Abstract. Electronic commerce and electronic
business are the inevitable mediums of exchange in an increasingly wired world.
To better understand the problems and perspectives of electronic payment
systems, it is wise to look at not only the current systems in place, but to
also examine what the future may hold. This paper describes the characteristics
of current systems in place and provides a brief analysis of how each works.
Finally, it predicts the future of these systems and the possible changes to
the current structure of economic transactions.
1
Introduction
For
more than decade there have been predictions of the elimination of physical
cash as a transaction medium and the substitution of one form or another of an
electronic payments system. Some forecasters view the prospect with delight,
looking on it as increasing the efficiency of the economy. Others fear its
rise, anticipating it to be another way in which the security and privacy of
our lives become subject to monitoring and scrutiny. But no matter which side
one may fall on, it is clear that we're abolishing the physical need for money,
one step at a time. We're committing our futures, our families, our societies,
to cyberspace (Gleick). Because of this explosive development of electronic
commerce in recent years, the issue of paying over open networks has become
very important. Electronic payment systems are required to bring the necessary
infrastructure to facilitate payments. They are an essential part of the
further development of commerce and business (Gleick).
Before
taking a closer look at the different types of payment systems, it is important
to classify or categorize them in order to get a better understanding of the
characteristics and properties of the systems. The first level in the
categorization is based on the way in which money transfer is organized.
Existing payment mechanisms can be divided into two groups: electronic cash and
credit-debit systems. Another approach, based on the type of information that
is exchanged, distinguishes between account-based and token based systems, in
which the former corresponds to credit-debit systems and the latter to
electronic cash (Abrazhevich).To be specific,
electronic currency or cash is similar to conventional cash where parties
exchange electronic tokens that represent value, just like paper money with
respect to banks. The credit-debit approach, in contrast, means that money is
represented by numbers in bank accounts and these numbers are transferred
between parties over computer networks. Going one step further in the
classification of account-based systems, we can distinguish between debit and
credit cards systems and specialized ones, for example, those systems that use
e-mail for money transfer or notification. Electronic currency can be divided
on systems that support smart cards, and those that exist only in online
environment. They can be called ‘online cash’ or ‘Web cash’. Prepaid cards and
electronic purse systems can be also included in this category (Abrazhevich).
Now
that we have classified the payment systems, we can take a more in-depth look
at each of the categories. By choosing a specific example from each, we can
analyze the specific functionality of each system and why its security allows
it to be either a promising new technology or an already existing one. Under
the scope of account based systems, we will first see how credit cards work,
then continue on to email-based transaction systems, and finally a generic
system such as PayPal. Moreover, under the category of electronic currency, we
will take a look at both smart cards and E-Cash. Finally, we will anticipate how
new innovations and technologies such as RF identifications will continue to
morph the changing landscape of electronic payment systems in the future.
2
Account-Based Systems: The Credit Card
A first
step in the evolution of physical to electronic payment systems, the credit
card is a common piece of innovation used by almost everyone in today’s
society. In order to understand future technology such as the viability of the
smart card, it is indeed beneficial to see how a credit card actually works. In
general, a credit card is a thin plastic card, usually 3-1/8 inches by 2-1/8
inches in size that contains identification information such as a signature or
picture, and authorizes the person named on it to charge purchases or services
to his account. These will be billed periodically. Today, the information on
the card is read by automated teller machines, store readers, and bank and
Internet computers (how stuff works).
In order
to authenticate these credit card transactions, there are three basic methods of
determining whether your credit card will pay for what you are charging.
Merchants with only a few transactions each month can do voice authentication
using a touch-tone phone. Additionally, terminals allow users to swipe their
credit cards, easing the need for an additional human being to be involved in
the transaction (how stuff works). For example, people often swipe their own
card at the checkout of stores these days. And finally, there are virtual
terminals for internet transactions. More specifically, the protocol for credit
card use starts with a cashier swiping the card through a reader. This dials a
stored telephone number to call an acquirer. An acquirer is an organization
that collects credit authentication requests and provides the merchants with a
payment guarantee. When the acquirer company gets the credit card requests, it
checks the transaction for validity and the record on the stripe for merchant
ID, valid card number, expiration date, credit card limit, and card usage.
Single dial-up transactions are processed at 1,200 to 2,400 bits per second
(bps), while direct Internet attachment uses
much higher speeds via this protocol. In this system, the
cardholder enters a personal identification number (PIN) using a keypad (how stuff works).
The PIN
is not on the card, it is rather encrypted
in a database. For example, before you get cash from an ATM, the ATM encrypts
the PIN and sends it to the database to see if there is a match. The PIN can be
either in the bank's computers in an encrypted form or encrypted on the card
itself. The transformation used in this type of cryptography is called one-way. This means that it's easy to
compute a cipher given the bank's key
and the customer's PIN, but not
really feasible to obtain the plain-text PIN from the cipher, even if the key
is known. This feature was designed to protect the cardholder from being
impersonated by someone who has access to the bank's computer files. Likewise,
the communications between the ATM and the bank's central computer are
encrypted to prevent hackers from tapping into
the phone lines, recording the signals sent to the ATM to
authorize the dispensing of cash and then feeding the same signals to the ATM
to trick it into unauthorized dispensing of cash (how stuff works).
Now that
we’ve seen how a credit card works, the advantages are quite apparent. This
system of electronic payment provides ease of use and scalability. As long as
it can use the existing networks and terminals, there is no need for creating
new hardware or infrastructure. All that needs to be tracked is what new
accounts have been created.
2.1
Account-Based Systems: E-mail Based Systems
E-mail
is an inherently insecure medium. Whereas traditional bank paper and other
payment systems have levels of security built in, e-mail does not. E-mail
payment systems use e-mail for notification and traditional banking systems to
transfer funds. However, the actual security of payments remains relevant and
can be divided into two main concerns: transaction-level security and user
authentication. The first is more straightforward and concerns the guarding of
sensitive payment details while in transit. This can be addressed by 128-bit
data encryption in a secured socket layer (SSL), which is widely accepted and
is generally believed to be adequate protection even for large-value
transactions (Finance Asia). This communication protocol, which also is used
for web-based credit card payments, works in a series of steps:
- Client enters
a merchant site which uses SSL;
- Web browser and merchant
server contact themselves (handshake process):
- Web browser and
Merchant server establish the cipher suite;
- Web browser
authenticates the server thanks to its digital certificate (and optional
client authentication);
- Web browser chooses a
symmetric key, encrypts it with server’s public key which he has obtained
with server’s certificate and finally sends it back;
- Merchant’s
server decrypts it and the handshake is completed.
- The server performs the
following steps:
- Computes the hash
value (digest) of requested data;
- Encrypts data and
hash value with a symmetric key which was chosen during handshake
process;
- Sends it to the
client.
- The client’s browser
proceeds as follows:
- It decrypts message
with the chosen key;
- It crates message
digest from the original message;
- It compares both
digests;
- If they are equals it
presents the data.
- The client fills in a form
(e.g. the credit card number and order information)
- The client’s browser sends
the form to the merchant’s server after proceeding following operations:
- Computing the digest
of the data;
- Encrypting the data
and the digest with the symmetric key
- The merchant’s server:
- Decrypts the message;
- Calculates the digest
of the original data;
- Compares both
digests;
- If they are equals it
continues process… (Stabla).
Authentication
is trickier and is a justified reason why large-value payments will probably
not be conducted using e-mail for some time. It is technically feasible to
build a public key infrastructure and an e-mail payment system to authenticate
parties to a transaction. This would in turn provide strong authentication. But
this is not necessarily a good user experience and is certainly not an
established practice.
So
in the end, electronic transmission of funds using e-mail can provide
significant benefits. Convenience is of course first and foremost in this
category. It could also provide viable security and possible cost savings. As
it happens, it is not something that is truly necessary in the short term. It
is possible however in the future that it may become more commonplace.
2.2
Account-Based Systems: PayPal
One of the more generic account
based systems is PayPal. It is a widely used online payment solution that works
solely off of the existing financial infrastructure. Once a user has a PayPal
account and has entered information about the bank accounts they wish to draw
from, they can send money to anyone with an e-mail account. The money is then
taken from the sender and placed in a PayPal account for the recipient.
Basically, PayPal can be thought of as a middle man for credit card
transactions. All transactions between consumers take place indirectly through
PayPal. Currently the payment method of choice for auction such as eBay, PayPal
has shown itself to be a viable payment solution for individuals. Similar to
other web based transactions, PayPal automatically encrypts confidential
information in transit from the consumer’s computer to the merchant’s using the
Secure Sockets Layer protocol (SSL) with an encryption key length of
128-bit. However it does not have the security features that are needed for
larger business transactions. Once again though, similar to the credit card
itself, the advantages of PayPal are both primarily ease of use and scalability
since it does not need to create a new infrastructure in order to go through
with transactions.
2.3 Account-Based Systems: General
As stated earlier, account based
systems use the SSL protocol in order to create a secure transaction between
the consumer and merchant. But as the internet marketplace continues to expand,
there is no safe standards-based payment system. With this protocol, the
card number is safely passed on to the merchant and protected from stealing or
changing information during transmission. But, neither non-repudiation nor
fraudulent use of card numbers are fully protected against, since merchants
stock all confidential account information about his clients on his server. In the
case of an SSL transaction the purchaser has no certainty that merchant will
guard properly payment card information. Moreover he or she has no assurance
that merchant is authorized to accept credit card payments. On the other hand,
the merchant has no assurance that client is legible to use the payment card.
