ECommerce Unit 4
ECommerce Unit 4
Objectives
Motivation
The primary motivation for the bankcard association to provide specification for secure
payments are:
To have the bankcard community take a leadership position in establishing secure
payment specification and , in the process, avoid any cost associated with future
reconciliation of implemented approaches,
To respect and preserve the relationship between merchants and Acquires and
between cardholders and Issuers,
To facilitate rapid development of the marketplace,
To respond quickly to the needs of the financial services market and,
To protect the integrity of bankcards brands.
Payment security:
The objectives of payment security are to:
Provide authentication of cardholders, merchants and acquires,
Provide confidentiality of payment data,
Preserve the integrity of payment data, and
Define the algorithms and protocol necessary for these security services.
Interoperability:
The objectives interoperability are to:
Clearly define detailed information to ensure that applications developed by one
vendor will interoperate with application developed by other vendors,
Create and support an open payment card standard,
Define exportable technology throughout, in order to encourage globally
interoperable software,
Build on existing standards where practical,
Ensure compatibility with and acceptance by appropriate standards bodies, and
Allow for implementation on any combination of hardware and software platforms
such as power pc, Intel, Spare, UNIX, MS-DOS,OS/2,windows and Macintosh.
Market acceptance:
The objectives of market acceptance are to:
Achieve global acceptance, via ease of implementation and minimal impact on
merchant and cardholder and users,
Allow for “bolt-on” implementation of the payment protocol to existing client
application,
Minimize change to the relationship between acquires and merchants, and
cardholders and issuers,
Allow for minimum impact to existing merchants acquire and payment system
application and infrastructure, and
50
Provide and efficient protocol view from the financial institution perspective.
Business requirement
Requirements
Introduction
This section introduce the business requirements for secure payment processing
using payment card products over both public networks (such as the Internet)and private
networks.
Security issues noncompetitive:
Security issues regarding electronic commerce must be viewed as noncompetitive in
the interest of financial institution, merchants and cardholders
Seven business requirements
There are seven major business requirements addressed by set:
1. Provide confidentiality of payment information and enable confidentiality of order
information that is transmitted along with the payment information.
2. Ensure integrity for all transmitted data.
3. Provide authentication that a cardholder is a legitimate user of a branded
payment card account.
4. Provide authentication that a merchant can accept branded payment card
transactions through its relationship with an acquiring financial institution.
5. Ensure the use of the best security practices and system design techniques to
protect all legitimate parties of an electronic commerce transaction.
6. Ensure the creation of a protocol that is neither dependent on transport security
mechanisms nor prevents their use.
7. Facilitate and encourage interoperability across software and network providers.
Features
Features of the specification :
These requirements are addressed by the following of these specification:
Confidentiality of information
Integrity of data
Cardholder account authentication
Merchant authentication
Interoperability
51
Confidentiality of information:
To facilitate and encourage electronic commerce using payment card products, it will
be necessary to assure cardholders that their payment information is safe and accessible
only by the intended recipient
Online shopping: In today online shopping environment , payment instruction containing
account information are often transmitted from cardholders to merchants over open
networks with little or no security precautions.
Fraud : while it is possible to obtain account information in other environment, t her is a
heightened concern about the case of doing so with public network transactions. This
concern reflects the potential for high volume fraud, automated fraud (such as using filters
on all messages out of a data stream), and the potential for “mischievous” fraud” that
appears to be characteristic of some hackers.
Confidentiality is ensured by the use of message encryption
Integrity of data:
The specification must guarantee that message content is not altered during the
transmission between originator and recipient.
Payment information, sent form cardholders to merchants include order information,
personal data and payment instructions if any component is altered in transit, the
transaction will not be processed accurately.
Payment information integrity is ensured by the use of digital signatures.
Cardholder account authentication:
Merchants need a way to verify that a cardholder is a legitimate user of a valid
branded payment card account number. A mechanism that uses technology to link a
cardholder to specific payment card account number will reduce the incidence of fraud and
therefore the overall cost of payment processing.
These specification define the mechanism to verify that a cardholder is a legitimate
user of a valid payment card account number.
