffic and
that thresholds are in place to handle abnormally high loads.
Ɣ Review your application’s failover functionality.
Ɣ Use an IDS that can detect potential denial-of-service attacks.
Category Threats
Input validation Buffer overflow; cross-site scripting; SQL injection;
canonicalization
Authentication Network eavesdropping; brute force attacks
dictionary attacks; cookie replay; credential theft
Authorization Elevation of privilege; disclosure of confidential data; data
tampering; luring attacks
Configuration Unauthorized access to administration interfaces;
management unauthorized access to configuration stores; retrieval of clear
text configuration data; lack of individual accountability;
overprivileged process and service accounts
Sensitive data Access sensitive data in storage; network eavesdropping;
data tampering
Session management Session hijacking; session replay; man in the middle
Cryptography Poor key generation or key management; weak or custom
encryption
Parameter manipulation Query string manipulation; form field manipulation; cookie
manipulation; HTTP header manipulation
Exception management Information disclosure; denial of service
Auditing and logging User denies performing an operation; attacker exploits an
application without trace; attacker covers his or her tracks
attacker’s behalf. Does your application blindly trust input? If it does, your application
Notes
may be susceptible to the following:
Ɣ Buffer overflows
Ɣ Cross-site scripting
Ɣ SQL injection
Ɣ Canonicalization
The following section examines these vulnerabilities in detail, including what makes
these vulnerabilities possible.
6.3.6 Authentication
Depending on your requirements, there are several available authentication
mechanisms to choose from. If they are not correctly chosen and implemented, the
authentication mechanism can expose vulnerabilities that attackers can exploit to gain
access to your system. The top threats that exploit authentication vulnerabilities include:
Ɣ Network eavesdropping
Ɣ Brute force attacks
Ɣ Dictionary attacks
Ɣ Cookie replay attacks
Ɣ Credential theft
Network Eavesdropping
If authentication credentials are passed in plaintext from client to server, an attacker
armed with rudimentary network monitoring software on a host on the same network can
capture traffic and obtain user names and passwords.
Countermeasures to prevent network eavesdropping include:
Ɣ Use authentication mechanisms that do not transmit the password over the
network such as Kerberos protocol or Windows authentication.
Ɣ Make sure passwords are encrypted (if you must transmit passwords over the
network) or use an encrypted communication channel, for example with SSL.
Dictionary Attacks
This attack is used to obtain passwords. Most password systems do not store
plaintext passwords or encrypted passwords. They avoid encrypted passwords because
a compromised key leads to the compromise of all passwords in the data store. Lost keys
mean that all passwords are invalidated.
Most user store implementations hold password hashes (or digests). Users are
authenticated by recomputing the hash based on the user-supplied password value and
comparing it against the hash value stored in the database. If an attacker manages to
obtain the list of hashed passwords, a brute force attack can be used to crack the
password hashes.
With the dictionary attack, an attacker uses a program to iterate through all of the
words in a dictionary (or multiple dictionaries in different languages) and computes the
hash for each word. The resultant hash is compared with the value in the data store.
Weak passwords such as “Yankees” (a favourite team) or “Mustang” (a favourite car) will
be cracked quickly. Stronger passwords such as “?You'LlNevaFiNdMeyePasSWerd!”,
are less likely to be cracked.
Note: Once the attacker has obtained the list of password hashes, the dictionary
attack can be performed offline and does not require interaction with the application.
Countermeasures to prevent dictionary attacks include:
Ɣ Use strong passwords that are complex, are not regular words, and contain a
mixture of upper case, lower case, numeric, and special characters.
Ɣ Store non-reversible password hashes in the user store. Also combine a salt
value (a cryptographically strong random number) with the password hash.
For more information about storing password hashes with added salt, see Unit 14,
“Building Secure Data Access”.
Credential Theft
If your application implements its own user store containing user account names
and passwords, compare its security to the credential stores provided by the platform, for
example, a Microsoft Active Directory® directory service or Security Accounts Manager
(SAM) user store. Browser history and cache also store user login information for future
6.4 Authorization
Based on user identity and role membership, authorization to a particular resource
or service is either allowed or denied. Top threats that exploit authorization vulnerabilities
include:
Ɣ Elevation of privilege
Ɣ Disclosure of confidential data
Ɣ Data tampering
Ɣ Luring attacks
Sensitive Data
Sensitive data is subject to a variety of threats. Attacks that attempt to view or
modify sensitive data can target persistent data stores and networks. Top threats to
sensitive data include:
Ɣ Access to sensitive data in storage
Ɣ Network eavesdropping
Ɣ Data tampering
Network Eavesdropping
The HTTP data for Web application travels across networks in plaintext and is
subject to network eavesdropping attacks, where an attacker uses network monitoring
software to capture and potentially modify sensitive data.
Countermeasures to prevent network eavesdropping and to provide privacy include:
Ɣ Encrypt the data
Ɣ Use an encrypted communication channel, for example, SSL
Data Tampering
Data tampering refers to the unauthorized modification of data, often as it is passed
over the network.
One countermeasure to prevent data tampering is to protect sensitive data passed
across the network with tamper-resistant protocols such as hashed message
authentication codes (HMACs).
An HMAC provides message integrity in the following way:
1. The sender uses a shared secret key to create a hash based on the message
payload.
2. The sender transmits the hash along with the message payload.
3. The receiver uses the shared key to recalculate the hash based on the
received message payload. The receiver then compares the new hash value
with the transmitted hash value. If they are the same, the message cannot
have been tampered with.
Session Management
Session management for Web applications is an application layer responsibility.
Session security is critical to the overall security of the application.
Top session management threats include:
Ɣ Session hijacking
Ɣ Session replay
Ɣ Man in the middle
Session Hijacking
A session hijacking attack occurs when an attacker uses network monitoring
software to capture the authentication token (often a cookie) used to represent a user’s
session with an application. With the captured cookie, the attacker can spoof the user’s
session and gain access to the application. The attacker has the same level of privileges
as the legitimate user.
Countermeasures to prevent session hijacking include:
Ɣ Use SSL to create a secure communication channel and only pass the
authentication cookie over an HTTPS connection.
Ɣ Implement logout functionality to allow a user to end a session that forces
authentication if another session is started.
Session Replay
Session replay occurs when a user’s session token is intercepted and submitted by
an attacker to bypass the authentication mechanism. For example, if the session token is
in plaintext in a cookie or URL, an attacker can sniff it. The attacker then posts a request
using the hijacked session token.
Countermeasures to help address the threat of session replay include:
Ɣ Re-authenticate when performing critical functions. For example, prior to
performing a monetary transfer in a banking application, make the user supply
the account password again.
Ɣ Expire sessions appropriately, including all cookies and session tokens.
Ɣ Create a “do not remember me” option to allow no session data to be stored on
the client.
Man-in-the-middle Attacks
A man-in-the-middle attack occurs when the attacker intercepts messages sent
between you and your intended recipient. The attacker then changes your message and
sends it to the original recipient. The recipient receives the message, sees that it came
from you, and acts on it. When the recipient sends a message back to you, the attacker
intercepts it, alters it, and returns it to you. You and your recipient never know that you
have been attacked.
Any network request involving client-server communication, including Web requests,
Distributed Component Object Model (DCOM) requests, and calls to remote components
and Web services, are subject to man-in-the-middle attacks.
Countermeasures to prevent man-in-the-middle attacks include:
Ɣ Use cryptography. If you encrypt the data before transmitting it, the attacker
can still intercept it but cannot read it or alter it. If the attacker cannot read it, he
or she cannot know which parts to alter. If the attacker blindly modifies your
encrypted message, then the original recipient is unable to successfully
decrypt it and, as a result, knows that it has been tampered with.
Ɣ Use Hashed Message Authentication Codes (HMACs). If an attacker alters the
message, the recalculation of the HMAC at the recipient fails and the data can
be rejected as invalid.
Cryptography
Most applications use cryptography to protect data and to ensure it remains private
and unaltered. Top threats surrounding your application’s use of cryptography include:
Ɣ Poor key generation or key management
Ɣ Weak or custom encryption
Ɣ Checksum spoofing
Checksum Spoofing
Do not rely on hashes to provide data integrity for messages sent over networks.
Hashes such as Secure Hash Algorithm (SHA1) and Message Digest Compression
Algorithm (MD5) can be intercepted and changed. Consider the following base
64 encoding UTF-8 message with an appended Message Authentication Code (MAC).
Plaintext: Place 10 orders.
Hash: T0mUNdEQh13IO9oTcaP4FYDX6pU=
If an attacker intercepts the message by monitoring the network, the attacker could
update the message and recompute the hash (guessing the algorithm that you used). For
example, the message could be changed to:
Plaintext: Place 100 orders.
Hash: oEDuJpv/ZtIU7BXDDNv17EAHeAU=
When recipients process the message, and they run the plaintext (“Place 100
orders”) through the hashing algorithm, and then recompute the hash, the hash they
calculate will be equal to whatever the attacker computed.
To counter this attack, use a MAC or HMAC. The Message Authentication Code
Triple Data Encryption Standard (MACTripleDES) algorithm computes a MAC, and
HMACSHA1 computes an HMAC. Both use a key to produce a checksum. With these
algorithms, an attacker needs to know the key to generate a checksum that would
compute correctly at the receiver.
Cookie Manipulation
Cookies are susceptible to modification by the client. This is true of both persistent
and memory-resident cookies. A number of tools are available to help an attacker modify
the contents of a memory-resident cookie. Cookie manipulation is the attack that refers to
the modification of a cookie, usually to gain unauthorized access to a website.
While SSL protects cookies over the network, it does not prevent them from being
modified on the client computer. To counter the threat of cookie manipulation, encrypt
and use an HMAC with the cookie.
Denial of Service
Attackers will probe a Web application, usually by passing deliberately malformed
input. They often have two goals in mind. The first is to cause exceptions that reveal
useful information and the second is to crash the Web application process. This can
occur if exceptions are not properly caught and handled.
Countermeasures to help prevent application-level denial of service include:
Ɣ Thoroughly validate all input data at the server.
Ɣ Use exception handling throughout your application’s code base.
6.6 Cryptography
Although cryptography is now a core part of modern commerce, it is often regarded
as a ‘black art’. This is largely because of a fundamental lack of understanding, as well as
lack of access to the basic building blocks.
However, understanding and implementing cryptography (encryption, decryption
and key management) need not be a trial. A comprehensive and detailed kit is now
available to help understand, audit, review, and implement cryptography.
Human being from ages had two inherent needs í (a) to communicate and share
information and (b) to communicate selectively. These two needs gave rise to the art of
coding the messages in such a way that only the intended people could have access to
the information. Unauthorized people could not extract any information, even if the
scrambled messages fell in their hand.
The art and science of concealing the messages to introduce secrecy in information
security is recognized as cryptography.
The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’
meaning hidden and ‘graphene’ meaning writing.
Steganography
Steganography is similar but adds another dimension to Cryptography. In this
method, people not only want to protect the secrecy of an information by concealing it,
but they also want to make sure any unauthorized person gets no evidence that the
information even exists. For example, invisible watermarking.
In steganography, an unintended recipient or an intruder is unaware of the fact that
observed data contains hidden information. In cryptography, an intruder is normally
aware that data is being communicated, because they can see the coded/scrambled
message.
Notes
Evolution of Cryptography
It is during and after the European Renaissance, various Italian and Papal states led
the rapid proliferation of cryptographic techniques. Various analysis and attack
techniques were researched in this era to break the secret codes.
Ɣ Improved coding techniques such as Vigenere Coding came into existence in
the 15th century, which offered moving letters in the message with a number of
variable places instead of moving them the same number of places.
Ɣ Only after the 19th century, cryptography evolved from the ad hoc approaches
to encryption to the more sophisticated art and science of information security.
Ɣ In the early 20th century, the invention of mechanical and electromechanical
machines, such as the Enigma rotor machine, provided more advanced and
efficient means of coding the information.
Ɣ During the period of World War II, both cryptography and cryptanalysis
became excessively mathematical.
With the advances taking place in this field, government organizations, military units,
and some corporate houses started adopting the applications of cryptography. They used
cryptography to guard their secrets from others. Now, the arrival of computers and the
Internet has brought effective cryptography within the reach of common people.
Modern cryptography is the cornerstone of computer and communications security.
Its foundation is based on various concepts of mathematics such as number theory,
computational complexity theory, and probability theory.
Context of Cryptography
Cryptology, the study of cryptosystems, can be subdivided into two branches:
Ɣ Cryptography
Ɣ Cryptanalysis
What is Cryptography?
Cryptography is the art and science of making a cryptosystem that is capable of
providing information security.
Cryptography deals with the actual securing of digital data. It refers to the design of
mechanisms based on mathematical algorithms that provide fundamental information
security services. You can think of cryptography as the establishment of a large toolkit
containing different techniques in security applications.
What is Cryptanalysis?
The art and science of breaking the cipher text is known as cryptanalysis.
Cryptanalysis is the sister branch of cryptography and they both co-exist. The
cryptographic process results in the cipher text for transmission or storage. It involves the
study of cryptographic mechanism with the intention to break them. Cryptanalysis is also
used during the design of the new cryptographic techniques to test their security
strengths.
Confidentiality
Confidentiality is the fundamental security service provided by cryptography. It is a
security service that keeps the information from an unauthorized person. It is sometimes
referred to as privacy or secrecy.
Confidentiality can be achieved through numerous means starting from physical
securing to the use of mathematical algorithms for data encryption.
Data Integrity
It is security service that deals with identifying any alteration to the data. The data
may get modified by an unauthorized entity intentionally or accidently. Integrity service
confirms that whether data is intact or not since it was last created, transmitted, or stored
by an authorized user.
Data integrity cannot prevent the alteration of data, but provides a means for
detecting whether data has been manipulated in an unauthorized manner.
Authentication
Authentication provides the identification of the originator. It confirms to the receiver
that the data received has been sent only by an identified and verified sender.
Authentication service has two variants:
Ɣ Message authentication identifies the originator of the message without any
regard router or system that has sent the message.
Ɣ Entity authentication is assurance that data has been received from a
specific entity, say a particular website.
Apart from the originator, authentication may also provide assurance about other
parameters related to data such as the date and time of creation/transmission.
Non-repudiation
It is a security service that ensures that an entity cannot refuse the ownership of a
previous commitment or an action. It is an assurance that the original creator of the data
cannot deny the creation or transmission of the said data to a recipient or third party.
Non-repudiation is a property that is most desirable in situations where there are
chances of a dispute over the exchange of data. For example, once an order is placed
electronically, a purchaser cannot deny the purchase order, if non-repudiation service
was enabled in this transaction.
Cryptography Primitives
Cryptography primitives are nothing but the tools and techniques in Cryptography
that can be selectively used to provide a set of desired security services:
Ɣ Encryption
Notes
Ɣ Hash functions
Ɣ Message Authentication Codes (MAC)
Ɣ Digital Signatures
The following table shows the primitives that can achieve a particular security
service on their own.
Note: Cryptographic primitives are intricately related and they are often combined to
achieve a set of desired security services from a cryptosystem.
A cryptosystem is an implementation of cryptographic techniques and their
accompanying infrastructure to provide information security services. A cryptosystem is
also referred to as a cipher system.
Let us discuss a simple model of a cryptosystem that provides confidentiality to the
information being transmitted. This basic model is depicted in the illustration below.
The illustration shows a sender who wants to transfer some sensitive data to a
receiver in such a way that any party intercepting or eavesdropping on the
communication channel cannot extract the data.
The objective of this simple cryptosystem is that at the end of the process, only the
sender and the receiver will know the plaintext.
Types of Cryptosystems
Fundamentally, there are two types of cryptosystems based on the manner in which
encryption-decryption is carried out in the system.
Ɣ Symmetric Key Encryption
Ɣ Asymmetric Key Encryption
The main difference between these cryptosystems is the relationship between the
encryption and the decryption key. Logically, in any cryptosystem, both the keys are
closely associated. It is practically impossible to decrypt the ciphertext with the key that is
unrelated to the encryption key.
Notes
Prior to 1970, all cryptosystems employed symmetric key encryption. Even today, its
relevance is very high and it is being used extensively in many cryptosystems. It is very
unlikely that this encryption will fade away, as it has certain advantages over asymmetric
key encryption.
The salient features of cryptosystem based on symmetric key encryption are:
Ɣ Persons using symmetric key encryption must share a common key prior to
exchange of information.
Ɣ Keys are recommended to be changed regularly to prevent any attack on the
system.
Ɣ A robust mechanism needs to exist to exchange the key between the
communicating parties. As keys are required to be changed regularly, this
mechanism becomes expensive and cumbersome.
Ɣ In a group of n people, to enable two-party communication between any two
persons, the number of keys required for group is n × (n – 1)/2.
Ɣ Length of Key (number of bits) in this encryption is smaller and hence, process
of encryption-decryption is faster than asymmetric key encryption.
Ɣ Processing power of computer system required to run symmetric algorithm is
less.
Asymmetric Key Encryption was invented in the 20th century to come over the
necessity of pre-shared secret key between communicating persons. The salient
features of this encryption scheme are as follows:
Ɣ Every user in this system needs to have a pair of dissimilar keys, private key
and public key. These keys are mathematically related í when one key is
used for encryption, the other can decrypt the ciphertext back to the original
plaintext.
Ɣ It requires to put the public key in public repository and the private key as a
well-guarded secret. Hence, this scheme of encryption is also called Public
Key Encryption.
Ɣ Though public and private keys of the user are related, it is computationally not
feasible to find one from another. This is a strength of this scheme.
Ɣ When Host1 needs to send data to Host2, he obtains the public key of Host2
from repository, encrypts the data, and transmits.
Ɣ Host2 uses his private key to extract the plaintext.
Ɣ Length of Keys (number of bits) in this encryption is large and hence, the
process of encryption-decryption is slower than symmetric key encryption.
Ɣ Processing power of computer system required to run asymmetric algorithm is
higher.
Symmetric cryptosystems are a natural concept. In contrast, public key
cryptosystems are quite difficult to comprehend.
You may think, how the encryption key and the decryption key are ‘related’, and yet
it is impossible to determine the decryption key from the encryption key? The answer lies
in the mathematical concepts. It is possible to design a cryptosystem whose keys have
this property. The concept of public key cryptography is relatively new. There are fewer
public key algorithms known than symmetric algorithms.
Due to the advantages and disadvantage of both the systems, symmetric key and
public key cryptosystems are often used together in the practical information security
systems.
Passive Attacks
The main goal of a passive attack is to obtain unauthorized access to the
information. For example, actions such as intercepting and eavesdropping on the
communication channel can be regarded as passive attack.
These actions are passive in nature, as they neither affect information nor disrupt
the communication channel. A passive attack is often seen as stealing information. The
only difference in stealing physical goods and stealing information is that theft of data still
leaves the owner in possession of that data. Passive information attack is, thus, more
dangerous than stealing of goods, as information theft may go unnoticed by the owner.
Active Attacks
An active attack involves changing the information in some way by conducting some
process on the information. For example,
Ɣ Modifying the information in an unauthorized manner.
Ɣ Initiating unintended or unauthorized transmission of information.
Ɣ Alteration of authentication data such as originator name or timestamp
associated with information.
Ɣ Unauthorized deletion of data.
Ɣ Denial of access to information for legitimate users (denial of service).
Notes
Assumptions of Attacker
Let us see the prevailing environment around cryptosystems followed by the types
of attacks employed to break these systems.
Cryptographic Attacks
The basic intention of an attacker is to break a cryptosystem and to find the plaintext
from the ciphertext. To obtain the plaintext, the attacker only needs to find out the secret
decryption key, as the algorithm is already in public domain.
Hence, he applies maximum effort towards finding out the secret key used in the
cryptosystem. Once the attacker is able to determine the key, the attacked system is
considered as broken or compromised.
Based on the methodology used, attacks on cryptosystems are categorized as
follows:
Ɣ Ciphertext Only Attacks (COA): In this method, the attacker has access to a
set of ciphertext(s). He does not have access to corresponding plaintext. COA
is said to be successful when the corresponding plaintext can be determined
from a given set of ciphertext. Occasionally, the encryption key can be
determined from this attack. Modern cryptosystems are guarded against
ciphertext only attacks.
Ɣ Known Plaintext Attack (KPA): In this method, the attacker knows the
plaintext for some parts of the ciphertext. The task is to decrypt the rest of the
ciphertext using this information. This may be done by determining the key or
via some other method. The best example of this attack is linear cryptanalysis
against block ciphers.
Ɣ Chosen Plaintext Attack (CPA): In this method, the attacker has the text of
his choice encrypted. So, he has the ciphertext plaintext pair of his choice. This
simplifies his task of determining the encryption key. An example of this attack
is differential cryptanalysis applied against block ciphers as well as hash
functions. A popular public key cryptosystem, RSA is also vulnerable to chosen
plaintext attacks.
Ɣ Dictionary Attack: This attack has many variants, all of which involve
compiling a ‘dictionary’. In simplest method of this attack, attacker builds a
dictionary of ciphertexts and corresponding plaintexts that he has learnt over a
period of time. In future, when an attacker gets the ciphertext, he refers the
dictionary to find the corresponding plaintext.
Ɣ Brute Force Attack (BFA): In this method, the attacker tries to determine the
Notes
key by attempting all possible keys. If the key is 8 bits long, then the number of
possible keys is 28 = 256. The attacker knows the ciphertext and the algorithm,
now he attempts all the 256 keys one by one for decryption. The time to
complete the attack would be very high if the key is long.
Ɣ Birthday Attack: This attack is a variant of brute force technique. It is used
against the cryptographic hash function. When students in a class are asked
about their birthdays, the answer is one of the possible 365 dates. Let us
assume the first student’s birthdate is 3rd Aug. Then to find the next student
whose birthdate is 3rd August, we need to enquire 1.25* ¥365 § 25 students.
Similarly, if the hash function produces 64 bit hash values, the possible hash
values are 1.8 × 1019. By repeatedly evaluating the function for different inputs,
the same output is expected to be obtained after about 5.1 × 109 random
inputs.
If the attacker is able to find two different inputs that give the same hash value,
it is a collision and that hash function is said to be broken.
Ɣ Man-in-the-Middle Attack (MIM): The targets of this attack are mostly public
key cryptosystems where key exchange is involved before communication
takes place.
– Host A wants to communicate to host B, hence requests public key of B.
– An attacker intercepts this request and sends his public key instead.
– Thus, whatever host A sends to host B, the attacker is able to read.
– In order to maintain communication, the attacker re-encrypts the data
after reading with his public key and sends to B.
– The attacker sends his public key as A’s public key so that B takes it as if
it is taking it from A.
Ɣ Side Channel Attack (SCA): This type of attack is not against any particular
type of cryptosystem or algorithm. Instead, it is launched to exploit the
weakness in physical implementation of the cryptosystem.
Ɣ Timing Attacks: They exploit the fact that different computations take different
times to compute on processor. By measuring such timings, it is possible to
know about a particular computation the processor is carrying out. For example,
if the encryption takes a longer time, it indicates that the secret key is long.
Ɣ Power Analysis Attacks: These attacks are similar to timing attacks except
that the amount of power consumption is used to obtain information about the
nature of the underlying computations.
Ɣ Fault Analysis Attacks: In these attacks, errors are induced in the
cryptosystem and the attacker studies the resulting output for useful
information.
Practicality of Attacks
The attacks on cryptosystems described here are highly academic, as majority of
them come from the academic community. In fact, many academic attacks involve quite
unrealistic assumptions about environment as well as the capabilities of the attacker. For
example, in chosen ciphertext attack, the attacker requires an impractical number of
deliberately chosen plaintext-ciphertext pairs. It may not be practical altogether.
Nonetheless, the fact that any attack exists should be a cause of concern,
particularly if the attack technique has the potential for improvement.
Caesar Cipher
It is a monoalphabetic cipher wherein each letter of the plaintext is substituted by
another letter to form the ciphertext. It is a simplest form of substitution cipher scheme.
This cryptosystem is generally referred to as the Shift Cipher. The concept is to
replace each alphabet by another alphabet which is ‘shifted’ by some fixed number
between 0 and 25.
For this type of scheme, both sender and receiver agree on a ‘secret shift number’
for shifting the alphabet. This number which is between 0 and 25 becomes the key of
encryption.
The name ‘Caesar Cipher’ is occasionally used to describe the Shift Cipher when
the ‘shift of three’ is used.
Ɣ On receiving the ciphertext, the receiver who also knows the secret shift,
positions his sliding ruler underneath the ciphertext alphabet and slides it to
RIGHT by the agreed shift number, 3 in this case.
Ɣ He then replaces the ciphertext letter by the plaintext letter on the sliding ruler
underneath. Hence, the ciphertext ‘WXWRULDO’ is decrypted to ‘tutorial’. To
Security Value
Caesar Cipher is not a secure cryptosystem because there are only 26 possible
keys to try out. An attacker can carry out an exhaustive key search with available limited
computing resources.
Ɣ On receiving the ciphertext, the receiver, who also knows the randomly chosen
permutation, replaces each ciphertext letter on the bottom row with the
corresponding plaintext letter in the top row. The ciphertext ‘MJBXZ’ is
decrypted to ‘point’.
Security Value
Simple Substitution Cipher is a considerable improvement over the Caesar Cipher.
The possible number of keys is large (26!) and even the modern computing systems are
not yet powerful enough to comfortably launch a brute force attack to break the system.
However, the Simple Substitution Cipher has a simple design and it is prone to design
flaws, say choosing obvious permutation, this cryptosystem can be easily broken.
Playfair Cipher
In this scheme, pairs of letters are encrypted, instead of single letters as in the case
of simple substitution cipher.
In playfair cipher, initially a key table is created. The key table is a 5 × 5 grid of
alphabets that acts as the key for encrypting the plaintext. Each of the 25 alphabets must
be unique and one letter of the alphabet (usually J) is omitted from the table as we need
only 25 alphabets instead of 26. If the plaintext contains J, then it is replaced by I.
The sender and the receiver deicide on a particular key, say ‘tutorials’. In a key table,
the first characters (going left to right) in the table is the phrase, excluding the duplicate
letters. The rest of the table will be filled with the remaining letters of the alphabet, in
natural order. The key table works out to be:
A L S B C
‘H’ and ‘I’ are in same column, hence take letter below them to
D E F G H
replace. HI ĺ QC
K MN P Q
V WX Y Z
– If both letters are in the same row, take the letter to the right of each
Notes
one (going back to the left if at the farthest right)
T U O R I
A L S B C
‘D’ and ‘E’ are in same row, hence take letter to the right of them to
D E F G H
replace. DE ĺ EF
K M N P Q
V W X Y Z
– If neither of the preceding two rules are true, form a rectangle with the two
letters and take the letters on the horizontal opposite corner of the
rectangle.
Using these rules, the result of the encryption of ‘hide money’ with the key of
‘tutorials’ would be:
QC EF NU MF ZV
Decrypting the Playfair cipher is as simple as doing the same process in reverse.
Receiver has the same key and can create the same key table, and then decrypt any
messages made using that key.
Security Value
It is also a substitution cipher and is difficult to break compared to the simple
substitution cipher. As in case of substitution cipher, cryptanalysis is possible on the
Playfair cipher as well, however it would be against 625 possible pairs of letters (25 × 25
alphabets) instead of 26 different possible alphabets.
The Playfair cipher was used mainly to protect important, yet non-critical secrets, as
it is quick to use and requires no special equipment.
Vigenere Cipher
This scheme of cipher uses a text string (say, a word) as a key, which is then used
for doing a number of shifts on the plaintext.
For example, let’s assume the key is ‘point’. Each alphabet of the key is converted to
its respective numeric value: In this case,
p ĺ 16, o ĺ 15, i ĺ 9, n ĺ 14, and t ĺ 20.
Thus, the key is: 16 15 9 14 20.
Notes
Ɣ He now shifts each plaintext alphabet by the number written below it to create
ciphertext as shown below:
Ɣ Here, each plaintext character has been shifted by a different amount – and
that amount is determined by the key. The key must be less than or equal to
the size of the message.
Ɣ For decryption, the receiver uses the same key and shifts received ciphertext in
reverse order to obtain the plaintext.
Security Value
Vigenere Cipher was designed by tweaking the standard Caesar cipher to reduce
the effectiveness of cryptanalysis on the ciphertext and make a cryptosystem more
robust. It is significantly more secure than a regular Caesar Cipher.
In the history, it was regularly used for protecting sensitive political and military
information. It was referred to as the unbreakable cipher due to the difficulty it posed to
the cryptanalysis.
One-time Pad
The circumstances are:
Ɣ The length of the keyword is same as the length of the plaintext.
Ɣ The keyword is a randomly generated string of alphabets.
Ɣ The keyword is used only once.
Security Value
Let us compare Shift cipher with one-time pad.
Transposition Cipher
It is another type of cipher where the order of the alphabets in the plaintext is
rearranged to create the ciphertext. The actual plaintext alphabets are not replaced.
An example is a ‘simple columnar transposition’ cipher where the plaintext is written
horizontally with a certain alphabet width. Then the ciphertext is read vertically as shown.
For example, the plaintext is “golden statue is in eleventh cave” and the secret
random key chosen is “five”. We arrange this text horizontally in table with number of
column equal to key value. The resulting text is shown below.
The ciphertext is obtained by reading column vertically downward from first to last
column. The ciphertext is ‘gnuneaoseenvltiltedasehetivc’.
To decrypt, the receiver prepares similar table. The number of columns is equal to
key number. The number of rows is obtained by dividing number of total ciphertext
alphabets by key value and rounding of the quotient to next integer value.
The receiver then writes the received ciphertext vertically down and from left to right
column. To obtain the text, he reads horizontally left to right and from top to bottom row.
Digital data is represented in strings of binary digits (bits) unlike alphabets. Modern
cryptosystems need to process this binary strings to convert in to another binary string.
Based on how these binary strings are processed, a symmetric encryption schemes can
be classified into:
Block Ciphers
In this scheme, the plain binary text is processed in blocks (groups) of bits at a time;
i.e., a block of plaintext bits is selected, a series of operations is performed on this block
to generate a block of ciphertext bits. The number of bits in a block is fixed. For example,
the schemes DES and AES have block sizes of 64 and 128 respectively.
A block cipher takes a block of plaintext bits and generates a block of ciphertext bits,
generally of same size. The size of block is fixed in the given scheme. The choice of
block size does not directly affect the strength of encryption scheme. The strength of
cipher depends upon the key length.
Block Size
Though any size of block is acceptable, following aspects are borne in mind while
selecting a size of a block.
Ɣ Avoid very small block size: Say a block size is m bits. Then the possible
plaintext bits combinations are 2m. If the attacker discovers the plaintext blocks
corresponding to some previously sent ciphertext blocks, then the attacker can
launch a type of ‘dictionary attack’ by building up a dictionary of plaintext/
ciphertext pairs sent using that encryption key. A larger block size makes
attack harder as the dictionary needs to be larger.
Ɣ Do not have very large block size: With very large block size, the cipher
becomes inefficient to operate. Such plaintexts will need to be padded before
being encrypted.
Ɣ Multiples of 8-bit: A preferred block size is a multiple of 8 as it is easy for
implementation as most computer processor handle data in multiple of 8-bits.