Secure Electronic Transaction (SET)
is a payment protocol developed by VISA and MasterCard based on the RSA
algorithm. It helps to ensure security of data during financial transactions
over the Internet. Very similar to SSL, SET mainly depends on cryptology and
digital signature technologies. With SET, the cardholder uses software called
an “electronic wallet”, in which the credit card numbers and digital
certificate are stored. The merchant will acquire a digital certificate from a
financial institution. Both the cardholder and the merchant will present their
digital certificates to each other in order to verify their identities when
conducting transactions over the Internet. During an SET transaction, the
cardholder’s credit card number is not be seen by the merchant, as an encrypted
code of the credit card number is sent to the credit card issuer, which
approves the transaction for the merchant (Secure Electronic Transaction). In
this way, unauthorized viewing and data corruptions will be prevented during
transmission. SET is simply a better version of SSL.
Now
that we’ve examined the functionality of account based systems we can turn our
attention to electronic cash or currencies.
3 Electronic Currencies: Smart Cards
You
can think of the smart card as a "credit card" with a
"brain" on it, the brain being a small embedded computer chip. This
card-computer can be programmed to perform tasks and store information. Smart
cards currently are used in telephone, transportation, banking, healthcare
transactions, and the Internet. Smart cards are already being used extensively
in Japan
and Europe and are gaining popularity in the U.S. (DiGiorgio).
The
reason we classify them as an electronic currency is because systems
that employ smart cards like Chipknip, Chipper, Belgium Proton, Mondex, and
Visa Cash represent money as a number on the card. With this in mind, they act
like an electronic purse. The value is
stored on a card and if the card is lost the money is gone, in a fashion
similar to cash (Abrazhevich).
The advantages of smart cards are numerous. First, they are
more reliable than a magnetic stripe card. They can also store a hundred times
more information than a magnetic stripe card. In terms of security, they are
more difficult to tamper with than magnet stripes. Furthermore they can be
disposable or reusable. And finally they can perform multiple functions in a
wide range of industries because of their compatibility with portable
electronic devices such as phones, PDAs, and PCs (DiGiorgio).
3.1
Electronic Currencies: E-Cash
”Electronic money is broadly defined as an electronic store of monetary
value on a technical device that may be widely used for making payments to
undertakings other than the issuer without necessarily involving bank accounts
in the transaction, but acting as a prepaid bearer instrument” (European
Central Bank).“Electronic money products are defined […] as stored value or prepaid products in which a record of the funds or value available to the consumer is stored on a device in the consumer’s possession. This definition includes both prepaid cards (sometimes called electronic purses) and prepaid software products that use computer networks such as the internet (sometimes called digital cash)” (Bank for International Settlement ).
Summing
these up, one can state that e-money is not like anything that has been
attempted before. It creates new sub-category of money. It constitutes, at the
same time, payment instrument, monetary value and account units, making it
operate just like cash would (Stabla).
There
are two types of e-money: identified and anonymous. Identifiable e-money
operates similar to bank products because the identity of the user and the way
of spending is well known to financial institutions and the latter can easily
track the circulation of e-money in the economy. Anonymous e-money is totally
untraceable and to create it a blind signature is needed. The process of the
blind signing is a modification of the traditional digital signing process
(Stabla). To understand the process we must first keep in mind that special
software by the issuer creates an e-banknote upon a user’s request and after
verification. In essence, the prepared message or e-banknote is multiplied by a
random factor and thereby the receiver (issuer) knows nothing about the content
except that it carries the user’s digital signature (to identify user’s account
for deduction). After the issuer signs the e-banknote to confirm its validity,
it returns to the user who divides the e-banknote by the same factor. Now he
can use it keeping whole anonymity while the issuer does not know anything
about the blind factor (Stabla). The following diagram provides some
structure about how the E-Cash system in general works.
Smart Cards and E-Cash provide
distinct advantages and disadvantages when compared to account based systems.
Smart Cards could be seen as a large advancement over the system of credit
cards. In terms of E-Cash, similar to physical cash, there is an ability to
create anonymity during financial transactions. In effect, it could be
untraceable if done with a blind signature. A significant disadvantage,
however, is that a large database of past transactions need to be kept to
prevent double spending when it comes to E-Cash. Because E-Banknotes would be
quite easy to duplicate, systems need to be in place to keep track of all notes
that have been issued, but not yet deposited. This obviously reduces the
scalability and ease of use for the system. Furthermore, there may be a
necessity to purchase and install extra hardware and software adding burden to
both the merchant and consumer. These are probably the reasons that such
promising companies like DigiCash fell flat to the ground.
After looking at the present, both
the account based systems and electronic currencies, we can now examine what
the future holds in the world of electronic payment systems.
4 Future of Electronic Payment Systems: RF-Ids
Radio barcodes embedded into
billions of different things which have value sending out radio signals about
what they are and where they are. They cannot communicate with each other
directly, but can exchange information through base stations that send and
receive information. These devices are tiny micro-computer systems which
already cost as little as a quarter and are used in such companies as Wal-Mart.
They already allow retail outlets to know what goods are going in out of their
doors. They provide absolute precision about what remains in stock. The future
of electronic payment systems could be walking through a terminal with products
and services ranging from bottles of wine to travel tickets using a card that
never leaves your pocket. All the terminal needs to do is get the pulses
emitted from the radio barcodes on each item and send a signal to the card in
your pocket. The transaction will automatically occur without the need of a
clerk or a register. In theory, RFIDs could enable a person to read all
the numbers and expiration information on the credit cards in your pocket as
you walk by, as well as where you do most of your clothes shopping, and the
model of the portable computer you are carrying in your briefcase, simply by hacking into the ID communication
system (Dixon). Obviously there are a lot of security details that need to be
taken care of, but this is just a glimpse of what could possibly be the next
step in the evolution of electronic payment systems, from paper bills to credit
cards to digital cash to RF-ids? The answer lies within the ability of RFID
creators to create a system that is highly scalable and easy-to-use for the
consumer so it doesn’t have the same roadblocks that E-Cash finds itself
having.
5 Conclusion
After highlighting both account
based systems and electronic currencies we have seen both advantages and
disadvantages. Account systems provide both ease of use and scalability but
don’t allow the same freedom of anonymity that physical cash allows. In
contrast, electronic currencies can provide this freedom but fall short when it
comes to an implementation of their systems without a lot of overhead and
change in infrastructure. The system that enjoys the most success are clearly
those that don’t force the consumer to make drastic changes leaving credit card
based transactions as the most viable alternative to physical cash at the moment.
But with technology continuing to evolve one thing is for sure, it is clear
that there will be a continued movement towards the elimination of physical
cash. Ongoing work needs to be done to figure out the most feasible solution in
this 21st century effort. Though much more research needs to be
done, perhaps RF-Ids are that killer innovation that people will come to
accept.
Lab for Cryptography: Symmetric &
Asymmetric Encryption[1]
In this practical you will learn how encryption
works, and how symmetric and asymmetric (public key) encryption
operate so that a body of sensitive information may be transmitted securely
across a network.
The traditional use of cryptography was
to make messages unreadable to the enemy during wartime. However the
introduction of the computing age changed this perspective dramatically.
Through the use of computers, a whole new use for information hiding was evolved.
Around the early 1970s the private sector began to feel the need for
cryptographic methods to protect their data. This could include 'sensitive
information' (corporate secrets), password files or personal records.
Computer encryption is based on the science
of cryptography, which has been used throughout history. Most forms of
cryptography these days rely on computers, simply because a human-based code is
too easy for a computer to crack. An encryption algorithm, or cipher,
is used to encrypt normal text, or plaintext. This encrypted text is
then known as ciphertext. Trying to regenerate the original plaintext
from the ciphertext is known as decryption.
Most computer encryption systems belong
in one of two categories:
·
Symmetric encryption (often referred to as secret-key, private
or single-key encryption)
·
Asymmetric encryption (also known as public-key or two-key
encryption)
The encryption key and the decryption key
may or may not be the same. When they are the cryptosystem is called a
"symmetric key" system; when they are not it is called an
"asymmetric key" system. The most widely known instance of a
symmetric cryptosystem is DES (Data Encryption Standard). One of the most
widely known implementations of an asymmetric key cryptosystem is RSA.
Note: Practical Report Required!
For this lab, you are
expected to write up a concise report on what you did. The main thing is to
convey your understanding of each of the steps taken. Any questions asked
during the procedure text should be answered and you should provide a summary
at the end.
Report format: Flexible (MS Word doc or HTML are ok)
Length: Max 2 pages
Delivery: Printout
Deadline: 1 week after lab date
1
Secret Key (Symmetric)
Encryption
1.1
Background to DES
IBM initially developed the Data Encryption
Algorithm in the 1960s. They used concepts that had been described by Claude
Shannon in the 1940s and called their technique Lucifer. Lucifer was
refined, renamed the DEA (Data Encryption Algorithm) and adopted as the
standard in 1976.
1.2
Implementing DES
The DEA performs a transformation on a
block of 64 bits using a 56-bit key. i.e. it takes 64 bits of the plaintext
(data to be encrypted) and changes it into a different array of 64 bits (the
ciphertext), using a key (known only by the person 'sending' the message and
the person 'receiving' it). It does this in several steps, using several kinds
of transformations. Crucial to the DEA
is the concept of a permutation. This just means that the bits are put in a
different order, i.e. jumbled up.
