Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Secure Electronic Transaction-System Security And Cryptography-Handout, Exercises of Cryptography and System Security

This lecture handout is part of System Security And Cryptography course. It was provided by Dr. Samarajit Jaysukh at Birla Institute of Technology and Science. It includes: Secure, Electronic, Transaction, SET, Internet, Digital, Signatures, SSL, Sockets, Layer

Typology: Exercises

2011/2012

Uploaded on 07/17/2012

pamelaaaa
pamelaaaa 🇮🇳

4.5

(12)

96 documents

1 / 2

Toggle sidebar

Related documents


Partial preview of the text

Download Secure Electronic Transaction-System Security And Cryptography-Handout and more Exercises Cryptography and System Security in PDF only on Docsity! Secure Electronic Transaction Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality. SET makes use of Netscape's Secure Sockets Layer (SSL), Microsoft's Secure Transaction Technology (STT), and Terisa System's Secure Hypertext Transfer Protocol (S-HTTP). SET uses some but not all aspects of a public key infrastructure (PKI). Here's how SET works: Assume that a customer has a SET-enabled browser such as Netscape or Microsoft's Internet Explorer and that the transaction provider (bank, store, etc.) has a SET-enabled server. 1. The customer opens a Mastercard or Visa bank account. Any issuer of a credit card is some kind of bank. 2. The customer receives a digital certificate. This electronic file functions as a credit card for online purchases or other transactions. It includes a public key with an expiration date. It has been through a digital switch to the bank to ensure its validity. 3. Third-party merchants also receive certificates from the bank. These certificates include the merchant's public key and the bank's public key. 4. The customer places an order over a Web page, by phone, or some other means. 5. The customer's browser receives and confirms from the merchant's certificate that the merchant is valid. 6. The browser sends the order information. This message is encrypted with the merchant's public key, the payment information, which is encrypted with the bank's public key (which can't be read by the merchant), and information that ensures the payment can only be used with this particular order. 7. The merchant verifies the customer by checking the digital signature on the customer's certificate. This may be done by referring the certificate to the bank or to a third-party verifier. 8. The merchant sends the order message along to the bank. This includes the bank's public key, the customer's payment information (which the merchant can't decode), and the merchant's certificate. 9. The bank verifies the merchant and the message. The bank uses the digital signature on the certificate with the message and verifies the payment part of the message. 10. The bank digitally signs and sends authorization to the merchant, who can then fill the order. docsity.com
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved