Unit-3 E-Commerce
Unit-3 E-Commerce
transaction.
There are two encryption methods used symmetric cryptography
and asymmetric cryptography.
Symmetric cryptography or more commonly called secret key
cryptography, use the same key to encrypt and decrypt a message.
A commonly used secret key algorithm is the Data Encryption
Standard (DES) Fig 4.1 Asymmetric cryptography, or public key
cryptography, use two distinct keys: a public key and a private
key.
This allows multiple senders to receiver who uses the private key
to decrypt it .The assurance of security are dependent on the
receiver protecting the private key Fig.42.
For merchants to use secret key cryptography , they would each
have to administer individuals secret key to all their customer
and provide these Keys through some secure channel .This
channel complex from an administrative perspective.
This process, the customer generate a random number used to
encrypt payment information using DES. The DES encrypted
payment information and the encrypted DES key are then
transmitted to the merchant.
To decrypt the payment information the merchant first decrypt the
DES key then use the DES key to decrypt the payment
information .
payment information Integrity :
Payment information sent from consumer to merchants includes
order information, personal data and payment instruction .The
information is modified, the transaction may no longer be
accurate.
To eliminate this possible source of error or fraud, an, arithmetic
algorithm called hashing. The hash algorithm generates a value
that is unique to the payment information to be transferred.
A helpful way to view a hash algorithm is as a one way public
cipher ,in that
It has no secret key
Given a message digest there is no way to reproduce the original
information.
It is impossible to hash other data with the same value.
To ensure the integrity the message digest is transmitted with the
payment information .The receiver would then validate the
42
Interoperability:
For electronic commerce to take place, c u s t o m e r
must be able tocommunicate with any merchant.
Interoperability is then achieved by using a particular set of
publiclyannounced algorithm and process in support of electronic
commerce.
4.2 Payment and purchase order process:
Overview:
For an electronic payment to occur over the internet the
following transaction/process must occur.
Account holder registration
Merchant registration
Account holder (customer) ordering
Payment authorization
Account holder registration:
Account holder must register with a third party (TP)that
corresponds to a particular account type before they can transact
with any merchant.
In order to register, the account holder must have a copy of the
TP‟s public key of the public/private key set.
45
1.Create and attach the account holder‟s public key to the form
2.Generate a message digest from the information
3.Encrypt the information and message digest using a secret key
4.Transmit all times to the TP
When the TP receives the account holder‟s request, it does the
following
46
Fig 4.6
1. Decrypts the secret key
2. Decrypts the information, message digest, and account holder’s public
key.
3. Computes and compares message digest
The certified documentation is then encrypted using a secret key
which is in turn encrypted with the account holder’s public key.
The certified documentation is then verified by the account holder
by using the public key of the TP, thus checking the digital
signature. The account holder’s software for future use in
electronic commerce transaction.
Merchant registration:
Merchant must register with TPs that correspond to particular
Account type that they wish to honor before transacting business with
customer who shares the same account types.
For example if a merchant wishes to accept visa and MasterCard
,that merchant may have to register with two TPs or find a TP that
represent both
.
The merchant registration is similar to the account holder’s
registration process.
Account Holder(customer)ordering:
To send a message to a merchant the customer (account holder)
must have a copy of the merchant’s public key and a copy of the
47
Fig4.7
Fig(4.8)
Payment authorization:
The processing of an order, the merchant will need a authorize
(clear) the transaction with the TP responsible for that particular
account.
The authorization assures the merchant that the necessary funds or
credit limit is available to cover the cost of the order.
The merchant has no access to the customer account information
since it was encrypted using the TP‟s public key thus it is required
that this information be sent to the TP so that the merchant can
receive payment authorization from the TP and that the proper
customer account is debited for the transaction.
TP the following information using encryption and digital signature
process previously described:
Merchant‟s CD
Specific order information such as amount to be authorized order,
number, date.
Customers ID
Customers account information
After verifying the merchant, customer, and account
information the TP would then analyze the amount to be
authorized.
49
Fig.4.9
E-cash Interoperability:
Consumer must be able to transact with any merchant or bank
.Hence process and security standard must exit for all hardware
and software used in e-cash transaction.
Interoperability can only be achieved by adherence to algorithm
and process in support e- cash-initiate commerce
Electronic payment scheme:
The leading commercial electronic payment schemes that have been
proposed in the past few years and the companies using them.
Netscape. Netscape secure courier electronic payment scheme which
has been selected by intuit for secure payment between users of its
quicken home banking program and bank use SEPP.
Microsoft: Microsoft STT is similar to SEEP/SET in that it provides
digital signature and user authentication for securing electronic
payments. STT is an embellished version of Netscape’s SSL security
tool and is compatible with SSL version 2.0.
Check free: check free corporation provides online payment
processing service to major clients
51
To major clients, including CompuServe, Genie, Cellular one, Delphi
Internet service corporation and Sky-Tel. check free has also announced
intension to support all security methods that achieve prominence in the
marketplace. e.g., SET.
Cyber Cash: Cyber Cash combines features from checks and Cyber Cash
is a digital cash software system which is used like a money order
guaranteeing payment to the merchant before the goods shifting. Cyber
Cash wants micropayment capabilities of 5 to 20 cents per transaction.
Fig 162
VeriSign: VeriSign is offering its digital signature technology for
authenticating as a component separated from encryption which allows for
export of stronger authentication. IBM is building support for digital ID
into its web browser and internet connection secure server for AIX and
OS/2.
DigiCash: DigiCash is a software company whose products allow users to
purchase goods over the internet without using accredit card. The threat of
privacy loss (where expenses can be easily traced ) gave rice to the idea of
anonymous e-cash ,an electronic store of cash replacement funds which can
be loaded into a smart card for electronic purchase.
First virtual holding: It’s targeting individuals and small business that
want to buy and sell on the internet but cannot afford an extensive on-line
infrastructure. A first virtual e-mail account and first virtual hosting system
to track and record the transfer of information ,products , and payment for
accounting and billing purpose ,consumer and merchant can buy and sell
goods on the internet without sensitive information such as credit card
number moving across the network. All sensitive information is delivered
by telephone.
52
Fig 165
Commerce Net: In 1993 a group of silicon valley entrepreneurs envisioned
the internet as a whole new model of commerce one defined around global
access a large number of buyers and seller many to many interaction and a
significantly accelerated pace of procurement and development they called
this model Spontaneous commerce.
Netcash :Netcash is the internet answer to traveler’s check. To use Netcash
user must enter their checking account or credit card numbers into an on
screen form and e-mail it to the Netcash.
Other approach: This section lists a few other approaches that have
appeared in the recent past.
Mondex is based on smart card technology initially backed by the united
kingdom’s West minster and midland Banks. The electronic purse is a
handled smart card it remembers previous transaction and use RSA
cryptography.
Openmarket handles credit card transaction via web servers but it was
planningto provide support for debit cards checking account and corporate
purchase order.
Global online use on-line challenge/response. It is based on a third party
originating agreements therefore the seller has a higher cost to enter the
market.
53
Fig4.13(167)
Wallet and such: Even in the absence of standards(e.g., SET) vendors
have been developing system to handle sales over the internet and
companies willing to accept that the products are not interoperable can
support business before standard become widely deployed.
Unit - IV