Encryption Process
The encryption process uses the Feistel structure consisting multiple rounds of
processing of the plaintext, each round consisting of a “substitution” step followed by a
permutation step.
Feistel Structure is shown in the following illustration:
Notes
Ɣ The input block to each round is divided into two halves that can be denoted as
L and R for the left half and the right half.
Ɣ In each round, the right half of the block, R, goes through unchanged. But the
left half, L, goes through an operation that depends on R and the encryption
key. First, we apply an encrypting function ‘f’ that takes two input í the key K
and R. The function produces the output f(R, K). Then, we XOR the output of
the mathematical function with L.
Ɣ In real implementation of the Feistel Cipher, such as DES, instead of using the
whole encryption key during each round, a round-dependent key (a subkey) is
derived from the encryption key. This means that each round uses a different
key, although all these subkeys are related to the original key.
Ɣ The permutation step at the end of each round swaps the modified L and
unmodified R. Therefore, the L for the next round would be R of the current
round. And R for the next round be the output L of the current round.
Ɣ Above substitution and permutation steps form a ‘round’. The number of
rounds are specified by the algorithm design.
Ɣ Once the last round is completed, then the two sub-blocks, ‘R’ and ‘L’ are
concatenated in this order to form the ciphertext block.
The difficult part of designing a Feistel Cipher is selection of round function ‘f’. In
Notes
order to be unbreakable scheme, this function needs to have several important
properties that are beyond the scope of our discussion.
Decryption Process
The process of decryption in Feistel cipher is almost similar. Instead of starting with
a block of plaintext, the ciphertext block is fed into the start of the Feistel structure and
then the process thereafter is exactly the same as described in the given illustration.
The process is said to be almost similar and not exactly same. In the case of
decryption, the only difference is that the subkeys used in encryption are used in the
reverse order.
The final swapping of ‘L’ and ‘R’ in last step of the Feistel Cipher is essential. If these are
not swapped, then the resulting ciphertext could not be decrypted using the same algorithm.
Number of Rounds
The number of rounds used in a Feistel Cipher depends on desired security from the
system. More number of rounds provides more secure system. But at the same time,
more rounds mean the inefficient slow encryption and decryption processes. Number of
rounds in the systems thus depends upon efficiency-security trade-off.
The Data Encryption Standard (DES) is a symmetric key block cipher published by
the National Institute of Standards and Technology (NIST).
DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The
block size is 64-bit. Though key length is 64-bit, DES has an effective key length of
56-bits, since 8 of the 64-bits of the key are not used by the encryption algorithm
(function as check bits only). General Structure of DES is depicted in the following
illustration:
Round Function
The heart of this cipher is the DES function, f. The DES function applies a 48-bit key
to the rightmost 32 bits to produce a 32-bit output.
Ɣ Expansion Permutation Box: Since right input is 32-bit and round key is a
Notes
48-bit, we first need to expand right input to 48 bits. Permutation logic is
graphically depicted in the following illustration:
Ɣ XOR (Whitener): After the expansion permutation, DES does XOR operation
on the expanded right section and the round key. The round key is used only in
this operation.
Ɣ Substitution Boxes: The S-boxes carry out the real mixing (confusion). DES
uses 8 S-boxes, each with a 6-bit input and a 4-bit output. Refer the following
illustration:
Notes
Ɣ There are a total of eight S-box tables. The output of all eight s-boxes is then
combined into 32-bit section.
Ɣ Straight Permutation: The 32-bit output of S-boxes is then subjected to the
straight permutation with rule shown in the following illustration:
Key Generation
The round key generator creates sixteen 48-bit keys out of a 56-bit cipher key. The
process of key generation is depicted in the following illustration:
Notes
The logic for Parity drops, shifting, and Compression P-box is given in the DES
description.
DES Analysis
The DES satisfies both the desired properties of block cipher. These two properties
make cipher very strong.
Ɣ Avalanche effect: A small change in plaintext results in the very grate change
in the ciphertext.
Ɣ Completeness: Each bit of ciphertext depends on many bits of plaintext.
During the last few years, cryptanalysis have found some weaknesses in DES when
key selected are weak keys. These keys shall be avoided.
DES has proved to be a very well designed block cipher. There have been no
significant cryptanalytic attacks on DES other than exhaustive key search.
The speed of exhaustive key searches against DES after 1990 began to cause
discomfort amongst users of DES. However, users did not want to replace DES as it
takes an enormous amount of time and money to change encryption algorithms that are
widely adopted and embedded in large security architectures.
The pragmatic approach was not to abandon the DES completely, but to change the
manner in which DES is used. This led to the modified schemes of Triple DES
(sometimes known as 3DES).
Amity Directorate of Distance and Online Education
218 Web-Enabled Business Processes
Incidentally, there are two variants of Triple DES known as 3-key Triple DES
Notes
(3TDES) and 2-key Triple DES (2TDES).
A replacement for DES was needed as its key size was too small. With increasing
Notes
computing power, it was considered vulnerable against exhaustive key search attack.
Triple DES was designed to overcome this drawback but it was found slow.
The features of AES are as follows:
Ɣ Symmetric key symmetric block cipher
Ɣ 128-bit data, 128/192/256-bit keys
Ɣ Stronger and faster than Triple DES
Ɣ Provide full specification and design details
Ɣ Software implementable in C and Java
Operation of AES
AES is an iterative rather than Feistel cipher. It is based on ‘substitution-permutation
network’. It comprises of a series of linked operations, some of which involve replacing
inputs by specific outputs (substitutions) and others involve shuffling bits around
(permutations).
Interestingly, AES performs all its computations on bytes rather than bits. Hence,
AES treats the 128-bits of a plaintext block as 16-bytes. These 16-bytes are arranged in
four columns and four rows for processing as a matrix.
Unlike DES, the number of rounds in AES is variable and depends on the length of
the key. AES uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds
for 256-bit keys. Each of these rounds uses a different 128-bit round key, which is
calculated from the original AES key.
The schematic of AES structure is given in the following illustration:
Encryption Process
Here, we restrict to description of a typical round of AES encryption. Each round
comprise of four sub-processes. The first round process is depicted below:
Notes
Shiftrows
Each of the four rows of the matrix is shifted to the left. Any entries that ‘fall off’ are
re-inserted on the right side of row. Shift is carried out as follows:
Ɣ First row is not shifted.
Ɣ Second row is shifted one (byte) position to the left.
Ɣ Third row is shifted two positions to the left.
Ɣ Fourth row is shifted three positions to the left.
Ɣ The result is a new matrix consisting of the same 16 bytes but shifted with
respect to each other.
MixColumns
Each column of four bytes is now transformed using a special mathematical function.
This function takes as input the four bytes of one column and outputs four completely
new bytes, which replace the original column. The result is another new matrix consisting
of 16 new bytes. It should be noted that this step is not performed in the last round.
Addroundkey
The 16 bytes of the matrix are now considered as 128-bits and are XORed to the
128-bits of the round key. If this is the last round, then the output is the ciphertext.
Otherwise, the resulting 128-bits are interpreted as 16 bytes and we begin another
similar round.
Decryption Process
Notes
The process of decryption of an AES ciphertext is similar to the encryption process
in the reverse order. Each round consists of the four processes conducted in the reverse
order:
Ɣ Add round key
Ɣ Mix columns
Ɣ Shift rows
Ɣ Byte substitution
Since sub-processes in each round are in reverse manner, unlike for a Feistel
Cipher, the encryption and decryption algorithms need to be separately implemented,
although they are very closely related.
AES Analysis
In present-day cryptography, AES is widely adopted and supported in both
hardware and software. Till date, no practical cryptanalytic attacks against AES have
been discovered. Additionally, AES has built-in flexibility of key length, which allows a
degree of ‘future proofing’ against progress in the ability to perform exhaustive key
searches.
However, just as for DES, the AES security is assured only if it is correctly
implemented and good key management is employed.
In this unit, we will discuss the different modes of operation of a block cipher. These
are procedural rules for a generic block cipher. Interestingly, the different modes result in
different properties being achieved which add to the security of the underlying block
cipher.