Firstly the Initial Permutation (the IP
takes the 64 bits, and changes their order around according to a fixed
permutation, so the 58th bit becomes the first bit, the 50th bit becomes the
2nd bit, etc) is applied to the 64-bit plaintext. The result is then divided
into two 32-bit halves, named L0 and R0. Then, the following happens 16 times:


For Iteration
Number i (see diagram left):
·
Key transformation number i (a
permutation, but dropping 8 bits off - defined in the specification) is applied
to the key to produce 48 bits.
·
Let A be Li and J be
the transformed key. Apply the function f(A,J) (explained below) to produce a
32 bit output.
·
Exclusive Or Ri and
f(A,J), and call this Ri+1.
·
Make Li+1 = Ri
Next (see
diagram left), 16 iterations of a function f are applied. f takes 32 bits of
the plaintext (A) and 48 bits of the key (J). An expansion function is applied
to A, which swaps some of the bits around, and adds an extra 16 of them, which
expands it out to 48 bits. The expanded A and J are then combined, using Exclusive
Or. This 48 bit block is then put through some S boxes (explained soon) to
produce an output of 32 bits. Finally another permutation called P is applied
DES is a fairly
weak encryption technique that uses 56-bit keys. It uses the same key to encrypt
as to decrypt. There is only the private key, which both sender and receiver
must know. A personal computer could crack DES-encoded message within a year; a
group of them could do it proportionately faster. This is one reason why DES is
considered less secure than other encryption methods, and why it has evolved
into the Advanced Encryption Standard (AES). The advantage DES has over public
key encryption is that it is much faster to compute.
1.3
Lab Procedure:
First of all:
1.
Organise yourselves into
groups of two or three. You will exchange files and keys with the other
person(s).
2.
Change the settings on
Windows to make file extensions viewable.
Launch Windows Explorer, Tools menu, select Folder Options and then the View tab. Then uncheck Hide extensions for known file types.
This is not essential, but makes it easier to see what’s going on.
Launch Windows Explorer, Tools menu, select Folder Options and then the View tab. Then uncheck Hide extensions for known file types.
This is not essential, but makes it easier to see what’s going on.
Encrypting:
3.
Create a new folder and
save the DES.zip
file to it. Extract all files to the folder.
4.
Create a new text file with
some plaintext as its body e.g “My name is Mary”. Save this file in the folder
you created.
5.
When saving this file
select All Types as the “Save as file type” and give your file name the
extension “.open” e.g. jbloggsfile.open.
6.
At the command prompt
simply type java des to run the GUI (N.B. you must first
navigate into the folder you extracted the DES.zip file to).
7.
When the GUI opens,
generate a random key. Take a note of this key so that it can be used to
decrypt the ciphertext
8.
Browse and select the jbloggsfile.open
file that is to be encrypted, and press Encrypt
9.
An jbloggsfile.close file
will automatically be generated in the default folder you are working from.
View its contents to see what the ciphertext looks like! You may need to terminate
the program with ctrl-c to be able to view the contents of the file.
Sharing key
& encrypted file:
10.
Give your encrypted file (jbloggsfile.close)
to the other member(s) of your group, either by email or on a disk
11.
Write down your
(hexadecimal) key and share it with them.
Decrypting:
12.
Receive a key and file from
each other member(s) of your group. This
should have a .close extension
13.
Try to open their file with
Notepad to see if it makes any sense (it shouldn’t!)
14.
Enter their key
15.
Browse and select the their
file, and press Decrypt (this is so that the ciphertext generated from the
Encryption part above is put through the same algorithm)
16.
A new file with a .open extension
is created in the folder which should have the original plaintext he/she first
entered in as its content body in step 4 above
Exercise
Question:
17.
Create a new file, this
time with a lot of text (say 1MB in total). Call it bigfile.open.
Encrypt it to give bigfile.close. Use WinZip to compress both of
them. Which resulting zip file is
bigger? Why is this the case?
2
Public Key (Asymmetric)
Encryption
2.1
Background to RSA
The acronym stands for Rivest, Shamir,
and Adleman, the inventors of the technique. RSA is a very powerful encryption
algorithm that is based on the public key encryption method. Public key
encryption means that you have two pairs of keys, public and private. You give
the public key to everyone and keep the private key to yourself. Then, people
can encrypt data using the public key and send it to you. Only you can decrypt
the message as only you have the private key; the message cannot be decrypted
using the public key.
2.2
Implementing RSA
Two really big prime numbers are needed
on order to implement RSA. Prime numbers are numbers that do not divide into
anything else other themselves or 1 e.g. 7, 13, 29, 101. Next, we find the
product of the two big prime numbers, so let N = First prime number * Second
Prime number. This is one part of the public key. To find the second number we
must understand what relatively prime numbers are. Relatively prime
numbers are numbers that share no factors at all e.g. 7 and 13 are relatively
prime, 15 and 5 are not. Now we have to check whether N and p*q are relatively
prime i.e. p = the first prime number – 1 and q = the second prime number – 1.
To do this, we have to find a number E in which gcd[2](E,
p-1*q-1) = 1.
ð N and E together are the public key pair.
Next, we have to find the private key
pair. The private key is such: D = E-1 mod ((p-1)(q -1))
Mod (modulus) is the remainder after
division. So, D is the remainder left after E-1 is divided by the
product of the first prime number and the second prime number.
ð D and E are our private key pair
This means that:
ð (N and E) is the public key pair and (D and E) is our private key
pair.
So, to encrypt a letter A, having S as
the ciphertext, it would be done like this –
S = AE mod N
To decrypt the alphabet and obtain the
original text –
A = SD mod N
2.3
Lab Procedure
1.
Extract all files to a new
folder from the RSA.zip
file
2.
A quick way to see how this
works is to open the QuickStartRSA.html file that also has helpful guides to
the code that is being implemented by the program. However, running the program
from the command line is more useful to see what is happening with the
calculations!
3.
At the command prompt go to
the required directory
4.
Run the program by
using java RSA. You also
need to include here, at the end of the command, some value that represents the
size in bits of each generated prime number used in the calculations e.g. 8,
16, 32, 64…512 (java RSA 8)
5.
The prime numbers p
and q are then generated (and displayed) as well as the public key pair
(N and E) and private key pair (D and E)
6.
You are then prompted for
some plaintext. Enter something!
7.
The ciphertext is
displayed.
8.
Experiment with changing
the size of the prime number to see the variation in the ciphertext and the
difference in the degree of difficulty that would occur when trying to decipher
the two
3
Performance Testing
As you will have
seen, encryption and decryption take time, especially on slow computers. In
this section, you will benchmark the performance of the applications chosen.
3.1
Lab Procedure
DES Performance
1.
Create 4 or 5 test files of
varying sizes, from a few bytes to about 500KB.
2.
For each file, record how
much time it takes to (a) encrypt and (b) decrypt using DES
3.
Tabulate and graph your
results in your report
4.
On average, how many bits
per second can this encryptor process on your machine? Comment.
RSA Performance
5.
Run 4 or 5 times, varying
the size of the prime numbers used (number of bits) and record how much time it
takes
6.
Tabulate and graph your
results in your report
7.
Comment
Chapter 9
Intranets, Extranets, and Enterprise Collaboration
4
LECTURE
NOTES
SECTION
I: The Intranets and Extranets in
Business
9-1 The Intranet Revolution: [Figure 9.2]
Many businesses realize that intranets enable
them to use Internet and World Wide Web technologies to support communication,
collaboration, and business processes throughout the internetworked enterprise.
Analysing U.S. West Communications
We can learn a lot how companies are using
intranets as a key technology platform to support their business processes, as
well as enterprise communications and collaboration
from the Real World Case of U.S. West
Communications.
Take a few minutes to read it, and we will
discuss it (See U.S. West Communications in section XI)
Intranet characteristics include:
1. An intranet is a network inside an
organization that uses Internet technologies (such as web browsers and servers,
TCP/IP network protocols, HTML hypermedia document publishing and databases,
and so on) to provide an Internet-like environment within the enterprise for
information sharing, communications, collaboration, and the support of business
processes.
2. An intranet is protected by security measures
such as passwords, encryption, and fire walls, and thus can be accessed by
authorized users throughout the Internet.
3. A company’s intranet can also be accessed
through the intranets of customers, suppliers, and other business partners via extranet links.
9-2 Applications of Intranets:
Organizations are implementing a broad range of
intranet uses. Several common functional
intranet business applications include:
1. Marketing
2. Finance
3. Human Resources
4. Sales
5. Manufacturing
6. Training
7. Customer Information
Intranet
applications support communications and collaboration, web publishing, business
operations and management, and intranet management. These applications can be integrated with
existing IS resources and applications, and extended to customers, suppliers,
and business partners.
$
Communications and Collaboration
Intranets
can significantly improve communications and collaboration within an
enterprise. Examples include:
1. Using an intranet browser and PC or NC
workstation to send and receive E-mail, voicemail, paging, and faxes to
communicate with others within your organization, and externally through the
Internet and extranets.
2. Use intranet groupware features to improve team
and project collaboration with services such as discussion groups, chat rooms,
and audio and videoconferencing.
$
Web Publishing:
The
advantages of developing and publishing hyperlinked multimedia documents to
hypermedia databases accessible on World Wide Web servers has moved to
corporate intranets. The comparative
ease, attractiveness, and lower cost of publishing and accessing multimedia
business information internally via intranet web sites has been one of the
primary reasons for the explosive growth in the use of intranets in
business. Examples include:
1. Company newsletters, technical drawings, and
product catalogues can be published in a variety of ways including hypermedia
and web pages, E-mail, net broadcasting, and as part of in-house business
applications.
2. Intranet software browsers, servers, and
search engines can help you easily navigate and locate the business information
you need.