Cardholder account authentication is ensured by the use of digital signatures and
cardholders certificates.
Merchant authentication:
The specification must provide a way for cardholders to confirm that a merchant has
a relationship with a financial institution allowing it to accept payment cards. Cardholders
also need to be able to identify merchants with whom they can securely conduct electronic
commerce.
52
Concept
Payment system participants\Payment system participants
Interaction of participants
SET changes the way that participants in the payment system interact. In a face –to-face
retail transaction or a mail order transaction, the electronic processing of the transaction
begins with the merchant or the acquire. However, in the electronic processing of the
transaction begins with the cardholder.
Cardholder
In the electronic commerce environment, consumers and corporate purchasers interact
with the merchants form personal computers. A cardholder uses a payment card that has
been issued by an Issuer. SET ensure that the interactions the cardholder has with a
merchant keep the payment card account information confidential.
Issuer
An issuer is the financial institution that establishes an account for a cardholder and issues
the payment card. The issuer guarantees payment for authorized transaction using the
payment card in accordance with payment card brand regulation and local legislation.
Merchant
A merchant offers goods for sale or provides services in exchange for payment. SET allows
a merchant to offer electronic interactions that cardholders can use securely. A merchant
that accepts payment cards must have a relationship with an Acquirer.
Acquirer
An acquirer is the financial institution that establishes an account with a merchant and
process payment card authorizations and payments.
Payment gateway
A payment gateway is a device operated by an Acquirer or a designated third party that
processes merchant payment messages(including payment instruction form cardholders)
Brand
Financial institution have founded bankcard association that protect and advertise the
brand, establish and enforce rules for use and acceptance of their bankcards, and provide
networks to interconnect the financial institutions.
Order brands are owned by financial services companies the advertise the brand and
establish and enforce rules for use and acceptance of their payment cards. These brands
combine the roles of Issuer an Acquire in interactions with cardholders and merchants.
Third parties
Issuers and Acquires sometimes choose to assign the processing of payment card
transaction to third party processor, this documents does not distinguish between the
financial institution and the processor of the transaction.
54
Cryptography
Protection of sensitive
Cryptography has been used for centuries to protect sensitive information as it transmitted
from one location to another in a cryptographic system in a message encrypted using a key.
Secrete key cryptography
Secret key cryptography also known as symmetric cryptography, uses the same key to
encrypt and decrypt the message.
Public key cryptography
public key cryptography, also known as asymmetric key cryptography uses two key: one
key to encrypt the message and the other key to decrypt the message. The two keys are
mathematically related such the data encrypted with either jey can only be decrypted using
the other.
Encryption
Relation of keys
When two key users want to exchange messages securely, each transmits one component of
their key pair, designated the public key, to the other and keeps secret key the other
component , designated the private key.
Use of symmetric key
SET will rely on cryptography to ensure message confidentially to SET, message data will
initially be encrypted using randomly generated symmetric encryption key.
Digital signature
Relationship of keys
Because of the mathematically relationship between the public and private keys, data
encrypted with either key can only be decrypted with the other . this allows the sender of a
message to encrypt it using the sender private key. Any recipient can determine that the
message came from the sender by decrypting the message using the sender’s public key .
Using message digests
When combined with message digests, encryption using the private key allows users to
digitally sign message. A message digest is a value generated for a message for document
that is unique to that message.
Two key pairs
SET uses a distinct public/private key pair to create the digital signatures. Thus, each SET
participants will posses two asymmetric key pairs : a key exchange pair, which is used in
the process of encryption and decryption, and a signature pair for the creation and
verification of digital signatures.
55
Certificates
Authentication is further strengthened by the use of certificates
Need for authentication
Before two parties use public key cryptography to conduct business each wants to be sure
that the other party is authenticated. Before Bob accepts a message with Alice`s digital
signature, be wants to be sure that the public key belongs to Alice and not to someone
masquerading as Alice on an open network
Need for trusted third party
An alternative to secure transmission of the key is to use a trusted third arty to
authentication that the public key belongs to Alice.