A block cipher processes the data blocks of fixed size. Usually, the size of a
message is larger than the block size. Hence, the long message is divided into a series of
sequential message blocks, and the cipher operates on these blocks one at a time.
Notes
CBC mode of operation provides message dependence for generating ciphertext and
makes the system non-deterministic.
Operation
The operation of CBC mode is depicted in the following illustration. The steps are as
follows:
Ɣ Load the n-bit Initialization Vector (IV) in the top register.
Ɣ XOR the n-bit plaintext block with data value in top register.
Ɣ Encrypt the result of XOR operation with underlying block cipher with key K.
Ɣ Feed ciphertext block into top register and continue the operation till all
plaintext blocks are processed.
Ɣ For decryption, IV data is XORed with first ciphertext block decrypted. The first
ciphertext block is also fed into to register replacing IV for decrypting next
ciphertext block.
Operation
The operation of CFB mode is depicted in the following illustration. For example, in
the present system, a message block has a size ‘s’ bits where 1 < s < n. The CFB mode
requires an initialization vector (IV) as the initial random n-bit input block. The IV need not
be secret. Steps of operation are:
Ɣ Load the IV in the top register.
Ɣ Encrypt the data value in top register with underlying block cipher with key K.
Ɣ Take only ‘s’ number of most significant bits (left bits) of output of encryption
process and XOR them with ‘s’ bit plaintext message block to generate
ciphertext block.
Ɣ Feed ciphertext block into top register by shifting already present data to the
left and continue the operation till all plaintext blocks are processed.
Ɣ Essentially, the previous ciphertext block is encrypted with the key, and then
the result is XORed to the current plaintext block.
Ɣ Similar steps are followed for decryption. Pre-decided IV is initially loaded at
the start of decryption.
Operation
Notes
Both encryption and decryption in CTR mode are depicted in the following
illustration. Steps in operation are:
Ɣ Load the initial counter value in the top register is the same for both the sender
and the receiver. It plays the same role as the IV in CFB (and CBC) mode.
Ɣ Encrypt the contents of the counter with the key and place the result in the
bottom register.
Ɣ Take the first plaintext block P1 and XOR this to the contents of the bottom
register. The result of this is C1. Send C1 to the receiver and update the
counter. The counter update replaces the ciphertext feedback in CFB mode.
Ɣ Continue in this manner until the last plaintext block has been encrypted.
Ɣ The decryption is the reverse process. The ciphertext block is XORed with the
output of encrypted contents of counter value. After decryption of each
ciphertext, block counter is updated as in case of encryption.
RSA Cryptosystem
This cryptosystem is one of the initial system. It remains most employed
cryptosystem even today. The system was invented by three scholars Ron Rivest, Adi
Shamir, and Len Adleman and hence, it is termed as RSA cryptosystem.
We will see two aspects of the RSA cryptosystem, firstly generation of key pair and
Notes
secondly encryption-decryption algorithms.
Example
An example of generating RSA Key Pair is given below. (For ease of understanding,
the primes p and q taken here are small values. Practically, these values are very high).
Ɣ Let two primes be p = 7 and q = 13. Thus, modulus n = pq = 7 × 13 = 91.
Ɣ Select e = 5, which is a valid choice since there is no number that is common
factor of 5 and (p í 1)(q í 1) = 6 × 12 = 72, except for 1.
Ɣ The pair of numbers (n, e) = (91, 5) forms the public key and can be made
available to anyone whom we wish to be able to send us encrypted messages.
Ɣ Input p = 7, q = 13, and e = 5 to the Extended Euclidean Algorithm. The output
will be d = 29.
Ɣ Check that the d calculated is correct by computing:
de = 29 × 5 = 145 = 1 mod 72
Ɣ Hence, public key is (91, 5) and private keys is (91, 29).
ElGamal Decryption
Ɣ To decrypt the ciphertext (C1, C2) using private key x, the following two steps
are taken:
– Compute the modular inverse of (C1)x modulo p, which is (C1) – x,
generally referred to as decryption factor.
– Obtain the plaintext by using the following formula:
C2 × (C1) – x mod p = Plaintext
Ɣ In our example, to decrypt the ciphertext C = (C1, C2) = (15, 9) using private
key x = 5, the decryption factor is:
15–5 mod 17 = 9
Ɣ Extract plaintext P = (9 × 9) mod 17 = 13.
ElGamal Analysis
In ElGamal system, each user has a private key x. and has three components of
public key í prime modulus p, generator g, and public Y = gx mod p. The strength of
the ElGamal is based on the difficulty of discrete logarithm problem.
The secure key size is generally > 1024-bits. Today, even 2048 bits long key are
used. On the processing speed front, Elgamal is quite slow; it is used mainly for key
authentication protocols. Due to higher processing efficiency, Elliptic Curve variants of
ElGamal are becoming increasingly popular.
ECC is based on sets of numbers that are associated with mathematical objects
Notes
called elliptic curves. There are rules for adding and computing multiples of these
numbers, just as there are for numbers modulo p.
ECC includes variants of many cryptographic schemes that were initially designed
for modular numbers such as ElGamal encryption and Digital Signature Algorithm.
It is believed that the discrete logarithm problem is much harder when applied to
points on an elliptic curve. This prompts switching from numbers modulo p to points on
an elliptic curve. Also an equivalent security level can be obtained with shorter keys if we
use elliptic curve-based variants.
The shorter keys result in two benefits:
Ɣ Ease of key management
Ɣ Efficient computation
These benefits make elliptic-curve-based variants of encryption scheme highly
attractive for application where computing resources are constrained.
Notes
Apart from ability to provide non-repudiation of message, the digital signature also
Notes
provides message authentication and data integrity. Let us briefly see how this is
achieved by the digital signature:
Ɣ Message authentication: When the verifier validates the digital signature
using public key of a sender, he is assured that signature has been created
only by sender who possess the corresponding secret private key and no one
else.
Ɣ Data integrity: In case an attacker has access to the data and modifies it, the
digital signature verification at receiver end fails. The hash of modified data and
the output provided by the verification algorithm will not match. Hence, receiver
can safely deny the message assuming that data integrity has been breached.
Ɣ Non-repudiation: Since it is assumed that only the signer has the knowledge
of the signature key, he can only create unique signature on a given data. Thus,
the receiver can present data and the digital signature to a third party as
evidence if any dispute arises in the future.
By adding public key encryption to digital signature scheme, we can create a
cryptosystem that can provide the four essential elements of security namely í Privacy,
Authentication, Integrity, and Non-repudiation.
Notes
The receiver after receiving the encrypted data and signature on it first verifies the
signature using sender’s public key. After ensuring the validity of the signature, he then
retrieves the data through decryption using his private key.
The most distinct feature of Public Key Infrastructure (PKC) is that it uses a pair of
keys to achieve the underlying security service. The key pair comprises of private key
and public key.
Since the public keys are in open domain, they are likely to be abused. It is, thus,
necessary to establish and maintain some kind of trusted infrastructure to manage these
keys.
Key Management
It goes without saying that the security of any cryptosystem depends upon how
securely its keys are managed. Without secure procedures for the handling of
cryptographic keys, the benefits of the use of strong cryptographic schemes are
potentially lost.
It is observed that cryptographic schemes are rarely compromised through
weaknesses in their design. However, they are often compromised through poor key
management.
There are some important aspects of key management which are as follows:
Ɣ Cryptographic keys are nothing but special pieces of data. Key management
refers to the secure administration of cryptographic keys.
Ɣ Key management deals with entire key lifecycle as depicted in the following
illustration:
Notes
Ɣ There are two specific requirements of key management for public key
cryptography.
– Secrecy of private keys. Throughout the key lifecycle, secret keys must
remain secret from all parties except those who are owner and are
authorized to use them.
– Assurance of public keys. In public key cryptography, the public keys
are in open domain and seen as public pieces of data. By default, there
are no assurances of whether a public key is correct, with whom it can be
associated, or what it can be used for. Thus, key management of public
keys needs to focus much more explicitly on assurance of purpose of
public keys.