Business Operations and Management:
Intranets are being used as the platform for
developing and deploying critical business applications to support business
operations and managerial decision making across the internetworked
enterprise. Employees within the
company, or external business partners can access and run such applications
using web browsers from anywhere on the network whenever needed. Examples include:
1. Many companies are developing customer
applications like order processing, inventory control, sales management, and
executive information systems that can be implemented on intranets, extranets,
and the Internet.
2. Many applications are designed to interface
with, and access, existing company databases and legacy systems. The software for such businesses uses
(sometimes called applets or crossware) is then installed on intranet web
servers.
3. Employees within a company, or external
business partners, can access and run applications using web browsers from
anywhere on the network whenever needed.
9-3 Intranet Technology Resources
Since intranets are Internet-like networks
within organizations, they depend on all of the information technologies that
make the Internet possible. These
include:
1. TCP/IP client/server networks
2. Hardware and software such as web browsers and server
suites
3. HTML web publishing software
4. Network management and security programs
5. Hypermedia databases
9-4 The Business Value of Intranets
Studies
have shown that early adopters of intranets has provided them with impressive
returns and high paybacks at low costs. Many corporate intranet users and
consultants to the
global
business community has been that companies should get going fast on pilot
intranet projects, or quickly expand any current intranet initiatives.
Examples of
Business Value:
The
text outlines several examples of how top-rated companies have been able to
derive cost savings or revenue benefits from their intranet applications. These include:
1. Provide better access to financial reports
and improve productivity, speed, and control.
Employees select from preformatted reports and create their own
subscription lists.
2. Access to engineering documents and
information. Reduces paper costs and
increases speed of information transfer.
3. Global staffing tool for project teams. Able to find skilled staff and reduces time
and effort to complete projects.
4. Group intranet supports manufacturing,
engineering, and marketing. Allows for
each document exchange and reduces paper costs.
5. Internal web site for sales and customer
service. Reduces call volume and
increases sales with greater salesforce involvement.
6. DataDoc Online. Reflects daily changes on video rentals,
books, music, and software across 115 retail locations. Saves IS time and improves data accessibility
and accuracy.
7. KeyCorp’s knowledge bank distributes job
postings, information on best practices and training, marketing, and
newsletters.
8. Knowledge management and corporate
communications system facilitates collaboration on projects. Productivity increased via information
exchange and streamlining workflow.
9. Marketing, planning, and operations. Shares business information for improved
decision making, efficiency, and competitiveness.
10.Each area on
the manufacturing has its own home page updated every 60 seconds. Improves process and quality.
Publication
Cost Savings
Many
companies are replacing the publication of paper documents, company
newsletters, and employee manuals with electronic multimedia versions published
on intranet web servers. Elimination of
printing, mailing, and distribution costs is a major source of cost
savings. Companies are also publishing:
1. Telephone directories
2. Human resource materials
3. Company policies
4. Job openings
5. Many other former paper-based communications
Training and
Development Cost Savings:
Developing
information access and web publishing for an intranet is a lot easier than many
traditional methods. Learning how to use
a web browser for the company intranet is fast
and
easy. Training and development costs for
many intranet applications are low, especially for communication,
collaboration, and information sharing.
Electronic versions of training materials on intranet web sites can
reduce the amount of costly classroom training in business.
Measuring
Costs and Benefits:
Justifying
the initial cost of investing in an intranet does not seem to be a problem for
many organizations. In many instances,
payback time is achieved within a relatively short period of time. The effectiveness of the intranet can often
justify the cost of the project.
9-5 The Role of Extranets
Extranets are network links that use
Internet technologies to interconnect the intranet of a business with the
intranets of its customers, suppliers, or other business partners. Companies can:
1. Establish direct private network links
between themselves, or create private secure Internet links between them called
virtual private networks.
2. Use the unsecured Internet as the extranet
link between its intranet and consumers and others, but rely on encryption of
sensitive data and its own fire wall systems to provide adequate security.
The
business value of extranets is derived from several factors:
$
The
web browser technology of extranets makes customer and supplier access of intranet resources a lot easier and faster
than previous business methods
$
Extranets
enable a company to offer new kinds of interactive Web-enabled services to their business partners. Thus, extranets are another way that a
business can build and strengthen strategic relationships with its
customers and suppliers.
$
Extranets
enable and improve collaboration by a business with its customers and
other business partners.
$
Extranets
facilitate an online, interactive product development, marketing, and
customer- focussed process that can bring
better designed products to market faster.
9-6 The Future of Intranets and Extranets
Intranets and extranets will become even more
pervasive in the business future. One
recurring theme for the future of intranets and extranets is the need to move
beyond information publishing applications.
Companies are planning more inquiry processing and transaction
processing applications that tie the Internet, intranets, and extranets to
mainframe and other legacy systems and databases. Though such applications are more costly and
difficult to develop, many companies are forging ahead. These Internet-using companies are in the
process of Web-enabling operational
and managerial support applications, including online transaction processing,
database integration, and executive information and decision support.
SECTION II: Enterprise Collaboration Systems
9-7 Enterprise Collaboration: [Figure 9.21]
Enterprise
collaboration systems provide tools to help us collaborate - to communicate
ideas, share resources, and coordinate our cooperative work efforts as members
of the many formal and information process and project teams and workgroups
that make up many of today’s organizations.
The goal of
enterprise collaboration systems is to enable us to work together more easily
and effectively by helping us to:
· Communicate - sharing
information with each other
· Coordinate -
coordinating our individual work efforts and use of resources with each other
· Collaborate -
working together cooperatively on joint projects and assignments
Teams, Workgroups, and Collaboration
There are many types of teams and workgroups,
each with its own work styles, agendas, and computing needs.
Workgroup - can be defined as two or more
people working together on the same task
or
assignment.
Team - can be
defined as a collaborative workgroup,
whose members are committed to collaboration,
that is, working with each other in a cooperative
way that transcends the coordination of individual work activities
found in a typical workgroup.
Characteristics of teams and workgroups:
1. Teams and workgroups can be as formal and
structured as a traditional business office or department. Or they can be less formal and structured
like the members of process teams in
a manufacturing environment.
2. Teams and workgroups can be as informal,
unstructured, and temporary as an ad hoc task force or a project team whose members work for different organizations in
different parts of the world.
3. Members of a team or workgroup don’t have to
work in the same physical location. They
can be members of a virtual team, that is, one whose members are united by the
tasks on which they are collaborating, not by geography or membership in a
larger organization.
Enterprise
Collaboration System Components
The
enterprise
collaboration system is an
information system. Therefore, it
uses
hardware,
software, data, and network resources to support communication, coordination,
and collaboration among the members of business teams and workgroups.
9-8 Groupware for Enterprise Collaboration
Groupware can be defined as collaboration software that helps teams
and workgroups work together in a variety of ways to accomplish joint projects
and group assignments.
Groupware
is designed to make communication and coordination of workgroup activities and
cooperation among end users significantly easier, no matter where the members
of a team are located. Groupware helps
the members of a team collaborate on group projects, at the same or different
times, and at the same place, or at different locations.
Many
industry analysts believe that the capabilities and potential of the Internet,
as well as intranets and extranets, are driving the demand for enterprise
collaboration tools in business. On the
other hand, it is Internet technologies like web browsers and servers,
hypermedia documents and databases, and intranets and extranets, that are
providing the hardware, software, data, and network platform for many of the
groupware tools for enterprise collaboration that business users want.
Groupware
provides software tools for:
$
Electronic
communication
$
Electronic
conferencing
$
Collaborative
work management
9-9 Electronic Communication Tools [Figure 9.36]
Electronic communication tools include electronic mail, voice mail,
bulletin board systems, and faxing. They enable you to electronically send
documents and files in data, text, voice, or multimedia form over computer
networks. This helps you share
everything form short voice and text messages to copies of project documents
and data files with your team members.
Electronic Mail
E-mail has become a vital, fast, and convenient way
to communicate and build strategic relationships with each other in
business. E-mail has also become an
important medium for transporting electronic copies of documents, data files,
and multimedia content.
The downsize of the E-mail phenomenon is:
$
The information overload
$
The
torrent of unsolicited junk E-mail
(called spamming)
Internet Phone and Fax
You can use the Internet for telephone, voice mail,
faxing, and paging services. All you
need is a suitably equipped PC and software such as Internet Phone by
VocalTech, or Netscape Conference or Microsoft NetMeeting. The minimum PC requirements are a 75 MHZ
Pentium microprocessor, 28.8 KBPS modem, 16 megabytes of memory, a sound card,
speaker and microphone, and Windows 95 or Windows NT.
Web Publishing
Web publishing can be viewed as an important electronic communications tool for
enterprise collaboration. Application
software suites and other programs now enable you to publish hyperlinked
documents in HTML directly to Internet or intranet web sites. Intranet web publishing has become a much
more efficient and effective way of communicating among teams and workgroups
than previous paper or electronic methods.
9-10 Electronic Conferencing Tools
[Figure 9.36]
Electronic conferencing tools helps people
communicate and collaborate while working together. A variety of conferencing methods enable the
members of teams and workgroups at different locations to exchange ideas
interactively at the same time, or at different times at their
convenience. Electronic conferencing options
also include electronic meeting systems,
where team members can meet at the same time and place in a decision room setting. Electronic conferencing tools include:
$
Data
and voice conferencing
$
Videoconferencing
$
Chat
systems
$
Discussion
forums
$
Electronic
meeting systems
Data and Voice
Conferencing
Voice
conferencing can be accomplished with Internet telephone software and groupware
that supports telephone conversations over the Internet or intranets on PCS.
