SlideShare a Scribd company logo
4
Most read
5
Most read
12
Most read
Cryptography and
Network Security
Third Edition
by William Stallings
Lecture slides by Omar Ghazi
Secure Electronic
Transaction (SET)
Agenda
-Introduction for Secure Electronic Transaction (SET( ?
-Requirement for SET
-Key Features of SET
-SET components
-SET Transaction
-Dual Signature
-Purchase Request
-Payment Gateway Authorization
-Payment Capture
-Reference
Secure Electronic Transaction (SET(
SET is an open encryption and security specification designed to
protect credit card transactions on the Internet. The current version,
SETv1, emerged from a call for security standards by MasterCard and
Visa in February 1996. A wide range of companies were involved in
developing the initial specification, including IBM, Microsoft,
Netscape, RSA, Terisa, and Verisign. Beginning in 1996, there have
been numerous tests of the concept, and by 1998 the first wave of
SET-compliant products was available. SET is not itself a payment
system. Rather it is a set of security formats and protocols like
(Secure Sockets Layer (SSL(, Microsoft's Secure Transaction
Technology (STT(, and Secure Hypertext Transfer Protocol (S-
HTTP(. SET uses so me but not all aspects of a public key
infrastructure (PKI( (that enables users to employ the existing credit
card payment infrastructure on an open network, such as the Internet,
in a secure fashion. In essence, SET provides three services:
Secure Electronic Transactions (SET(
(Cont’d(.
-Provides a secure communications amongst parties.
-Provides trust by the use of X.509v3 digital certificates.
-Ensures privacy the restricted info to those who need it.
Requirement for SET
-Provide confidentiality of payment and ordering information
-Ensure the integrity of all transmitted data
-Provide authentication that a cardholder is a legitimate user of a
credit card account
-Provide authentication that a merchant can accept credit card
transactions through its relationship with a financial institution
-Ensure the use of the best security practices and system design
techniques to protect all legitimate parties in an electronic
commerce transaction
-Create a protocol that neither depends on transport security
mechanisms nor prevents their use
-Facilitate and encourage interoperability among software and
network providers
Key Features of SET
 Confidentiality of information
 Integrity of data
 Cardholder account authentication
 Merchant authentication
SET Components
SET Transaction
We now look at some of the cryptographic details describe the sequence of
events that are required for a transaction.
1.The customer opens an account. The customer obtains a credit card
account, such as MasterCard or Visa, with a bank that supports electronic
payment and SET.
2.The customer receives a certificate. After suitable verification of identity,
the customer receives an X.509v3 digital certificate, which is signed by the
bank. The certificate verifies the customer's RSA public key and its expiration
date. It also establishes a relationship, guaranteed by the bank, between the
customer's key pair and his or her credit card.
3.Merchants have their own certificates. A merchant who accepts a certain
brand of card must be in possession of two certificates for two public keys
owned by the merchant: one for signing messages, and one for key exchange.
The merchant also needs a copy of the payment gateway's public-key
certificate.
4.The customer places an order. This is a process that may involve the
customer first browsing through the merchant's Web site to select items and
determine the price. The customer then sends a list of the items to be
purchased to the merchant, who returns an order form containing the list of
items, their price, a total price, and an order number.
5.The merchant is verified. In addition to the order form, the merchant sends
a copy of its certificate, so that the customer can verify that he or she is
dealing with a valid store.
SET Transaction(Cont’d(.
6.The order and payment are sent. The customer sends both order and
payment information to the merchant, along with the customer's certificate.
The order confirms the purchase of the items in the order form. The payment
contains credit card details. The payment information is encrypted in such a
way that it cannot be read by the merchant. The customer's certificate enables
the merchant to verify the customer.
7.The merchant requests payment authorization. The merchant sends the
payment information to the payment gateway, requesting authorization that the
customer's available credit is sufficient for this purchase.
8.The merchant confirms the order. The merchant sends confirmation of the
order to the customer.
9.The merchant provides the goods or service. The merchant ships the goods
or provides the service to the customer.
10.The merchant requests payment. This request is sent to the payment
gateway, which handles all of the payment processing.
Dual Signature
Dual Signature: The purpose of the dual signature is to link two
messages that are intended for two different recipients. In this
case, the customer wants to send the order information (OI) to
the merchant and the payment information (PI) to the bank. The
merchant does not need to know the customer's credit card
number, and the bank does not need to know the details of the
customer's order. The customer is afforded extra protection in
terms of privacy by keeping these two items separate. However,
the two items must be linked in a way that can be used to
resolve disputes if necessary. The link is needed so that the
customer can prove that this payment is intended for this order
and not for some other goods or service.
Construction of Dual Signature
Purchase Request
Before the Purchase Request exchange begins, the cardholder
has completed browsing, selecting, and ordering. The end of this
preliminary phase occurs when the merchant sends a completed
order form to the customer. All of the preceding occurs without
the use of SET. The purchase request exchange consists of four
messages:
-Initiate Request.
-Initiate Response.
-Purchase Request.
-Purchase Response.
Purchase Request – Customer
Purchase Request – Customer
The cardholder prepares the Purchase Request message and generates a one-
time symmetric encryption key, Ks. The message includes the following:
1. Purchase-related information. This information will be forwarded to the
payment gateway by the merchant and consists of
- The PI
- The dual signature, calculated over the PI and OI, signed with the customer's
private signature key
- The OI message digest (OIMD)
The (OIMD) is needed for the payment gateway to verify the dual signature, as
explained previously. All of these items are encrypted with Ks. The final item is
- The digital envelope. This is formed by encrypting Ks with the payment
gateway's public key-exchange key. It is called a digital envelope because this
envelope must be opened (decrypted) before the other items listed previously
can be read. The value of Ks is not made available to the merchant. Therefore,
the merchant cannot read any of this payment-related information.
Purchase Request – Merchant
Purchase Request – Merchant
When the merchant receives the Purchase Request message, it
performs the following actions
1. Verifies the cardholder certificates by means of its Certification
authority (CA) signatures.
2. Verifies the dual signature using the customer's public signature key.
This ensures that the order has not been tampered with in transit and
that it was signed using the cardholder's private signature key.
3. Processes the order and forwards the payment information to the
payment gateway for authorization (described later).
4. Sends a purchase response to the cardholder.
Payment Gateway Authorization
The payment authorization ensures that the transaction
was approved by the issuer. This authorization guarantees
that the merchant will receive payment; the merchant can
therefore provide the services or goods to the customer.
The payment gateway performs the following tasks:
1.verifies all certificates
2.decrypts digital envelope of authorization block to obtain
symmetric key & then decrypts authorization block
3.verifies merchant's signature on authorization block
4.decrypts digital envelope of payment block to obtain
symmetric key & then decrypts payment block
Payment Gateway Authorization(Cont’d(.
5. verifies dual signature on payment block
6. verifies that transaction ID received from merchant
matches that in PI received (indirectly) from customer
7. requests & receives an authorization from issuer
8. sends authorization response back to merchant
Payment Capture
• merchant sends payment gateway a payment capture request
• gateway checks request
• then causes funds to be transferred to merchants account
• notifies merchant using capture response
Reference
• Stallings, William. Cryptography and network
security: principles and practices. Pearson
Education India, 2006.
• LI, Yang; WANG, Yun. Secure Electronic
Transaction (SET protocol). 2014.
• http://searchfinancialsecurity.techtarget.com/definition
• https://en.wikipedia.org/wiki/Secure_Electronic_Transa
Secure electronic transactions (SET)

