Card Payment Using Aes
Card Payment Using Aes
Sender Receiver
Encryption Decryption
Security Schemes (cont.)
Digital Signature
Sender encrypts a
Any receiver with senders
message with her
public key can read it
private key
Certificate
Name : “Richard”
key-Exchange Key :
Signature Key :
Serial # : 29483756
Other Data : 10236283025273
Expires : 6/18/96
Signed : CA’s Signature
Security Schemes (cont.)
Certificate Authority -
e.g. VeriSign
• Public or private, comes in levels (hierarchy)
• A trusted third party services
• Issuer of digital certificates
• Verifying that a public key indeed belongs to a
certain individual
RCA RCA : Root Certificate Authority
BCA : Brand Certificate Authority
BCA GCA : Geo-political Certificate Authority
CCA : Cardholder Certificate Authority
GCA MCA : Merchant Certificate Authority
PCA : Payment Gateway
CCA MCA PCA Certificate Authority
Hierarchy of Certificate Authorities
Certificate authority needs to be verified by a government or well trusted entity ( e.g., post office)
Security Schemes (cont.)
where f isi some function, and k i is some number derived from the key, to be used in round
i.
It had to be a block cipher
an encryption algorithm structured in terms of an internal function and runs that
function repeatedly on the input.
Each iteration is called a round;
AES uses 10 rounds.
The AES Cipher
k0 k4 k8 k12
k3 k7 k11 k15
The AES Cipher
in2 in6 in10 in14 S20 S21 S22 S23 o2 o6 o10 o14
in3 in7 in11 in15 S30 S31 S32 S33 o3 o7 o11 o15
The AES Cipher
Round 9
Mix columns Mix columns Add round key
SubBytes(state)
ShiftRows(state)
AddRoundKey(state, w[Nr*Nb, (Nr+1)*Nb-1)
Out = state
end
The AES Cipher
Round 9
Add round key Add round key Add round key
InvShiftRows(state)
InvSubBytes(state)
AddRoundKey(state, w[0, Nb-1])
Out = state
end
The AES Inverse Cipher
The Players
Cardholder
Merchant (seller)
Issuer (your bank)
Acquirer (merchant’s financial institution,
acquires the sales slips)
Brand (VISA, Master Card)
Electronic Credit Card System
on the Internet (cont.)
The process of using credit cards offline
payment data
amount transfer
Issuer Bank Acquirer Bank
Cardholder Merchant
Account Account
• Sender’s Computer
1. The message is hashed to a prefixed length of message digest.
2. The message digest is encrypted with the sender’s private signature
key, and a digital signature is created.
3. The composition of message, digital signature, and Sender’s certificate
is encrypted with the symmetric key which is generated at sender’s
computer for every transaction. The result is an encrypted message.
SET protocol uses the DES algorithm instead of RSA for encryption
because DES can be executed much faster than RSA.
4. The Symmetric key itself is encrypted with the receiver’s public key
which was sent to the sender in advance. The result is a digital
envelope.
+
Encrypt
+ Symmetric
Key
Sender’s Encrypted
Certificate Message
Receiver’s
Encrypt
Certificate
Receiver’s Digital
Key-Exchange Key Envelope
Decrypt
Sender’s Public
Digital Signature Message Digest
Signature Key
32
IC Card
Reader Customer y
Customer x
With Digital Wallets
Certificate
Authority
Protocol
X.25
Credit Card
Brand
Complex Simple
Payer Payee
Payment Payment
Gateway Gateway
Bank Bank
VAN VAN
Automated
Clearinghouse
An Architecture of Electronic Fund Transfer on the Internet
Debit Cards
DigiCash
• No issuance of money
• Debit card — a delivering vehicle of cash in an
electronic form
• Either anonymous or onymous
• Advantage of an anonymous card
• the card may be given from one person to another
• Also implemented on the Internet without
employment of an IC card
Electronic Money (cont.)
Remittance Account
Payer Invoice
Payee Receivable
E- Mail
WWW
Electronic Checkbook
An Aonymous card
is necessary to The stored value in
keep the certificates for IC card can be delivered
credit cards, EFT, and in an anonymous mode
electronic checkbooks