Data
conferencing is also popularly called whiteboarding. In this method, a groupware package connects
two or more PCS over the Internet or intranets so a team can share, mark up,
and review a whiteboard of drawings,
documents, and other material displayed on their screens.
Videoconferencing:
Videoconferencing is an enterprise collaboration
tool that enables realtime video/audio conferences among:
1. Networked PCS, known as desktop videoconferencing
2. Networked conference rooms or auditoriums in different
locations, called teleconferencing.
Characteristics
of videoconferencing:
1. Team and enterprise collaboration can be
enhanced with a full range of interactive video, audio, document, and
whiteboard communications among the online participants.
2. Desktop videoconferencing can now take place
over the Internet, intranets, extranets, as well as public telephone and other
networks.
3. Videoconferencing over the Internet,
intranets, and extranets is proving to be an efficient, economical, and
effective way of supporting communications and collaboration among physically
displaced teams and workgroups.
4. Reduces travel time and money to attend
meetings results in increased team productivity as well as cost and time
savings.
Limitations
of desktop videoconferencing:
1. Jerky motions of video images and the lack of
nonverbal communications from “talking heads” displays of videoconference
participants
Teleconferencing is an important form of
enterprise collaboration.
Characteristics
of teleconferencing:
1. Team and enterprise collaboration can be
enhanced with a full range of interactive video, audio, document, and
whiteboard communications among the online participants.
2. Sessions are held in real time, with major
participants being televised while participants at remote sites may only take
part with voice input of questions and responses.
3. Teleconferencing can also consist of using
closed-circuit television to reach multiple small groups, instead of using
television broadcasting to reach large groups at multiple sites.
4. Several major communications carriers offer
teleconferencing services for such events as sales meetings, new product
announcements, and employee education and training.
Limitations
of teleconferencing:
1. Some organizations have found that
teleconferencing may not be as effective as face-to-face meetings, especially
when important participants are not trained in how to communicate using their
systems.
2. Cost of providing teleconferencing services
and facilities can be substantial and make teleconferencing not as cost
effective as expected.
Discussion Forums
This
category of collaboration tools includes Internet and intranet newsgroups,
discussion groups, and discussion databases.
Characteristics
of discussion forums:
1. Are an extension of the earlier concept of
online bulletin board systems (BBS)m
which allowed users to post messages and download data and program files form
the online services, businesses, and individual BBS operators.
2. Are an outgrowth of the long time and
widespread use of newsgroups to provide a forum for online text discussions by
the members of special interest user groups on the Internet and the major
online services.
3. Can be used by companies to create or
encourage communities of interest or
virtual communities.
4. Discussion forum groupware can keep track of
the discussion contributions of each participant, organize them by a variety of
key word discussion topics, and store them in a discussion database (threaded discussions, virtual discussion
groups, discussion tracking, and discussion databases). This creates threads of discussion contributions on each topic over a period of
time that can be tracked and retrieved from the discussion database for
analysis.
5. Discussion forum groupware can be used to
create a virtual discussion group where discussion forum groupware can create a
virtual discussion group by weaving together the threads of contributions on
the same topic by people, who had been participants in other online discussion
groups.
Chat Systems
Chat
enables two or more people to carry on online realtime text conversations. Characteristics of chat systems:
1. You can converse and share ideas
interactively by typing in your comments and seeing the responses on your
display screen.
2. Chat is an important tool for enterprise
collaboration on corporate intranets, especially where voice and
videoconferencing have not been implemented.
One advantage of chat is that it records and stores the dialogues of all
participants, so that other team members can review them later.
3. Chat rooms are also being added to Internet
and intranet web sites as another way to encourage participation and
collaboration by customers or employees.
Electronic
Meeting Systems [Figure 9.36]
Organizations
frequently schedule meetings as decision-making situations that require interaction
among groups of people. The success of
group decision making during meetings depends on such factors:
1. The characteristics of the group itself
2. The characteristics of the task on which the group is
working
3. The organizational context in which the group
decision-making process takes place
4. The use of information technology such as electronic
meeting systems
5. The communication and decision-making processes the
group utilizes
Information
technology can provide a variety of tools to increase the effectiveness of
group decision making. Known generally
as group support systems (GSS), these
technologies include a category of groupware known as electronic meeting systems (EMS).
Research
studies indicate that electronic meeting systems produce several important
benefits.
Computer
support makes:
$
Group
communications easier
$
Protects
the anonymity of participants
$
Provides
a public recording of group communications (group memory).
This significantly improves the efficiency,
creativity, and quality of communication, collaboration, and group decision
making in business meetings.
9-11 Collaborative Work Management Tools: [Figure 9.36]
Collaborative work management tools help people accomplish or
manage group work activities. This
category of groupware includes:
$
Calendaring
and scheduling tools
$
Task
and project management
$
Workflow
systems
$
Knowledge
repositories
Calendaring
and Scheduling
Calendaring
and scheduling tools are a groupware extension of many of the capabilities
provided by desktop accessory packages and personal information managers, and
mainframe office automation
systems. These packages enable you to
use electronic versions of a variety of office tools such as calendar,
appointment book, address book, contact list, and task to-do list.
Task and
Project Management
Project
management and personal information packages can be used to do task and project
management on your PC.
Characteristics
of task and project management groupware:
1. Project management groupware helps project teams work
together and helps team members keep track of the many tasks and timelines
involved. These tools produce project
schedules, program reports, and automatic reminders of due dates for project
tasks.
2. Task and project management groupware also produces
charts to help plan and track projects.
These charts include:
Gantt
Chart
Critical
Path Method (CPM)
Program
Evaluation and Review Technique (PERT)
Workflow
Systems
Workflow
systems are related to task and project management, as well as a type of
electronic document processing called document
image management.
Characteristics
of workflow systems:
1. Workflow systems involve helping knowledge
workers collaborate to accomplish and manage structured work tasks within a
knowledge-based business process.
2. Workflow systems are typically based on rules
that govern the flow of tasks and task information contained in business forms
and other documents.
Knowledge
Management
Knowledge
management is a tool of enterprise collaboration that groupware packages use to
organize, manage, and share the diverse forms of business information created
by individuals and teams in an organization.
Groupware application software stores this information in document
libraries, discussion databases, knowledge repositories, and web site
hypermedia databases. These forms of
stored information help create a knowledge
base or organizational memory of
strategic business information to be shared within the organization. Knowledge bases are part of the knowledge management systems being
developed and used by many companies.
5
6
Issues of Security and Privacy
in Electronic Commerce
6.1.1
Part I ---- Introduction &
Motivation
6.2
6.3
Peixian LI
6.3.1
6.3.2
Introduction
Since the
invention of the World Wide Web (WWW) in 1989, Internet-based electronic
commerce has been transformed from a mere idea into reality. Consumers browse
through catalogues, searching for best offers, order goods, and pay them
electronically. Information services can be subscribed online, and many
newspapers and scientific journals are even readable via the Internet. Most
financial institutions have some sort of online presence, allowing their
customers to access and manage their accounts, make financial transactions,
trade stocks, and so forth. Electronic mails are exchanged within and between
enterprises, and often already replace fax copies. Soon there is arguably no
enterprise left that has no Internet presence, if only for advertisement
reasons. In early 1998 more than 2 million web servers were connected to the
Internet, and more than 300 million host computers. And even if actual Internet
business is still marginal: the expectations are high. For instance, Anderson
consulting predicts Internet business to grow from $10 billion in 1998 to $500
billion in 2002.
Thus, doing some
electronic business on the Internet is already an easy task. As is cheating and
snooping. Several reasons contribute to this insecurity: The Internet does not
offer much security per-se. Eavesdropping and acting under false identity is
simple. Stealing data is undetectable in most cases. Popular PC operating
systems offer little or no security against virus or other malicious software,
which means that users cannot even trust the information displayed on their own
screens. At the same time, user awareness for security risks is threateningly
low.
A report from
Goldman, Sachs & Conotes that while commercial properties such as Yahoo!
and eBay receive a lot of attention from investors, business to business
ECommerce is on the verge of exponential growth. The report predicts that
ECommerce will be worth USD1.5 trillion by 2004. However, according to a survey
by Net Effect Systems, while 94 percent of online consumers use the Internet to
shop, just 10 percent say they prefer to buy things online. 74 percent of
consumers cited security and privacy concerns.
Therefore, if the
security and privacy problems are addressed e-shoppers will be converted into
e-buyers, and the ECommerce will be pushed a big step forward.
6.3.3
Non-technical Issues
1.
Security Awareness
Most opinion surveys list "insecurity of
financial transactions" and "loss of privacy" among the major
impediments to electronic commerce, but in fact most users have only ague ideas
about the threats and risks, and a very limited understanding of the technical
and legal options for minimizing their risk. As a result all kinds of
misperceptions exist.
For instance, the
cardholder's risk in sending his or her credit card number over the Internet is
typically overestimated. At least as of this writing payments over the Internet
are treated like mail-order/telephone-order transactions, which means that the
cardholder is not liable at all. All risk is with the merchant.
On the other hand, the risks in sending
sensitive data in an electronic mail are typically underestimated. Probably
most users of email know the mere facts: neither confidentiality nor integrity
nor availability is guaranteed. But nevertheless many users do not hesitate to
send all kind of very personal and sensitive data to their friends or
colleagues, unprotected.