SET authentication:
The means that a financial institution uses to authenticate a cardholder or merchant is not
defined by these specifications. each payment card brand and financial institution will select
an appropriate method.
Certificate issuance
Cardholder certificates
Cardholder certification function as an electronic representation of the payment card
because they are digitally signed by a financial institution, they cannot be altered by a third
party and only the financial institution can generate one
Merchant certificated
Merchant certificates function as an electronic substitute for the payment brand decal that
appears in the store window.
These certificates are approved by the acquiring financial institution and provide assurance
that the merchant holds a valid agreement with an Acquire.
Hierarchy of trust
SET certificates are verified through a hierarchy of trust. Each certificates is linked to the
signature certificates of the entity that digitally signed it.
Root key distribution
The root key will be distributed in a self-signed certificate. This root key certificate will be
available t software vendors to include with their software.
Root key validation
Software can confirm that it has a valid root key by sending an initiate request to the
certificate authority that contains the hash of the root certificate . in the event that the
software does not have a valid root certificate, the certificate authority will send one in the
response
Root key replacement
When the root key is generated, replacement key will also be generated. This replacement
key is stored securely until it is needed.
The self signed root certificate and the hash of he replacement key are distributed together.
Kinds of shopping
Variety of experiences
There are many ways that cardholders will shop. This section describes to ways
online catalogues
the growth of electronic commerce can largely be attributed to the popularity of the world
wide web.
Electronic catalogues
Merchants may distribute catalogue on electronic media such as diskettes or CD-ROM.
Payment processing
Transaction described
This section describes the flow of transaction as they are processed by various systems
Cardholders registration
Merchant registration
Payment authorization
Payment request
Payment capture
57
Other transaction
The following additional transaction are part of these specification but are not described in
this section.
Certificate query
Purchase inquiry
Purchase notification
Sale transaction
Authorization reversal
Capture reversal
Credit
Credit reversal
Protocol description
In this event that the description of the processing in this section differs from the formal
protocol definition. The formal protocol definition take precedence.
Certificate authority function
Receive registration requests
Process and approve/decline requests and
Issue certificate
The following list presents some suggestion for some possible arrangements with
variations on distribution
A company that issues proprietary cards performs all three steps for its
cardholders.
A financial institution receives process and approves certificate request for its
cardholders or merchant and forwards the information to the appropriate payment
card brand to issues the certificates.
Certificate requests are received by an independent Registration Authority that
process payment card certificates application for multiple payment card brands
and forwards requests to the appropriate financial institution (issuer or
`acquirer) for processing; the financial institution forwards approved requests t
the payment card brands to issues the certificates.
Optional cardholder certificates
The diagrams and processing flows that describes the processing of the transaction when
the cardholder is in possession of a signature.
No digital signature
When a cardholder does not possess a signature certificate no digital signature is generated.
In place of the digital signature, the certificate generates the message digest of the data and
inserts the message into the digital envelope.
58
Assurance of integrity
The recipient of data from the cardholder uses the message digest from the digital envelope
to confirm the integrity of the data.
Strength of cardholder certificates
A cardholder certificate is not a guarantee of the identity of the cardholder. The strength of
a cardholder certificate is wholly dependent on the methods employed by the payment card
brand and the payment card issuer to authenticate the cardholder prior to the certificate
being issued.
Cardholder authentication
The SET protocol uses a cardholder signature certificate to confirm that a transaction is
from a registered user of a payment card. Is a cardholder signature certificate is not present,
authentication of the cardholder must be performed by other.
Cardholder registration
The figure shown below provides a high level overview of the cardholder registration
process. This scenario is divided into the seven fundamental steps in the following detail
section. The icon to the left corresponds to the diagram below and serves as a map to this
scenario; it is repeated in the explanation of the more detailed diagrams with a shaded
region that indicated which step is being described.
Cardholders must register with a Certificate Authority before they can send Set message to
merchants. In order to send SET messages to the CA, the cardholder must have a copy of
the CA public key exchange key, which is provided in the CA key –exchange certificate.