The most crucial requirement of ‘assurance of public key’ can be achieved through
the public key infrastructure (PKI), a key management systems for supporting public key
cryptography.
Digital Certificate
For analogy, a certificate can be considered as the ID card issued to the person.
People use ID cards such as a driver’s license and passport to prove their identity. A
digital certificate does the same basic thing in the electronic world, but with one
difference.
Amity Directorate of Distance and Online Education
236 Web-Enabled Business Processes
Digital Certificates are not only issued to people but they can be issued to
Notes
computers, software packages or anything else that need to prove the identity in the
electronic world.
Ɣ Digital certificates are based on the ITU standard X.509 which defines a
standard certificate format for public key certificates and certification validation.
Hence, digital certificates are sometimes also referred to as X.509 certificates.
Public key pertaining to the user client is stored in digital certificates by The
Certification Authority (CA) along with other relevant information such as client
information, expiration date, usage, issuer, etc.
Ɣ CA digitally signs this entire information and includes digital signature in the
certificate.
Ɣ Anyone who needs the assurance about the public key and associated
information of client, he carries out the signature validation process using CA’s
public key. Successful validation assures that the public key given in the
certificate belongs to the person whose details are given in the certificate.
The process of obtaining Digital Certificate by a person/entity is depicted in the
following illustration.
As shown in the illustration, the CA accepts the application from a client to certify his
public key. The CA, after duly verifying identity of client, issues a digital certificate to that
client.
Key Functions of CA
The key functions of a CA are as follows:
Classes of Certificates
There are four typical classes of certificate:
Ɣ Class 1: These certificates can be easily acquired by supplying an e-mail
address.
Ɣ Class 2: These certificates require additional personal information to be
supplied.
Ɣ Class 3: These certificates can only be purchased after checks have been
made about the requestor’s identity.
Ɣ Class 4: They may be used by governments and financial organizations
needing very high levels of trust.
Hierarchy of CA
With vast networks and requirements of global communications, it is practically not
feasible to have only one trusted CA from whom all users obtain their certificates.
Secondly, availability of only one CA may lead to difficulties if CA is compromised.
In such case, the hierarchical certification model is of interest since it allows public
key certificates to be used in environments where two communicating parties do not have
trust relationships with the same CA.
Ɣ The root CA is at the top of the CA hierarchy and the root CA’s certificate is a
self-signed certificate.
Ɣ The CAs, which are directly subordinate to the root CA (For example, CA1 and
CA2) have CA certificates that are signed by the root CA.
Ɣ The CAs under the subordinate CAs in the hierarchy (For example, CA5 and
CA6) have their CA certificates signed by the higher-level subordinate CAs.
Certificate authority (CA) hierarchies are reflected in certificate chains. A certificate
chain traces a path of certificates from a branch in the hierarchy to the root of the
hierarchy.
The following illustration shows a CA hierarchy with a certificate chain leading from
an entity certificate through two subordinate CA certificates (CA6 and CA3) to the CA
certificate for the root CA.
Verifying a certificate chain is the process of ensuring that a specific certificate chain
Notes
is valid, correctly signed, and trustworthy. The following procedure verifies a certificate
chain, beginning with the certificate that is presented for authentication:
Ɣ A client whose authenticity is being verified supplies his certificate, generally
along with the chain of certificates up to Root CA.
Ɣ Verifier takes the certificate and validates by using public key of issuer. The
issuer’s public key is found in the issuer’s certificate which is in the chain next
to client’s certificate.
Ɣ Now if the higher CA who has signed the issuer’s certificate, is trusted by the
verifier, verification is successful and stops here.
Ɣ Else, the issuer’s certificate is verified in a similar manner as done for client in
the above steps. This process continues till either trusted CA is found in
between or else it continues till Root CA.
Nowadays, the networks have gone global and information has taken the digital
form of bits and bytes. Critical information now gets stored, processed and transmitted in
digital form on computer systems and open communication channels.
Since information plays such a vital role, adversaries are targeting the computer
systems and open communication channels to either steal the sensitive information or to
disrupt the critical information system.
Modern cryptography provides a robust set of techniques to ensure that the
malevolent intentions of the adversary are thwarted while ensuring the legitimate users
get access to information. Here, in this unit, we will discuss the benefits that we draw
from cryptography, its limitations, as well as the future of cryptography.
Cryptography – Drawbacks
Apart from the four fundamental elements of information security, there are other
issues that affect the effective use of information:
Ɣ A strongly encrypted, authentic, and digitally signed information can be difficult
to access even for a legitimate user at a crucial time of decision-making. The
network or the computer system can be attacked and rendered non-functional
by an intruder.
6.17 Watermark
A watermark is an identifying image or pattern in paper that appears as various
shades of lightness/darkness when viewed by transmitted light (or when viewed by
reflected light, atop a dark background), caused by thickness or density variations in the
paper. Watermarks have been used on postage stamps, currency, and other government
documents to discourage counterfeiting. There are two main ways of producing
watermarks in paper; the dandy roll process, and the more complex cylinder mould
Notes
process.
Watermarks vary greatly in their visibility; while some are obvious on casual
inspection, others require some study to pick out. Various aids have been developed,
such as watermark fluid that wets the paper without damaging it. Watermarks are often
used as security features of banknotes, passports, postage stamps, and other
documents to prevent counterfeiting (see security paper).
A watermark is very useful in the examination of paper because it can be used for
dating, identifying sizes, mill trademarks and locations, and determining the quality of a
sheet of paper.
Encoding an identifying code into digitized music, video, picture, or other file is
known as a digital watermark.
In philately, the watermark is a key feature of a stamp, and often constitutes the
difference between a common and a rare stamp. Collectors who encounter two otherwise
identical stamps with different watermarks consider each stamp to be a separate
identifiable issue. The “classic” stamp watermark is a small crown or other national
symbol, appearing either once on each stamp or a continuous pattern. Watermarks were
nearly universal on stamps in the 19th and early 20th centuries, but generally fell out of
use and are not commonly used on modern US issues, but some countries continue to
use them.
Notes
A US postal stationery envelope from 1883 showing a clear watermark on laid paper.
Some types of embossing, such as that used to make the "cross on oval" design on
early stamps of Switzerland, resemble a watermark in that the paper is thinner, but can
be distinguished by having sharper edges than is usual for a normal watermark. Stamp
paper watermarks also show various designs, letters, numbers and pictorial elements.
The process of bringing out the stamp watermark is fairly simple. Sometimes a
watermark in stamp paper can be seen just by looking at the unprinted back side of a
stamp. More often, the collector must use a few basic items to get a good look at the
watermark. For example, watermark fluid may be applied to the back of a stamp to
temporarily reveal the watermark.
Even using the simple watermarking method described, it can be difficult to
distinguish some watermarks. Watermarks on stamps printed in yellow and orange can
be particularly difficult to see. A few mechanical devices are also are used by collectors
to detect watermarks on stamps such as the Morley-Bright watermark detector and the
more expensive Safe Signoscope. Such devices can be very useful for they can be used
without the application of watermark fluid and also allow the collector to look at the
watermark for a longer period of time to more easily detect the watermark.
Conclusion
By being aware of the typical approach used by attackers as well as their goals, you
can be more effective when applying countermeasures. It also helps to use a goal-based
approach when considering and identifying threats, and to use the STRIDE model to
categorize threats based on the goals of the attacker, for example, to spoof identity,
tamper with data, deny service, elevate privileges, and so on. This allows you to focus
more on the general approaches that should be used for risk mitigation, rather than
focusing on the identification of every possible attack, which can be a time-consuming
and potentially fruitless exercise.
This unit has shown you the top threats that have the potential to compromise your
network, host infrastructure, and applications. Knowledge of these threats, together with
the appropriate countermeasures, provides essential information for the threat modeling
process it enables you to identify the threats that are specific to your particular scenario
and prioritize them based on the degree of risk they pose to your system. This structured
process for identifying and prioritizing threats is referred to as threat modeling.
6.19 Summary
Cryptography deals with the actual securing of digital data. It refers to the design of
mechanisms based on mathematical algorithms that provide fundamental information
Confidentiality
Confidentiality is the fundamental security service provided by cryptography. It is a
security service that keeps the information from an unauthorized person. It is sometimes
referred to as privacy or secrecy.
Confidentiality can be achieved through numerous means starting from physical
securing to the use of mathematical algorithms for data encryption.
Data Integrity
It is security service that deals with identifying any alteration to the data. The data
may get modified by an unauthorized entity intentionally or accidently. Integrity service
confirms that whether data is intact or not since it was last created, transmitted, or stored
by an authorized user.
Data integrity cannot prevent the alteration of data, but provides a means for
detecting whether data has been manipulated in an unauthorized manner.
Authentication
Authentication provides the identification of the originator. It confirms to the receiver
that the data received has been sent only by an identified and verified sender.
Authentication service has two variants:
Ɣ Message authentication identifies the originator of the message without any
regard router or system that has sent the message.
Ɣ Entity authentication is assurance that data has been received from a specific
entity, say a particular website.
Apart from the originator, authentication may also provide assurance about other
parameters related to data such as the date and time of creation/transmission.
Non-repudiation
It is a security service that ensures that an entity cannot refuse the ownership of a
previous commitment or an action. It is an assurance that the original creator of the data
cannot deny the creation or transmission of the said data to a recipient or third party.
Non-repudiation is a property that is most desirable in situations where there are
chances of a dispute over the exchange of data. For example, once an order is placed
electronically, a purchaser cannot deny the purchase order, if non-repudiation service
was enabled in this transaction.
Introduction
E-Commerce is defined as the buying and selling of products or services over
electronic systems such as the Internet and to a lesser extent, other computer networks.
It is generally regarded as the sales and commercial function of eBusiness. There has
been a massive increase in the level of trade conducted electronically since the
widespread penetration of the Internet. A wide variety of commerce is conducted via
e-Commerce, including electronic funds transfer, supply chain management, Internet
marketing, online transaction processing, electronic data interchange (EDI), inventory
management systems, and automated data collection systems. US online retail sales
reached $175 billion in 2007 and are projected to grow to $335 billion by 2012 (Mulpuru,
2008).
This massive increase in the uptake of e-Commerce has led to a new generation of
associated security threats, but any e-Commerce system must meet four integral
requirements:
(a) Privacy: Information exchanged must be kept from unauthorized parties.
(b) Integrity: The exchanged information must not be altered or tampered with.
(c) Authentication: Both sender and recipient must prove their identities to each
other.
(d) Non-repudiation: Proof is required that the exchanged information was indeed
received (Holcombe, 2007).
These basic maxims of e-Commerce are fundamental to the conduct of secure
business online. Further to the fundamental maxims of e-Commerce above,
e-Commerce providers must also protect against a number of different external security
threats, most notably Denial of Service (DoS). These are where an attempt is made to
make a computer resource unavailable to its intended users though a variety of
mechanisms discussed below. The financial services sector still bears the brunt of
e-crime, accounting for 72% of all attacks. But the sector that experienced the greatest
increase in the number of attacks was e-Commerce. Attacks in this sector have risen by
15% from 2006 to 2007 (Symantec, 2007).
Privacy
Privacy has become a major concern for consumers with the rise of identity theft
and impersonation, and any concern for consumers must be treated as a major concern
for e-Commerce providers. According to Consumer Reports Money Adviser (Perrotta,
2008), the US Attorney General has announced multiple indictments relating to a
massive international security breach involving nine major retailers and more than
40 million credit and debit card numbers. US attorneys think that this may be the largest
hacking and identity theft case ever prosecuted by the justice department. Both EU and
US legislation at both the Federal and State levels mandates certain organizations to
inform customers about information uses and disclosures. Such disclosures are typically
accomplished through privacy policies, both online and offline (Vail et al., 2008).
In a study by Lauer and Deng (2008), a model is presented linking privacy policy,
through trustworthiness, to online trust, and then to customers’ loyalty and their
willingness to provide truthful information. The model was tested using a sample of 269
responses. The findings suggested that consumers’ trust in a company is closely linked
Denial-of-service Attacks
Denial-of-service (DoS) attacks consist of overwhelming a server, a network or a
website in order to paralyze its normal activity (Lejeune, 2002). Defending against DoS
attacks is one of the most challenging security problems on the Internet today. A major
difficulty in thwarting these attacks is to trace the source of the attack, as they often use
incorrect or spoofed IP source addresses to disguise the true origin of the attack (Kim
and Kim, 2006).
The United States Computer Emergency Readiness Team defines symptoms of
denial-of-service attacks to include (McDowell, 2007):
Ɣ Unusually slow network performance
Ɣ Unavailability of a particular website
Ɣ Inability to access any website
Ɣ Dramatic increase in the number of spam e-mails received
DoS attacks can be executed in a number of different ways including:
Ɣ ICMP Flood (Smurf Attack): It is where perpetrators will send large numbers
of IP packets with the source address faked to appear to be the address of the
victim. The network’s bandwidth is quickly used up, preventing legitimate
packets from getting through to their destination.
Ɣ Teardrop Attack: A Teardrop attack involves sending mangled IP fragments
with overlapping, over-sized, payloads to the target machine. A bug in the
TCP/IP fragmentation re-assembly code of various operating systems causes
the fragments to be improperly handled, crashing them as a result of this.
Ɣ Phlashing: Also known as a Permanent Denial-of-service (PDoS) is an attack
that damages a system so badly that it requires replacement or reinstallation of
hardware. Perpetrators exploit security flaws in the remote management
interfaces of the victim’s hardware, be it routers, printers, or other networking
hardware. These flaws leave the door open for an attacker to remotely ‘update’
the device firmware to a modified, corrupt or defective firmware image,
therefore bricking the device and making it permanently unusable for its
original purpose.
Non-technical Attacks
Phishing Attacks
Phishing is the criminally fraudulent process of attempting to acquire sensitive
information such as usernames, passwords and credit card details, by masquerading as
a trustworthy entity in an electronic communication. Phishing scams generally are carried
out by e-mailing the victim with a ‘fraudulent’ e-mail from what purports to be a legitimate
organization requesting sensitive information. When the victim follows the link embedded
within the e-mail, they are brought to an elaborate and sophisticated duplicate of the
legitimate organizations’ website. Phishing attacks generally target bank customers,
online auction sites (such as eBay), online retailers (such as amazon) and services
providers (such as PayPal). According to community banker (Swann, 2008), in more
recent times’ cybercriminals have got more sophisticated in the timing of their attacks
with them posing as charities in times of natural disaster.
Social Engineering
Social engineering is the art of manipulating people into performing actions or
divulging confidential information. Social engineering techniques include pretexting
(where the fraudster creates an invented scenario to get the victim to divulge information),
Interactive voice recording (IVR) or phone phishing (where the fraudster gets the victim to
divulge sensitive information over the phone) and baiting with Trojans horses (where the
fraudster ‘baits’ the victim to load malware unto a system). Social engineering has
become a serious threat to e-Commerce security since it is difficult to detect and to
combat as it involves ‘human’ factors which cannot be patched akin to hardware or
software, albeit staff training and education can somewhat thwart the attack (Hasle et al.,
2005).
Conclusion
In conclusion, the e-Commerce industry faces a challenging future in terms of the
security risks it must avert. With increasing technical knowledge, and its widespread
availability on the internet, criminals are becoming more and more sophisticated in the
deceptions and attacks they can perform. Novel attack strategies and vulnerabilities only
really become known once a perpetrator has uncovered and exploited them. In saying
this, there are multiple security strategies which any e-Commerce provider can instigate
to reduce the risk of attack and compromise significantly. Awareness of the risks and the
implementation of multi-layered security protocols, detailed and open privacy policies
and strong authentication and encryption measures will go a long way to assure the
consumer and insure the risk of compromise is kept minimal.