SlideShare a Scribd company logo
Secure Electronic
Transaction
Ms. Shweta Chanchlani
Information Technology Department
Shivajirao S. Jondhle
Polytechnic,Asangaon
1
Secure Electronic Transaction
(SET)
• Developed by Visa and MasterCard
• Designed to protect credit card
transactions
• Confidentiality: all messages encrypted
• Trust: all parties must have digital
certificates
• Privacy: information made available only
when and where necessary
2
Participants in the SET System
3
SET Business Requirements
• Provide confidentiality of payment and
ordering information
• Ensure the integrity of all transmitted
data
• Provide authentication that a
cardholder is a legitimate user.
• Provide authentication that a merchant
can accept credit card transactions
4
SET Transactions
5
SET Transactions
• The customer opens an account with a card
issuer.
• MasterCard, Visa, etc.
• The customer receives a X.509 V3 certificate
signed by a bank.
• X.509 V3
• The customer places an order for a product
or service with a merchant.
• The merchant sends a copy of its certificate
for verification.
6
Key Technologies of SET
• Confidentiality of information: DES
• Integrity of data: RSA digital signatures.
• Cardholder account authentication:
X.509v3 digital certificates .
• Merchant authentication: X.509v3 digital
certificates .
• Privacy: separation of order and payment
information using dual signatures
7
THANK YOU
8

More Related Content

PPT
Set Secure Electronic Transaction (SET)
PPTX
E transaction
PPTX
Secure Electronic Transaction
PPTX
Bitcoin practical and useful
PPTX
Cheque truncation system (cts)
PDF
Bitcoin Technology Fundamentals - Tutorial 1 – Bitcoin Addresses
PDF
TrackTest PCI compliance certificate-2020-2021
PDF
Bitcoin Technology Fundamentals - Tutorial 2 – Bitcoin Network
Set Secure Electronic Transaction (SET)
E transaction
Secure Electronic Transaction
Bitcoin practical and useful
Cheque truncation system (cts)
Bitcoin Technology Fundamentals - Tutorial 1 – Bitcoin Addresses
TrackTest PCI compliance certificate-2020-2021
Bitcoin Technology Fundamentals - Tutorial 2 – Bitcoin Network

Similar to Fdp week 1 presentation (20)

PPT
Secure enhancement transaction presentation
PDF
Secure electronic transaction (set)
PPTX
SSL TSL;& SET
PPT
secure electronics transaction
PPTX
Secure Electronic Transaction (SET)
PPTX
NETWORK SECURITY-SET.pptx
PPT
Secure electronic transactions (SET)
PPTX
Secure Electronic Transaction (SET)
PDF
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
PPTX
EFT.pptx
PDF
Improving System Security and User Privacy in Secure Electronic Transaction (...
PDF
IRJET- Ecommerce Transactions: Secure Gateway in Payment System
PPT
Secnet
PPTX
Payment card security By Hitesh Asnani SVIT
PPT
Electronic Payment System
PDF
electronicpaymentsystem-12697023522629-phpapp01.pdf
PPT
Web Security in Network Security NS7
PPT
Secure Web Transactions Electronic Commerce Underlying Technologies
PPT
secnet.ppt
PPTX
Electronic payment system
Secure enhancement transaction presentation
Secure electronic transaction (set)
SSL TSL;& SET
secure electronics transaction
Secure Electronic Transaction (SET)
NETWORK SECURITY-SET.pptx
Secure electronic transactions (SET)
Secure Electronic Transaction (SET)
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
EFT.pptx
Improving System Security and User Privacy in Secure Electronic Transaction (...
IRJET- Ecommerce Transactions: Secure Gateway in Payment System
Secnet
Payment card security By Hitesh Asnani SVIT
Electronic Payment System
electronicpaymentsystem-12697023522629-phpapp01.pdf
Web Security in Network Security NS7
Secure Web Transactions Electronic Commerce Underlying Technologies
secnet.ppt
Electronic payment system
Ad

Recently uploaded (20)

PPTX
OMC Textile Division Presentation 2021.pptx
PPT
What is a Computer? Input Devices /output devices
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
August Patch Tuesday
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Architecture types and enterprise applications.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
OMC Textile Division Presentation 2021.pptx
What is a Computer? Input Devices /output devices
Group 1 Presentation -Planning and Decision Making .pptx
O2C Customer Invoices to Receipt V15A.pptx
STKI Israel Market Study 2025 version august
Hindi spoken digit analysis for native and non-native speakers
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Chapter 5: Probability Theory and Statistics
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
The various Industrial Revolutions .pptx
August Patch Tuesday
1 - Historical Antecedents, Social Consideration.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25-Week II
Zenith AI: Advanced Artificial Intelligence
Architecture types and enterprise applications.pdf
Web App vs Mobile App What Should You Build First.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Ad

Fdp week 1 presentation

  • 1. Secure Electronic Transaction Ms. Shweta Chanchlani Information Technology Department Shivajirao S. Jondhle Polytechnic,Asangaon 1
  • 2. Secure Electronic Transaction (SET) • Developed by Visa and MasterCard • Designed to protect credit card transactions • Confidentiality: all messages encrypted • Trust: all parties must have digital certificates • Privacy: information made available only when and where necessary 2
  • 3. Participants in the SET System 3
  • 4. SET Business Requirements • Provide confidentiality of payment and ordering information • Ensure the integrity of all transmitted data • Provide authentication that a cardholder is a legitimate user. • Provide authentication that a merchant can accept credit card transactions 4
  • 6. SET Transactions • The customer opens an account with a card issuer. • MasterCard, Visa, etc. • The customer receives a X.509 V3 certificate signed by a bank. • X.509 V3 • The customer places an order for a product or service with a merchant. • The merchant sends a copy of its certificate for verification. 6
  • 7. Key Technologies of SET • Confidentiality of information: DES • Integrity of data: RSA digital signatures. • Cardholder account authentication: X.509v3 digital certificates . • Merchant authentication: X.509v3 digital certificates . • Privacy: separation of order and payment information using dual signatures 7