Cardholder initiates registration
Certificate authority sends response
Cardholder receives response and request registration forms
Certificate authority processes request and sends registration form
Cardholder receives registration form and request certificate
Certificate authority processes request and creates certificate
Cardholder receives certificate
Merchant registration
The figure shown below provides a high level overview of he merchant registration process.
This scenario is divided into its five fundamental steps in the following detailed section.
The icons to the left corresponds to the diagram below and serves as a map to this scenario;
its repeated in the explanations of the more detailed diagrams with a shaded region that
indicates which step is being described.
Merchant must register with a certificate authority before they can receive SET payment
instruction from cardholders or process SET transaction through a payment gateway. In
order to send SET message to the CA, the merchant must have a copy of the CA public key-
exchange key, which is provided in the CA key-exchange certificate.
Merchant request registration form
59
E-mail allows one to transmit messages and other files to people located either down
the hallway, or, using the Internet, around the world. In order to send Internet mail, one
needs to obtain an account with an Internet Service Provider or an on-line service (i.e.,
America Online, Prodigy, and so forth) and know the address of the recipient. The ISP
provides an Internet address to the subscriber that allows the individual to receive Internet
mail.
Companies are using the Internet to pursue business opportunities in three areas;
electronic collaboration, information distribution and access, and electronic commerce.
Most companies using the Internet for electronic commerce of EDI use mail
communication with customers and business partners, they also use FTP for accessing
public archives and for delivering software patches. As described elsewhere, the Internet
provides a variety of capabilities for e-commerce/EDI use, including e-mail, file transfer,
World Wide Web, and remoter logins. TCP/IP provides the underlying transport protocol;
the applications support different protocols, dependent on function. For example, a business
application may need to utilize SMTP for mail, FTP for file transfer, HTIP for World Wide
Wed access, and Telnet for remoter logins. Each of these protocols supports different
capabilities with respect to use and value- added functions such as security, encryption, and
non repudiation.
The Internet Engineering Task Force (IETF) meets regularly to discuss operational
and technical issues impacting the Internet community. Capabilities related to security are
under development ore have recently been development by the IETF. Working groups are
set up for further investigation of important issues. Anyone can attend either of theses
meetings and become a member of a working group. Each working group has the
responsibility of producing documentation and deciding how issues should be handled. The
reports are called RFCs (Requests for Comments). To obtain an RFC, one can send a mil
message to [email protected] with a message body of
Retrieve : RFC
Doc- ID : RFCxxxx
where xxxx is the number of the RFC.
A Model for Messages Handling:-
In 1971, the International Federation for Information Processing, a pre standards
organization, developed a model for messages handling. This model was eventually adopted
and expanded by the International Telecommunication Union- Telecommunication (ITC-T),
which developed the X.400 series recommendations, Message Handling System (MHS).
Although Internet mail is not based on ITU-T standards, it is useful to look at this
abstraction.
62
Upon successful completion of the submission protocol, the MTA accepts the
responsibility to deliver the e-mail messages or, if delivery fails, to inform the originating
user of the failure by generating an error report.
If not, it contacts an adjacent MTA that is closer to the recipient and negotiates
transfer of the e-mail message. This process repeats until some MTS determines that the
message is undeliverable., Given this model for e-mail, one realizes that:
E-mail transfer is third-party in nature. once an e-mail message passes through the
posting slot, the user agent has no claims on the message. The MTS takes responsibility
for the e-mail message of posting time and retains that responsibility unity delivery
time.
E-mail transfer is store-and-forward in nature: the UAs for the originator and recipient
need not be on- line simultaneously for mail to be submitted, transported, and
delivered. In fact, only the node currently responsible for the e-mail message and the
“next hop” taking responsibility for the message need be connected in order for the
message to be transferred.
The summarize, there are three general protocols involved in the model:-
Internet Apparatus:-
We can view the Internet suite of protocols used for generic transmission as having
four layers:-
1. The interface layer describes physical and date-link technologies use d to realize
the transmission at the media (herd ware) level.