Unfortunately,
developers of electronic commerce solutions are often as security unaware and
ignorant as their prospective users. For instance, still many developers demand
that security must be provided by "lower layers" in a
"transparent" way. But, for instance, Secure Socket Layer (SSL) in an
"opaque socket integration" does not make any sense in most case.
Security has to be an integral part of the architecture, design, and
implementation.
1.
Crypto Regulations
Several
countries regulate the deployment of strong encryption technology by law. For
instance, France controls the domestic use of encryption technology, in order
to maintain the capability to eavesdrop on the communication of criminals. The
USA prohibits the export of strong encryption products for the mass market, for
the same reasons as it controls the export of munitions.
Such
regulations do not discriminate between “good” and “bad” applications, and
limit the security of honest citizens and companies to at least the same extent
as they limit the security of terrorists and organized crime. Therefore several
governments, in particular the US administration, are willing to relax their
crypto regulations, provided access to the encrypted information would still be
possible on demand. The idea is to introduce new “Trusted Third Parties” where
secret keys must either be escrowed in advance, or can be recovered afterwards.
All these proposals
are still heavily contested, for various technical and political reasons: The
Trusted Third Parties would be “single points of failure” for everybody’s,
i.e., new and extremely attractive targets for attacks. It is questionable
whether any regulation of encryption technology can be effective in fighting
organized crime: tools for strong encryption are publicly available, and
steganographic techniques can perfectly conceal the fact that cryptographic
techniques are applied.
Many types of
commercial transactions require strong confidentiality, which cannot be
satisfied in some countries, or across some borders. For instance, consider two
large companies that prepare a merger. Clearly their negotiations require top
confidentiality. Even the fact that they are preparing the merger, i.e., that
they acre communicating intensively, will be extremely sensitive. This requires
actually services for anonymous communication. Nevertheless using the
appropriate cryptographic tools would be illegal in many countries.
Political
regulations are not subject to scientific research. But we clearly see the need
for an international agreement on a more liberal and consistent regulation of
cryptography. Electronic commerce demands strong confidentiality, which can be
implemented only by strong encryption schemes.
2.
Legal Issues
Surveying the
open legal problems in electronic commerce is beyond the scope of this article.
The two most important security-related problems are the following:
·
Liability: The financial risk
of a user in a specific transaction depends on his or her liability. In
principle, if a user bears no liability, there is no risk.
The main issue
here is fairness: The liability of a user should correspond to the security of
his or her technical equipment. For instance, if it is technically trivial to
forge the digital signature of a user then this party should not be held liable
for his or her signatures, in general.
·
Harmonization: The national
laws that regulate electronic commerce over the Internet (like evidential value
of digital signatures, consumer protection, copyright protection) are not
harmonized, and are partially contradictory. One side result is that there is
no mutual recognition between national PKIs, even where comparable laws exist.
1.1.1
Technical Components of
eCommerce Security
There are four
components involved in ECommerce Security: client software, server software,
the server operating system, and the network transport. Each component has its
own set of issues and challenges associated with securing them:
- Client
software is becoming increasingly more security-focused, however
single-user desktop operating systems historically have had no security
features implemented. ECommerce software that relies on the security of
the desktop operating system is easily compromised without the enforcement
of strict physical controls.
- Server
software is constantly under test and attack by the user community.
Although there have been cases of insecurities, a system administrator
keeping up with the latest patches and vendor information can provide a
high degree of confidence in the security of the server itself.
- Operating
systems used for hosting ECommerce servers are securable, but rarely
shipped from the vendor in a default configuration that are secure. ECommerce
servers must protect the database of customer information accumulating on
the server as well as provide security while the server is handling a
transaction. If it is easier for a thief to compromise the server to
obtain credit card numbers, why bother sniffing the network for individual
credit card numbers?
- Session
transport between the client and server uses network protocols that may
have little or no built-in security. In addition, networking protocols
such as TCP/IP were not designed to have confidentiality or authentication
capabilities.
1.1.2
Why No Unified Standard Method
The methods and models of securing ECommerce
transactions are as diverse as the transactions themselves. ECommerce transactions are performed with
varying levels of security, from sending requests in the clear, to encrypted
password protection, to using digital certificates.
So why not simplify things by implementing one
standard method for securing ECommerce transactions? The problem with creating
one standard solution is that there are different and sometimes conflicting
goals in securing a transaction. The objectives of the merchant may not be the
same as those of the user or bank. The merchant, for example, requires a valid
transaction, liability coverage, and payment for goods and services. The user
would like to purchase a product, protect privacy (name, address, and payment
information), and pay for only the products they have agreed to purchase. The
institutions providing payment would like to detect and prevent fraud. Many
security solutions address one or more of these security goals—but where one
solution may focus on providing privacy, another may focus only on transaction
validation.
In addition to the differences in security goals,
vendors and governments introduce complications into selecting security
standards for ECommerce. Vendors disagree on implementations and try to push
their own products into standards. National governments try to limit and
control use of encryption to secure ECommerce transactions. One of the benefits
of ECommerce is that it allows a small company to distribute and sell products
globally. But national laws and regulations can dilute the standards to the
lowest common denominator.
2
3
4
5
Issues of Security and Privacy
in Electronic Commerce
5.1.1
Part II ---- State-of-the-art
Report
5.2
Peixian LI
5.2.1
Cryptography & Pretty Good
Privacy (PGP)
1.
The need for cryptography in
electronic communications
Cryptography
has been around for centuries; as long as there has been communication, there
has been the need for privacy and safe, secure methods of transmission.
Although many types of difficult problems can be classified as cryptography
problems, what we are mostly concerned with today is the ability to keep
transmissions private through the use of data encryption techniques. This has
become an even greater issue due to the changing nature of communications since
the information revolution. More and more people rely on electronic communications
for the transmission of sensitive or personal data; e-mail, e-commerce, FTP,
and HTML are all examples of technology that have already filtered into the
social consciousness as primary ways for disseminating and gathering
information and for exchanging goods and services. While this technological
shift has made communication faster, easier, and better in many ways, it has
also brought along with it a whole host of difficult problems and social policy
issues.
The main
problem that comes with electronic communications is the ease with which
transmissions can be eavesdropped or impersonated. Paper communications
obviously have security problems as well: documents can be stolen, steamed
open, have forged signatures or changed contents. However, if someone is trying
to catch a specific transmission (or type of communication), it is much easier
when dealing with an electronic medium. It is a trivial matter for people to
set up programs that systematically scan e-mail for keywords, or that sniff
packets in a Telnet session for passwords, whereas randomly steaming open mass
quantities of paper mail looking for a certain document is clearly infeasible.
Also, since there can be (and often are) multiple copies of any given
electronic transmission, it is difficult to know if someone has stolen a copy
or somehow altered the original.
Secondly,
there is an access control problem. Many electronic transmissions are made in a
broadcast manner, as seen with cable or satellite television and wireless
phones. People can install devices to intercept these transmissions, and
senders usually have no way to either monitor or stop this. In order to prevent
unwanted people from making free use of their services, senders must encrypt
their outgoing transmissions. To their paying customers, they can give special
devices to decrypt the information.
Finally, there
is the problem of authentication: electronic communications are impersonal, and
can be easily forged by impersonating IP addresses, changing "sender
fields" in e-mail, "cloning" cellular phone numbers, and so
forth. In order for people to want to - and, indeed, be able to - use
electronic communication in the coming years, it is essential that these
problems be resolved. Right now, advances in cryptography are the best way to
address these issues. Data encryption not only provides privacy and access
control by rendering communications illegible to unauthorized parties; it can
provide effective authentication as well through the use of digital signatures
and timestamps.
2.
The primary forms of
cryptography
There are two main forms of cryptography:
secret-key (or symmetric) and public-key (or asymmetric).
Secret-key
cryptography
Secret-key
cryptography is the more traditional form, and has been used for all kinds of
communications throughout the ages. In this method, one "key" is used
to both encrypt and decrypt the data. A key can be anything from a
secret-decoder ring found in a cereal box to a highly complex mathematical
algorithm; keys really only differ in the ease with which they can be broken by
third parties. In secret-key cryptography, the sender and receiver must have
the same key in order for the transmission to work correctly.
Secret-key
cryptography suffers from two overwhelming problems. First, any two people that
want to communicate with each other must first agree on the key to use. This
makes it more difficult to send information to people that you do not already
know, and large-scale communication becomes much more difficult. The second,
more fundamental, problem is that of "key management", which is the
system for transmission and storage of keys. In order to agree on a key, there
must first be some sort of communication that occurs, and this communication
itself can be eavesdropped. If some third party catches the key that is being
used, then all further communications between the two parties are no longer
secure and private. Also, the third party could easily impersonate
communications because it is believed that no one else knows the key. This
problem is exacerbated by the fact that the initial parties might have no way
of knowing that the key was stolen. This key management issue causes a
"repudiation problem": later on, either of the parties could
repudiate messages that had been sent with secret-key encryption, claiming that
the key had been stolen and that the messages were compromised or faked. Thus,
there is always an inherent lack of security and trust in a purely secret-key
environment.
Public-key
cryptography
The key
management problem inherent to secret-key cryptography needed to be addressed
in order for large-scale, secure use of data encryption techniques. In 1976,
Whitfield Diffie, a cryptographer and privacy advocate, and Martin Hellman, an
electrical engineer, working together discovered the concept of public-key
encryption. Instead of having one key shared among both users of an encrypted
transmission, each user has his or her own public/private key pair. A user
makes the public key open and available to anyone (by publishing it on-line or
registering it with a public key server), and keeps the private key hidden away
where (hopefully) no one can get at it. The private key is mathematically
derived from the public key, and thus the two are linked together. In order to
send someone a message, the sender encrypts the transmission with the
receiver's public key. This can then only be decrypted by the receiver's
private key. Thus, anyone can encrypt a message with someone else's public key,
but only that person would ever be able to read it.