More Related Content

PPT
Set Secure Electronic Transaction (SET)
PDF
symmetric key encryption algorithms
PDF
Classical encryption techniques
PPTX
PPTX
online restraunt ..buisness plan
PPTX
Restaurant Business Plan
PPTX
business plan
Set Secure Electronic Transaction (SET)
symmetric key encryption algorithms
Classical encryption techniques
online restraunt ..buisness plan
Restaurant Business Plan
business plan

What's hot (20)

PPTX
Email security
PPTX
Hash Function
PPTX
5. message authentication and hash function
PDF
Web Security
PPT
Message Authentication Code & HMAC
PDF
Email security presentation
PDF
Network security - OSI Security Architecture
PPTX
Types of firewall
PPTX
Kerberos
PPT
Email Security : PGP & SMIME
PPT
X.509 Certificates
PPTX
Symmetric and asymmetric key cryptography
PPT
secure electronics transaction
PPT
Digital Signature
PPT
Pretty good privacy
PPT
Email security
PDF
PPTX
Authentication(pswrd,token,certificate,biometric)
PPTX
public key infrastructure
PDF
Electronic mail security
Email security
Hash Function
5. message authentication and hash function
Web Security
Message Authentication Code & HMAC
Email security presentation
Network security - OSI Security Architecture
Types of firewall
Kerberos
Email Security : PGP & SMIME
X.509 Certificates
Symmetric and asymmetric key cryptography
secure electronics transaction
Digital Signature
Pretty good privacy
Email security
Authentication(pswrd,token,certificate,biometric)
public key infrastructure
Electronic mail security
Ad

Similar to Secure electronic transactions (SET) (20)