2. there internet layer describe the internetworking technologies used to realize the
internetworking functions; this is realized with a connectionless-mode network
63
3. The transport layer describe the and –to- end technologies used to realize
communications between and systems; this is realized with a connection-oriented
transport service provided by the Transmission Control Protocol (TCP),
originally defined in 1981 in RFC-793.
4. The application layer describes the technologies used to provide end –user services.
The Internet protocols related to mail-specific applications are as follows:
The Simple Mail Transfer Protocol (SMTP), defined in RFC-821 (August 1982)
and RFC -974 (January 1986), which provides store-and-forward service for
textual e-mail messages, and RFC-822 (August 1982), which defines the format
of those messages.
The Post Office Protocol (POP), Defined in RFC-1225 (May 1991), which
provide a simple mailbox retrieval service.
The Domain Name System (DNS), Defined in RFC-1033 (November 1987), and
RFC-1034 (November 1987), which provides mapping between host names and
network addresses.
Received:
Every entry in the header starting with received represents a computer/gateway that has
transferred the message also referred to as a hop. if there are two many hops, the message
will be bounced or returned, to the original sender. A message will also bounce if the person
is no longer found at that mail system.
Date:
This lines shows the date and time the message left the sender. This will vary by
several seconds or minutes from the delivery date line.
From: This line specifies the full name and email address of the original sender.
Message ID:
This line serves as a unique identifier of each mail message. It includes the name of the
machine sending the message ,the date , time and file name.
To:
Each person receiving the message will appear on the line if there is more than one address,
the addresses will be separated by a comma.
For example , an internet address is denise,[email protected] user name is
denise_derkacs. The domain is merk.com.
3. The result of the signature verification process is made available to the user and the
mime implementation continuous processing with the verified body part
When creating a encrypted body part
1. The content of the body part to be protected are prepared to a according to a local
convention . the content are then transformed into a mime body part is canonical
format.
2. The body part to be encrypted is prepared for encryption according to the value of
the protocol parameter
3. This prepared body parts made available to the encryption process according to their
local convention. The encryption process must make available to a mime
implementation two data streams.
When receiving a multipart/encrypted body part
1. The second body part and the control information in the first body part must be
prepared for the decryption process according to the value of the protocol parameter .
2. The prepared body part must be made available to the decryption process according
a local convention.
3. The result of the decryption process is made available to the user and the mime
implementation continuous processing with the decrypted body part.
MIME body part
Mime specification currently support seven body types
Text, multipart, application, message, image, audio and video.
TEXT: The text body part enables a message to contains simple message data such as
ASCII and can be transported using the current seven bit ASCII used on internet. This the
most rudimentary form of message content specified with in MIME.
Multipart:
the multipart body consist of several body parts containing unrelated data. Mime permits
the user to break the content of down into subtypes the four initial subtypes are mixed,
alternative, parallel and digest.
mixed
the mixed multiple body parts subtypes is the most frequently used it is ensures that a
number of very different message content types such as text, graphics, or images can
transmitted in the same message.
Alternative:
this subtype presents the same date in different such as word processing documents
in three representations such as ascii word for windows and word perfect .
parallel
this subtypes contains body parts that must be viewed at same time . This type is
used to when documents are linked with a utility such as hypertext
67
digest
this subtype is used when all the body parts are messages in their own right.
MESSAGE:
A message body parts contains other messages such as forwarded or transfer messages
.Is the most basic body part MIME, and its subtype are as follows
RFC822
PARTIAL
EXTERNAL BODY
IMAGE:
The images body part contains time varying images and image that contain movement like
motion pictures and full motion video
MPEG:
Motion pictures expert group(mpeg) is the standard digitally compressing movies.
GIF`:
CompuServe’s graphics image format .
AUDIO:
The audio body part contains sound data such as views voice or music. The basic subtype
indicates 8-bit, integrated service digital network(ISDN) .
APPLICATION:
Application body parts contains generated from computer application program, contains
spreadsheets , calendar information, word processing documents, and presentation format
such as word perfect or Microsoft word .
OCTET-STREAM`:
This subtype used for binary data that does not need or have an interpreter.
ODA:
This subtype is the office document architecture as defined by international
communication union.