This method
solves the problems of secret-key cryptography. Because the only key
information that needs to be shared is made public, there is no worry about
some third party intercepting and possessing the key. This makes the users of
the encryption surer that their transmissions are secure and private. It also
solves the repudiation problem, because there is no third party that could ever
be blamed - each individual is responsible for safeguarding his or her own
private key.
The inherent
weakness of the public-key method is that the two keys are linked together
mathematically. If a third party figures out the exact way that an individual's
private key is derived from his or her public key, the whole security of the
system will be lost. The only way around this liability (so far) has been to
make the derivation so incredibly complex that a brute force attempt to crack
it would take a prohibitively long amount of time. As Phil Zimmerman, author of
the Pretty Good Policy (PGP) public-key encryption package says of his
software: "if they [the NSA] are just having to use methods that are not
too much shorter than what we know in published academic literature, then it
could be from now until the next ice age before they can break it." It is
easy to see that the quality of the method used to create keys is essential to
the success of any public-key system.
Digital
signatures
Public-key
also provides a mechanism for authenticating messages that secret-key
techniques do not: digital signatures. The sender of a message completes a
calculation (performed by a hash function) involving the actual file structure
to be transmitted, and his or her private key, and the result of this (the
digital signature itself) is appended to the end of the transmission. The
receiver can then perform a calculation involving the received message and the
sender's public key, and if everything is valid, the sender's identity will
have been verified. A benefit of this signature method is that it not only
verifies the sender's identity; it also verifies that the original contents of
the transmission have not been altered in anyway. Because the signature is
derived from both the key and the data itself, changing the data later on will
cause the receiver's verification to fail. This provides authentication that is
even better than a signature on a paper document: a signature can be forged, or
the contents of the document could somehow be secretly altered, but with
public-key authentication, this cannot be done.
Comparison
of cryptography methods
Clearly,
public-key systems have the advantage in terms of security and privacy, due to
a key management strategy that is inherently more secure. They are also more
convenient because there is no extra step necessary to decide on a common key,
and the sender does not have to communicate with the receiver prior to the
actual transmission. This is an advantage when people who do not actually know
each other want to communicate, and when an individual wants to disseminate
information on a large scale. Furthermore, public-key systems provide an extra
layer of authentication, via the digital signatures, that is missing in
secret-key systems; this property of non-repudiation is essential, especially
when dealing with transmissions of a critical nature.
The primary
disadvantage of public-key systems is the fact that they are slower, due to the
extra steps involved in the encryption/decryption process. One way around this
is to use a "digital envelope", which is a combination of the best
features of public- and secret-key systems. A message is encrypted with
secret-key cryptography, and the encrypted message and the secret key itself
are transmitted via public-key cryptography to the receiver. This allows the
actual messages to be sent using the speed of secret-key cryptography, but
using the public-key method to prevent the secret-key from being intercepted.
The two parties could then continue to use their secret key for as long as they
deemed appropriate, because they have already paid the one-time overhead cost
of sending the secret key.
Because of the
different natures of these two cryptography schemes, there is no one method
that is always best for every given situation. Secret-key cryptography can be
best taken advantage of when there is already a closed, secure environment
(such as a well-protected LAN) or single-user environment (such as a user
encrypting files on a non-networked PC). Public-key cryptography is usually
preferable when there is an open, unsecured, multi-user environment (such as
the Internet), and there is no safe, reliable way to transmit private key
information.
3.
What is Pretty Good Privacy
(PGP) and Why is it popular
Pretty Good
Privacy (PGP) was developed by Phil Zimmerman in 1991, as a response to a
controversial measure in Senate Bill 266 that would have required all
encryption techniques to include a back door for law enforcement. PGP is
software that combined several high-quality, existing public-key encryption
algorithms and protocols into one package for secure, reliable electronic mail
and file transfer. PGP provides not only encryption of data, but digital
signatures, data compression, and smooth compatibility with e-mail systems. It
is able to run on multiple platforms, and it is freely available for download
in the US. Due to the usage of RSA, IDEA, Diffie-Hellman, 3DES, and CAST
algorithms, PGP falls under the export restrictions of the ITAR, and may not be
legally exported.
For sending
digital signatures, PGP uses an efficient algorithm that generates a hash code
from the user's name and other information about the data to be transmitted.
This hash code is then encrypted with the sender's private key. The receiver
uses the sender's public key to decrypt the hash code. If it matches the hash
code sent as the digital signature for the message, then the receiver is sure
that the message has arrived securely from the stated sender.
PGP is pretty
popular now, especially in the email system, because of its advantages:
·
The software is available - for
personal use - for free worldwide, in versions that run on a variety of
platforms, including DOS, Windows, Unix, and Macintosh.
·
PGP is based on algorithms that
have survived extensive public review and are considered extremely secure (such
as RSA, IDEA, MD5, and Diffie-Hellman).
·
PGP has a wide range of
applicability. It can be used by corporations that want to enforce a
standardized scheme for encrypting files and messages, by individuals who wish
to communicate securely over the Internet and other networks, by political
groups actively resisting the government in totalitarian countries, and so on.
·
It was not developed by, nor is
it controlled by, any governmental or standards organization. For the many
people with an instinctive distrust of "the establishment" or Big
Brother, this makes PGP attractive.
1.
What is PGP’s limitation
The main
weakness in a public system is this: How do I know that the public key really
belongs to my correspondent?
The most
trivial case is the one where the correspondents have had an opportunity to
meet, and they've handed over a copy of their keys on floppy disk. They can
each be sure that the keys belong to the other person. Obviously, if it is
possible to do this then it is surely a good method of knowing that a key may
be trusted, however, it is not always practical - otherwise why use Public Key?
What if the correspondents never met? This is where key signatures come in.
If you have
personally verified that a given key belongs to a given person, then it is
common practice to sign that key. The signature is made with your private key -
so only you can make the signature - your signature may be verified by anybody,
comparing the signature with your public key.
Now suppose
Alice and Bob have a mutual friend, David. David has signed both Alice's key
and Bob's key, and both Alice and Bob have a verified copy of David's key.
When Bob examines Alice's key he observes
that her key was signed by David, Bob trusts that David is reliable when it
comes to signing other people's keys. Therefore Bob can be fairly certain that
the key belongs to Alice.
The thing with
PGP in particular is that YOU decide who is trustworthy when it comes to key
signing. For instance, it could be that David signs any old key without really
verifying the key (as described above) - or it could be that David's private
key doesn't belong to David at all. In these cases you'd mark David's key as
being "untrustworthy" and his signature would carry no weight.
In this way,
by verifying and signing keys wherever possible a "web of trust" may
be built up. With trusted keys vouching for new keys. Of course, the weak point
is now that person who signs a key without justification - this is why PGP is
configurable to allow the user to say how much they trust a key's owner to sign
other keys, how many valid signatures are required for a valid key, etc.
1.1.1
1.1.2
Protocols for Securing
ECommerce Transaction
The security
of ECommerce transactions depends both on the network protocols and the payment
framework used to perform the transaction.
1.1.2.1 Network
Transport Security
Models such as
SET, CAFÉ, DigiCash, First Virtual, and Millicent provide a secure payment
method. However, the transaction still depends on the privacy and
authentication of the data stream. Basic TCP/IP networking protocols do not
include encryption and strong authentication. Higher level protocols such as
HTTP, FTP, and Telnet do little to provide advanced security measures beyond
userid and password authentication. All information sent using these protocols
is unencrypted, so the data stream lacks confidentiality.
Traditional
networking protocols and applications are unable to enforce strong security
measures for performing ECommerce transactions securely. This lack of security
led to the design and implementation of many new security protocols that strive
to reach different security goals. There are some secure transport protocols
that provide confidentiality and authentication between systems and
applications by using encryption. The following section describes some of the
more popular secure transport protocols.
·
![]() |
Virtual Private Networking (VPN)
The Internet’s
lack of security may leave you leery. What can you do if you just want to give
company insiders and a few select business partners and customers easy and
relatively secure remote access to company data via the Internet? You can set
up a virtual private network.
Virtual
Private Networking technology provides the medium to use the public Internet
backbone as an appropriate channel for private data communication. With
encryption and encapsulation technology, a VPN essentially carves out a private
passageway through the Internet. VPNs will allow remote offices, company road
warriors, and even business partners or customers to use the Internet, rather
than pricey private lines, to reach company networks. So the companies can save
a lot of money.
You can also
use VPNs to link remote LANs together or give traveling staffers, work-at-home
employees, and business partners a simple way to reach past company firewalls
and tap into company resources. Virtual private networks are flexible. They are
point-to-multipoint connections, rather than point-to-point links. They can be
set up or closed down at the network administrator's will, making them ideal
for short-term projects.
VPN has many
advantages: It is much cheaper for connecting WANs than 800 numbers or
dedicated T1 lines. It provides encryption and authentication services for a
fairly good measure of privacy. Maintenance of the WAN-to-WAN connection is
left to Internet Service Providers. It is highly flexible, and can be set up
and taken down very easily.
Virtual
private networks may be new, but the tunneling technology they're based on is
well established. Tunneling is a way to transfer data between two similar
networks over an intermediate network. Also called "encapsulation”,
tunneling encloses one type of data packet into the packet of another protocol,
in this case TCP/IP. VPN tunneling adds another dimension to the tunneling
procedure--before encapsulation takes place, the packets are encrypted so the
data is unreadable to outsiders. The encapsulated packets travel through the
Internet until they reach their destination, then the packets are separated and
returned to their original format. Authentication technology is employed to
make sure the client has authorization to contact the server.
