Lecture 5 (SET)
Lecture 5 (SET)
Lecture 5 (SET)
• A standard protocol for securing credit card transactions over the insecure Internet.
• Developed by Visa and MasterCard, in conjunction with IBM.
➢ Data confidentiality: Without data confidentiality, consumer protection cannot
be guaranteed
➢ Authentication: Without authentication, neither the merchant nor the consumer
can be sure that valid transactions are being made.
• A protocol such as SSL keeps the card details safe from eavesdroppers, but does
nothing to protect customers from dishonest merchants.
S/MIME PGP SET
HTTP FTP SMTP
Kerberos
SSL or TLS SMTP HTTP
UDP TCP
TCP
IP
IP
1
Services provided by SET
• A secure communications channel among all parties involved in a transaction
• Authentication by digital certificates
• Privacy because the information is only available to parties in a transaction when and
where necessary
Requirements
• Provide confidentiality of payment and ordering information:
o Assure cardholders that their information is safe and accessible only to the
intended recipient.
o SET uses DES to provide confidentiality.
• Ensure the integrity of all transmitted data:
o Ensure that no changes in content occur during transmission of SET messages.
o RSA digital signatures using SHA-1 hash codes
• User authentication: provide authentication that a cardholder is a legitimate user of a
credit card account
o A mechanism that links a cardholder to a specific account number reduces the
incidence of fraud
o Digital certificates with RSA signatures.
2
• Merchant authentication: provide authentication that a merchant can accept credit
card transactions through its relationship with a financial institution
o Cardholders need to be able to identify merchants with whom they can conduct
secure transactions.
o Digital certificates with RSA signatures.
3
SET Participants
Cardholder: an authorized holder of a payment card (e.g., MasterCard, Visa) that has been
Secure Electronic Commerce Components
issued by an issuer.
Payment gateway: a function operated by the acquirer that processes merchant payment
messages. The payment gateway interfaces between merchant and the payment networks for
authorization and payment functions.
4
SET Transactions
Customer
• Opens an account with “issuer”
• Customer’s public key certificate.
Mechant
• Mechant’s Public Key Certificate
• A copy of Payment Gateway’s Key
Exchange Certificate
5
Dual Signature for SET
• Link Two Messages Intended for two different receivers:
– Order Information (OI): Customer to Merchant
– Payment Information (PI): Customer to Bank
• Goal: Limit Information to A “Need-to-Know” Basis:
– Merchant does not need credit card number.
– Bank does not need details of customer order.
- The merchant passes the payment information (PI) to the bank.
– Afford the customer extra protection in terms of privacy by keeping these items
separate. However, the two items must be linked in a way that can be used to resolve
disputes if necessary.
• This link is needed to prove that payment is intended for this order and not some other
one.
Example: if the merchant captures another order information (OI) from this customer,
the merchant could claim this order goes with the payment information (PI) rather than the
original.
The linkage prevents this. Also, merchant and bank authenticate the cardholder with the
signature.
6
Dual Signature Operation (DS)
7
DS Verification by Merchant
• Suppose that the merchant is in possession of the dual signature (DS), the OI, and the message
digest for the PI, H(PI).
• The merchant has the public key of the customer obtained from the customer’s certificate.
H(H(PI) || H(OI))
DKUc[DS]
D: Decryption KUc: customer’s public key
• If these two quantities are equal, then the merchant has verified the signature of customer.
8
DS Verification by Bank
If the bank is in possession of DS, PI, the message digest for OI, and the customer's public
key
If these two quantities are equal, then the bank has verified the signature of the customer.
9
SET Transactions
10
Purchase Request
(1) Initiate Request
(2) Initiate Response
(3) Purchase Request
(4) Purchase Response
Initiate Request
• Requires customer must have certificates of merchant and payment gateway
• Customer sends the following to merchant
– Brand of Credit Card
– ID assigned to this request/response pair by customer
– Nonce: random number used once to ensure timeliness
11
• The transaction ID assigned by the merchant is placed in both the OI and PI.
• The digital envelope. This is formed by encrypting Ks, with the payment gateway's public
key-exchange key. It is called a digital envelope because this envelope must be opened
(decrypted) before the other items listed previously can be read.
The value of Ks, is not made available to the merchant. Therefore, the merchant cannot read any of this
payment-related information.
12
13
2. Order-related information
• The PI message digest (PIMD)
• The OI
• The dual signature
• Customer certificate.
Merchant Verifies Purchase Request 1. Verifies the customer certificates by means of its CA
signatures.
2. Verifies the dual signature using the customer's public key certificate. This ensures that the
order has not been tampered with in transit and that it was signed using the cardholder's private key.
3. Processes the order and forwards the payment information to the payment gateway for
authorization.
4. Sends a purchase response to the cardholder.
14
Purchase Response Message
• Message that acknowledges the order and references corresponding transaction number
• Block is
–Signed by merchant using its private key
–Block and signature are sent to customer along with merchant’s Public Key Certificate
• Upon Reception
–Verifies merchant certificate
–Verifies signature on response block
–Takes the appropriate action
displaying a message to the user or updating a database with the status of the order.
Payment Process
– Payment authorization
During the processing of an order from a customer, the merchant authorizes the transaction with
the payment gateway. The payment authorization ensures that the transaction was approved by the
issuer.
This authorization guarantees that the merchant will receive payment; the merchant can therefore
provide the services or goods to the customer.
15
– Payment capture: obtain payment from issuer of the customer
Payment Authorization• The merchant sends an authorization request message to the payment
gateway consisting of the following:
– Purchase-related information
• PI
• Dual signature
• The OI message digest (OIMD)
• The digital envelop
– Authorization-related information
• An authorization block
16
–A transaction ID (assigned by the merchant and placed in both the OI and PI).
--Signed with merchant’s private key
–Encrypted by one-time session key generated by the merchant.
• A digital envelope. Formed by encrypting the one-time key with the payment gateway's public
key from its key exchange certificate.
– Certificates
• Customer’s public key certificate (used to verify the dual signature)
• Merchant’s public key certificate (used to verify the merchant's signature)
• Merchant’s key exchange certificate (needed in the payment gateway's response).
17
Having obtained authorization from the issuer of the customer, the payment gateway returns an
Authorization Response message to the merchant.
Authorization Response
1.Authorization-related information.
- An authorization block, signed with the gateway's private key and encrypted with a one-time
symmetric key generated by the gateway.
- A digital envelope that contains the one-time key encrypted with the merchant’s public
key-exchange key.
With the authorization from the gateway, the merchant can provide the goods or service to the
customer.
Payment Capture
To obtain payment, the merchant engages the payment gateway in a payment capture transaction
• Capture Request
18
• Capture Response.
Capture Request
• The merchant generates, signs, and encrypts a capture request block (the payment amount
and the transaction ID) with one-time symmetric key.
• A digital envelope that contains the one-time key encrypted with the payment gateway’s
public key-exchange key.
• The message also includes the merchant's public key and key-exchange key certificates.
Capture Response
• A capture response block that the gateway signs and encrypts with one-time symmetric
key.
• A digital envelope that contains the one-time key encrypted with the merchant’s public
19
key-exchange key.
• The gateway's public key certificate.
The merchant software stores the capture response to be used for reconciliation with payment received
from his bank.
At the present time, almost all online credit card orders involve the SSL protocol, because Microsoft
Internet Explorer feature built-in support SSL for online transactions.
20