PPTX
Electronic transaction final
PPTX
NETWORK SECURITY-SET.pptx
PPTX
E transaction
PPTX
Secure Electronic Transaction (SET)
PDF
Online Payment Solutions UK
PPT
E Payment
PDF
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
PPT
SET (1).ppt
PPT
Electronic payment by ahmad
PPT
Electronic Payment System
PDF
Payment gateway testing
PDF
electronicpaymentsystem-12697023522629-phpapp01.pdf
PDF
Mb2420032007
PDF
An Improvement To The Set Protocol Based On Signcryption
PDF
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
PPTX
Payment gateway/payment service providers and future trends in mobile payment...
PDF
Payment Integration A Comprehensive Guide to Payment Gateway
PPTX
Cyber cash
PPTX
SSL TSL;& SET
PPT
Payer Authentication Solutions For Verified by VISA
Electronic transaction final
NETWORK SECURITY-SET.pptx
E transaction
Secure Electronic Transaction (SET)
Online Payment Solutions UK
E Payment
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
SET (1).ppt
Electronic payment by ahmad
Electronic Payment System
Payment gateway testing
electronicpaymentsystem-12697023522629-phpapp01.pdf
Mb2420032007
An Improvement To The Set Protocol Based On Signcryption
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Payment gateway/payment service providers and future trends in mobile payment...
Payment Integration A Comprehensive Guide to Payment Gateway
Cyber cash
SSL TSL;& SET
Payer Authentication Solutions For Verified by VISA
Ad

More from Omar Ghazi (7)

PPTX
Genetic programming
PPT
Discovery methods for HCI
PPTX
Virtual Reality
PDF
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...
PDF
Hybrid compression based stationary wavelet transforms
PDF
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization
POTX
Presentation of Lossy compression
Genetic programming
Discovery methods for HCI
Virtual Reality
Volumetric Medical Images Lossy Compression using Stationary Wavelet Transfor...
Hybrid compression based stationary wavelet transforms
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization
Presentation of Lossy compression

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PPTX
master seminar digital applications in india
PDF
Trump Administration's workforce development strategy
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Computing-Curriculum for Schools in Ghana
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Types and Its function , kingdom of life
master seminar digital applications in india
Trump Administration's workforce development strategy
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Microbial diseases, their pathogenesis and prophylaxis
Yogi Goddess Pres Conference Studio Updates
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
2.FourierTransform-ShortQuestionswithAnswers.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Computing-Curriculum for Schools in Ghana
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra

Secure electronic transactions (SET)