·
IPSec (Ipv6)
PSec is a
framework of open standards developed by the Internet Engineering Task Force
(IETF). IPSec provides security for transmission of sensitive information over
unprotected networks such as the Internet. IPSec acts at the network layer,
protecting and
authenticating IP packets between
participating IPSec devices ("peers"), such as Cisco routers.
IPSec provides
the following network security services. These services are optional. In
general, local security policy will dictate the use of one or more of these
services:
Data Confidentiality---The IPSec sender can encrypt packets before
transmitting them across a network.
Data Integrity---The IPSec receiver can authenticate packets sent by the
IPSec sender to ensure that the data has not been altered during transmission.
Data Origin Authentication---The IPSec receiver can authenticate the
source of the IPSec packets sent. This service is dependent upon the data
integrity service.
Anti-Replay---The IPSec receiver can detect and reject replayed packets.
With IPSec,
data can be transmitted across a public network without fear of observation,
modification, or spoofing. This enables applications such as Virtual Private
Networks (VPNs), including intranets,
extranets, and remote user access.
IPSec security
services are provided at the network layer, so you do not have to configure
individual workstations, PCs, or applications. This benefit can provide a great
cost saving. Instead of providing the security services you do not need to
deploy and coordinate security on a per-application, per-computer basis, you
can simply change the network infrastructure to provide the needed security
services.
Because IPSec is standards-based, Cisco devices will be able to
interoperate with other IPSec-compliant networking devices to provide the IPSec
security services. IPSec-compliant devices could include both Cisco devices and
non-Cisco devices such as PCs, servers, and other computing systems.
Cisco and its partners, including Microsoft, are planning to offer IPSec
across a wide range of platforms, including Cisco IOS software, the Cisco PIX
Firewall, Windows 95, and Windows NT. Cisco is working closely with the IETF to
ensure that IPSec is quickly standardized.
A mobile user will be able to establish a secure connection back to his
office. For example, the user can establish an IPSec "tunnel" with a
corporate firewall---requesting authentication services---in order to gain
access to the corporate network; all of the traffic between the user and the
firewall will then be authenticated. The user can then establish an additional
IPSec tunnel---requesting data privacy services---with an internal router or
end system.
IPSec provides support for the Internet Key Exchange (IKE) protocol and
for digital certificates. IKE provides negotiation services and key derivation
services for IPSec. Digital certificates allow devices to be automatically
authenticated to each other without the manual key exchanges required by Cisco
Encryption Technology. This support makes IPSec preferable in many cases for
use with medium-sized, large-sized, and growing networks, where secure
connections between many devices is required.
In simple
terms, IPSec provides secure tunnels between two peers, such as two routers.
You define which packets are considered sensitive and should be sent through
these secure tunnels, and you define the parameters which should be used to
protect these sensitive packets, by specifying characteristics of these
tunnels. Then, when the IPSec peer sees such a sensitive packet, it sets up the
appropriate secure tunnel and sends the packet through the tunnel to the remote
peer.
More
accurately, these tunnels are sets of security associations that are
established between two IPSec peers. The security associations define which
protocols and algorithms should be applied to sensitive packets, and also
specify the keying material to be used by the two peers. Security associations
are unidirectional and are established per security protocol (AH or ESP).
With IPSec you
define what traffic should be protected between two IPSec peers by configuring
access lists and applying these access lists to interfaces by way of crypto map
sets. Therefore, traffic may be selected based on source and destination
address, and optionally Layer 4 protocol, and port. (Similar to CET, the access
lists used for IPSec are used only to determine which traffic should be
protected by IPSec, not which traffic should be blocked or permitted through
the interface. Separate access lists define blocking and permitting at the
interface.
A crypto map set can contain multiple
entries, each with a different access list. The crypto map entries are searched
in order---the router attempts to match the
packet to the access list specified in
that entry.
When a packet matches a permit entry in a
particular access list, and the corresponding crypto map entry is tagged as
cisco, then CET is triggered, and connections
are established if necessary.
If the crypto
map entry is tagged as ipsec-isakmp, IPSec is triggered. If no security
association exists that IPSec can use to protect this traffic to the peer,
IPSec uses IKE to negotiate with the remote peer to set up the necessary IPSec
security associations on behalf of the data flow. The negotiation uses
information specified in the crypto map entry as well as the data flow
information from the specific access list entry. (The behavior is different for
dynamic crypto map entries. Refer to the section "Creating Dynamic Crypto
Maps (Requires IKE).")
If the crypto
map entry is tagged as ipsec-manual, IPSec is triggered. If no security association
exists that IPSec can use to protect this traffic to the peer, the traffic is
dropped. (In this case, the security associations are installed via the
configuration, without the intervention of IKE. If the security associations
did not exist, IPSec did not have all of the necessary pieces configured.)
Similar to
CET, the router will discard packets if no connection or security association
exists.
Once
established, the set of security associations (outbound, to the peer) is then
applied to the triggering packet as well as to subsequent applicable packets as
those packets exit the router. "Applicable" packets are packets that
match the same access list criteria that the original packet matched. For
example, all applicable packets could be encrypted before being forwarded to
the remote peer. The corresponding inbound security associations are used when
processing the incoming traffic from that peer.
If IKE is used
to establish the security associations, the security associations will have
lifetimes so that they will periodically expire and require renegotiation.
(This provides an additional level of security.)
Multiple IPSec
tunnels can exist between two peers to secure different data streams, and each
tunnel uses a separate set of security associations. For example, some data
streams might be just authenticated while other data streams are both encrypted
and authenticated.
Access lists
associated with IPSec crypto map entries also represent which traffic the
router requires to be protected by IPSec. Inbound traffic is also processed
against the crypto map entries---if a packet matches a permit entry in a
particular access list associated with an IPSec crypto map entry, that packet
is dropped because it was not sent as an IPSec-protected packet.
·
Secure Socket Layer (SSL)
SSL is the
Secure Sockets Layer protocol. Version 2.0 originated by Netscape Development
Corporation, and version 3.0 was designed with public review and input from
industry. SSL (Secure Sockets Layer) is a communication system that ensures
privacy when communicating with other SSL-enabled products. Technically
speaking, SSL is a protocol that runs above TCP/IP and below HTTP or other
top-level protocols. It is symmetric encryption nested within public-key
encryption, authenticated through the use of certificates. An SSL connection
can only occur between an SSL-enabled client and an SSL-enabled server. In
fact, when a server is running in SSL mode, it can only communicate through
SSL. http://developer.netscape.com/docs/manuals/proxy/adminux/encrypt.htm
Essentially,
SSL is symmetric encryption nested within public-key encryption, authenticated
through the use of certificates. An SSL connection can occur only between an
SSL-enabled client and an SSL-enabled server. In fact, when a server is running
in SSL mode, it can communicate only through SSL.
TCP/IP is
Transmission Control Protocol/ Internet Protocol, the basic language of the
Internet, and HTTP is Hypertext Transfer Protocol, the basic language of the
graphical World Wide Web, a subset of the Internet.
Technically speaking, SSL is a protocol that
runs above TCP/IP and below HTTP, NNTP, or other top-level protocols, as shown
in the figure below.
1.1.2.2
How SSL relates to TCP/IP and
application protocols.

An SSL connection is initiated by a network
browser when it asks a server to send a document through HTTPS, LDAPS, SNEWS,
or other secure protocol.
Here are the general steps of SSL-encrypted
communication:
1.The client sends a request to connect to
the secure server.
2.The server sends its presigned certificate
to the client. This, and the first step, are collectively known as the
handshake.
3.The
client checks whether the certificate was issued by a CA it trusts. If so, it
proceeds to the next step. Otherwise, the client can cancel the connection or
proceed. Netscape Navigator and Netscape Communicator display a warning message
saying the certificate isn't trusted and then asks the user if they want to
proceed or not.
4.The client compares the information in the
certificate with the information it just received concerning the site: its
domain name and its public key. If the information matches, the client accepts
the site as authenticated.
5.The client tells the server what ciphers,
or types of encryption keys, it can communicate with.
6.The server chooses the strongest common
cipher and informs the client.
7.Using that cipher, the client generates a
session key (a symmetric encryption key used only for this transaction) and
encrypts it using the server's public key.
8.The client encrypts the session key using
the server's public key, then it sends the encrypted session key to the server.
9.The server receives the encrypted session
key and decrypts it using its private key.
10.The client and the server use the session
key to encrypt and decrypt the data they send to each other.
Most
commercial Web servers and browsers, as well as many free Web servers, support
SSL. On the downside, SSL suffers from the government encryption limitations
that hamper the use of cryptography in secure ECommerce.
·
Private Communications Technology
SSL, created
by Netscape, provides users with authentication of the server they are
attaching to, encryption of the data sent and received, and integrity of the
data being sent and received. PCT, created by Microsoft, provides protection
against eavesdropping on a network or altering a network packet.
The Private
Communications Technology (PCT) protocol furnishes the following elements of
transmission security for client/server relationships over the Internet:
Provides symmetric session-encryption keys
between servers and clients.
Accommodates authentication of server to
client via Certificate of Authority (CA) trusted public keys; optionally, it
also authenticates client to server.
Verifies message integrity with hash function
message digests, as explained earlier for the SET protocol.

Tidak ada komentar:
Posting Komentar