POST SCRIPT:
This subtype is defined by adobe system and support high quality post script printer output
this uses with nonprinter interpreters because the information obtained in a postscript file
that sending this format may the receiver information about the senders access to files.
MIME DATA ENCODING TECHNIQUES:
The current SMTP network only supports the seven bit ASCII, upto thousand characters per
line of data, and a normal message length of 64kb. Longer messages are possible after being
68
segmented into manageable parts, but the maximum length that will go through any gate
way is still 64kb.
BASE 64
Base 64 for is for any series of octets and its used in private enhanced messaging (PEM),
Specified in RFC1113. This encoding takes a series of 3-octets and output 4-ASCII
characters to represent them.
8-BITS:
8-bits means that lines are of the same form as they are in seven bit encoding.
BINARY:
Binary means that there is not a line length limit within the message. it also means that the
body has not the encoded.
Quoted printable encoding
This encoding value is for data that generally uses on ASCII character set. Instruction on
how to establish this type of contained in RFC -1521.
7-bit
7-bit is the default value when the content transferred encoding header field is not present in
the header.
x-token
this value is for defining a non standard encoding which has been put in place by mutual
agreement between the parties is the transfer.
S/MIME: SECURE MULTIPURPOSE INTERNET MAIL EXTENTION
Without any built in privacy, an internet e-mail message is very much like a postcard.
Everyone who touches the postcard has the opportunities to read the entire content of the
message.
In July of 1995, a group of leading networking and message vendors, in conjunction
with cryptography developer RSA Data Security endorsed a specification that enables
encrypted message to be exchanged between e-mail application from different vendors.
While sophisticated encrypted and authentication technology has been viewed as a
crucial enabling technology for electronic commerce over the world wide web, only a
few email packages offer security. Although Internet Privacy Enhanced Mail is excellent
for text-based messages, MIME represent the next generation and has been widely
adopted because of its ability to handle nearly any content type.
Proponents expect ”S/MIME” to be the de-facto standard vendor independent e-mail
encryption.
S/MIME was designed to add security to e-mail message in MIME format.
What is S/MIME : S/MIME is a specification for secure electronic mail. S/MIME was
designed to add security to e-mail messages in mime format.
69
Why S/MIME there is a growing demand for e-mail security . S/MIME melds proven
cryptographic constructs with standard e-mail practices.
Is S/MIME a standard? At press time the S/MIME working group plans to submit the
S/MIME specification to the IETF for consideration as an official Internet RFC standard as
soon as interoperability tests are complete.
How does S/MIME compare with PGP and PEM? S/MIME, PGP and PEM all specify
methods for securing electronic mail.
PGP can be thought of as both a specification and an application PGP relies on users to
exchange keys and establish trust in each other
The key management function are based on the exchange of the body parts two content
types are used:
Application/mosskey-request content type.:
The user would use this content this to specify needed cryptographic key information. The
message containing this content type might be directed toward an automatic or manual
responder.
Application/mosskey-data content type.:
The principal objectives of this content type is to convey cryptographic keying material
from a source to a destination.
Pretty good privacy(PGP)
Pretty good privacy , already introduce in chap.s,is a public key encryption system in
circulation system in circulation.
Generates public/private RSA keys.
Encrypts messages to be transmitted using the destination’s public key
Decrypts messages received using the recipients private key.
Authentication messages with digital signatures
Manages key rings that keep track of destination’s public keys.
The following is a simplified description of how PGP is used to send an e-mail message:
1. PGP creates a random session key for the message being sent.
2. PGP uses the IDEA private-key algorithm to encrypt the message with the session
key.
3. PGP then uses the recipient public RSA key to RSA-encrypt the session key
4. PGP bundles the IDEA encrypted message and the RSA encrypted session key
together.
PGP van examine a file content and make an intelligent guess as to the file extension
required. Some of the standard file extension are as follows
.txt is attached to files created by a text editor or word processor before the file is encrypted.
.pgp is attached to an encrypted binary file. It is also used for key rings
.asc is attached to an ASCII armored encrypted file.
.bin is created when you use PGP key generate option.