  • 1. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Omar Ghazi
  • 3. Agenda -Introduction for Secure Electronic Transaction (SET( ? -Requirement for SET -Key Features of SET -SET components -SET Transaction -Dual Signature -Purchase Request -Payment Gateway Authorization -Payment Capture -Reference
  • 4. Secure Electronic Transaction (SET( SET is an open encryption and security specification designed to protect credit card transactions on the Internet. The current version, SETv1, emerged from a call for security standards by MasterCard and Visa in February 1996. A wide range of companies were involved in developing the initial specification, including IBM, Microsoft, Netscape, RSA, Terisa, and Verisign. Beginning in 1996, there have been numerous tests of the concept, and by 1998 the first wave of SET-compliant products was available. SET is not itself a payment system. Rather it is a set of security formats and protocols like (Secure Sockets Layer (SSL(, Microsoft's Secure Transaction Technology (STT(, and Secure Hypertext Transfer Protocol (S- HTTP(. SET uses so me but not all aspects of a public key infrastructure (PKI( (that enables users to employ the existing credit card payment infrastructure on an open network, such as the Internet, in a secure fashion. In essence, SET provides three services:
  • 5. Secure Electronic Transactions (SET( (Cont’d(. -Provides a secure communications amongst parties. -Provides trust by the use of X.509v3 digital certificates. -Ensures privacy the restricted info to those who need it.
  • 6. Requirement for SET -Provide confidentiality of payment and ordering information -Ensure the integrity of all transmitted data -Provide authentication that a cardholder is a legitimate user of a credit card account -Provide authentication that a merchant can accept credit card transactions through its relationship with a financial institution -Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction -Create a protocol that neither depends on transport security mechanisms nor prevents their use -Facilitate and encourage interoperability among software and network providers
  • 7. Key Features of SET  Confidentiality of information  Integrity of data  Cardholder account authentication  Merchant authentication
  • 9. SET Transaction We now look at some of the cryptographic details describe the sequence of events that are required for a transaction. 1.The customer opens an account. The customer obtains a credit card account, such as MasterCard or Visa, with a bank that supports electronic payment and SET. 2.The customer receives a certificate. After suitable verification of identity, the customer receives an X.509v3 digital certificate, which is signed by the bank. The certificate verifies the customer's RSA public key and its expiration date. It also establishes a relationship, guaranteed by the bank, between the customer's key pair and his or her credit card. 3.Merchants have their own certificates. A merchant who accepts a certain brand of card must be in possession of two certificates for two public keys owned by the merchant: one for signing messages, and one for key exchange. The merchant also needs a copy of the payment gateway's public-key certificate. 4.The customer places an order. This is a process that may involve the customer first browsing through the merchant's Web site to select items and determine the price. The customer then sends a list of the items to be purchased to the merchant, who returns an order form containing the list of items, their price, a total price, and an order number. 5.The merchant is verified. In addition to the order form, the merchant sends a copy of its certificate, so that the customer can verify that he or she is dealing with a valid store.
  • 10. SET Transaction(Cont’d(. 6.The order and payment are sent. The customer sends both order and payment information to the merchant, along with the customer's certificate. The order confirms the purchase of the items in the order form. The payment contains credit card details. The payment information is encrypted in such a way that it cannot be read by the merchant. The customer's certificate enables the merchant to verify the customer. 7.The merchant requests payment authorization. The merchant sends the payment information to the payment gateway, requesting authorization that the customer's available credit is sufficient for this purchase. 8.The merchant confirms the order. The merchant sends confirmation of the order to the customer. 9.The merchant provides the goods or service. The merchant ships the goods or provides the service to the customer. 10.The merchant requests payment. This request is sent to the payment gateway, which handles all of the payment processing.
  • 11. Dual Signature Dual Signature: The purpose of the dual signature is to link two messages that are intended for two different recipients. In this case, the customer wants to send the order information (OI) to the merchant and the payment information (PI) to the bank. The merchant does not need to know the customer's credit card number, and the bank does not need to know the details of the customer's order. The customer is afforded extra protection in terms of privacy by keeping these two items separate. However, the two items must be linked in a way that can be used to resolve disputes if necessary. The link is needed so that the customer can prove that this payment is intended for this order and not for some other goods or service.
  • 12. Construction of Dual Signature
  • 13. Purchase Request Before the Purchase Request exchange begins, the cardholder has completed browsing, selecting, and ordering. The end of this preliminary phase occurs when the merchant sends a completed order form to the customer. All of the preceding occurs without the use of SET. The purchase request exchange consists of four messages: -Initiate Request. -Initiate Response. -Purchase Request. -Purchase Response.
  • 15. Purchase Request – Customer The cardholder prepares the Purchase Request message and generates a one- time symmetric encryption key, Ks. The message includes the following: 1. Purchase-related information. This information will be forwarded to the payment gateway by the merchant and consists of - The PI - The dual signature, calculated over the PI and OI, signed with the customer's private signature key - The OI message digest (OIMD) The (OIMD) is needed for the payment gateway to verify the dual signature, as explained previously. All of these items are encrypted with Ks. The final item is - The digital envelope. This is formed by encrypting Ks with the payment gateway's public key-exchange key. It is called a digital envelope because this envelope must be opened (decrypted) before the other items listed previously can be read. The value of Ks is not made available to the merchant. Therefore, the merchant cannot read any of this payment-related information.
  • 17. Purchase Request – Merchant When the merchant receives the Purchase Request message, it performs the following actions 1. Verifies the cardholder certificates by means of its Certification authority (CA) signatures. 2. Verifies the dual signature using the customer's public signature key. This ensures that the order has not been tampered with in transit and that it was signed using the cardholder's private signature key. 3. Processes the order and forwards the payment information to the payment gateway for authorization (described later). 4. Sends a purchase response to the cardholder.
  • 18. Payment Gateway Authorization The payment authorization ensures that the transaction was approved by the issuer. This authorization guarantees that the merchant will receive payment; the merchant can therefore provide the services or goods to the customer. The payment gateway performs the following tasks: 1.verifies all certificates 2.decrypts digital envelope of authorization block to obtain symmetric key & then decrypts authorization block 3.verifies merchant's signature on authorization block 4.decrypts digital envelope of payment block to obtain symmetric key & then decrypts payment block
  • 19. Payment Gateway Authorization(Cont’d(. 5. verifies dual signature on payment block 6. verifies that transaction ID received from merchant matches that in PI received (indirectly) from customer 7. requests & receives an authorization from issuer 8. sends authorization response back to merchant
  • 20. Payment Capture • merchant sends payment gateway a payment capture request • gateway checks request • then causes funds to be transferred to merchants account • notifies merchant using capture response
  • 21. Reference • Stallings, William. Cryptography and network security: principles and practices. Pearson Education India, 2006. • LI, Yang; WANG, Yun. Secure Electronic Transaction (SET protocol). 2014. • http://searchfinancialsecurity.techtarget.com/definition • https://en.wikipedia.org/wiki/Secure_Electronic_Transa