E- Com Module 4&5
E- Com Module 4&5
E- Com Module 4&5
Security is an essential part of any transaction that takes place over the internet.
Customer will loose his/her faith in e-business if its security is compromised. Following
are the essential requirments for safe e-payments/transactions –
Digital signatures
The digital equivalent of a handwritten signature or stamped seal, but offering far more
inherent security, a digital signature is intended to solve the problem of tampering and
impersonation in digital communications. Digital signatures can provide the added
assurances of evidence to origin, identity and status of an electronic document,
transaction or message, as well as acknowledging informed consent by the signer.
In many countries, including the United States, digital signatures have the same legal
significance as the more traditional forms of signed documents. The United States
Government Printing Office publishes electronic versions of the budget, public and
private laws, and congressional bills with digital signatures.
How digital signatures work
Digital signatures are based on public key cryptography, also known as asymmetric
cryptography. Using a public key algorithm such as RSA, one can generate two keys
that are mathematically linked: one private and one public. To create a digital signature,
signing software (such as an email program) creates a one-way hash of the electronic
data to be signed. The private key is then used to encrypt the hash. The encrypted hash
-- along with other information, such as the hashing algorithm -- is the digital signature.
The reason for encrypting the hash instead of the entire message or document is that a
hash function can convert an arbitrary input into a fixed length value, which is usually
much shorter. This saves time since hashing is much faster than signing.
The value of the hash is unique to the hashed data. Any change in the data, even
changing or deleting a single character, results in a different value. This attribute
enables others to validate the integrity of the data by using the signer's public key to
decrypt the hash. If the decrypted hash matches a second computed hash of the same
data, it proves that the data hasn't changed since it was signed. If the two hashes don't
match, the data has either been tampered with in some way (integrity) or the signature
was created with a private key that doesn't correspond to the public key presented by
the signer (authentication).
A digital signature can be used with any kind of message -- whether it is encrypted or
not -- simply so the receiver can be sure of the sender's identity and that the message
arrived intact. Digital signatures make it difficult for the signer to deny having signed
something (non-repudiation) -- assuming their private key has not been compromised --
as the digital signature is unique to both the document and the signer, and it binds them
together. A digital certificate, an electronic document that contains the digital signature
of the certificate-issuing authority, binds together a public key with an identity and can
be used to verify a public key belongs to a particular person or entity.
Encryption
The primary purpose of encryption is to protect the confidentiality of digital data stored
on computer systems or transmitted via the Internet or other computer networks.
Modern encryption algorithms play a vital role in the security assurance of IT systems
and communications as they can provide not only confidentiality, but also the following
key elements of security:
Authentication: the origin of a message can be verified.
Integrity: proof that the contents of a message have not been changed since it was sent.
Non-repudiation: the sender of a message cannot deny sending the message.
The word encryption comes from the Greek word kryptos, meaning hidden or secret.
The use of encryption is nearly as old as the art of communication itself. As early as
1900 BC, an Egyptian scribe used non-standard hieroglyphs to hide the meaning of an
inscription. In a time when most people couldn't read, simply writing a message was
often enough, but encryption schemes soon developed to convert messages into
unreadable groups of figures to protect the message's secrecy while it was carried from
one place to another. The contents of a message were reordered (transposition) or
replaced (substitution) with other characters, symbols, numbers or pictures in order to
conceal its meaning.
Until the arrival of the Diffie-Hellman key exchange and RSA algorithms, governments
and their armies were the only real users of encryption. However, Diffie-Hellman and
RSA led to the broad use of encryption in the commercial and consumer realms to
protect data both while it is being sent across a network (data in transit) and stored,
such as on a hard drive, smartphone or flash drive (data at rest). Devices like modems,
set-top boxes, smartcards and SIM cards all use encryption or rely on protocols like
SSH, S/MIME, and SSL/TLS to encrypt sensitive data. Encryption is used to protect
data in transit sent from all sorts of devices across all sorts of networks, not just the
Internet; every time someone uses an ATM or buys something online with a
smartphone, makes a mobile phone call or presses a key fob to unlock a car,
encryption is used to protect the information being relayed. Digital rights management
systems, which prevent unauthorized use or reproduction of copyrighted material, are
yet another example of encryption protecting data.
Credit Card
Payment using credit card is one of most common mode of electronic payment. Credit card is
small plastic card with a unique number attached with an account. It has also a magnetic strip
embedded in it which is used to read credit card via card readers. When a customer purchases
a product via credit card, credit card issuer bank pays on behalf of the customer and customer
has a certain time period after which he/she can pay the credit card bill. It is usually credit card
monthly payment cycle. Following are the actors in the credit card system.
The card holder - Customer
The merchant - seller of product who can accept credit card payments.
The card issuer bank - card holder's bank
The acquirer bank - the merchant's bank
The card brand - for example , visa or mastercard.
Debit Card
Debit card, like credit card is a small plastic card with a unique number mapped with the bank
account number. It is required to have a bank account before getting a debit card from the
bank. The major difference between debit card and credit card is that in case of payment
through debit card, amount gets deducted from card's bank account immidiately and there
should be sufficient balance in bank account for the transaction to get completed. Whereas in
case of credit card there is no such compulsion.
Debit cards free customer to carry cash, cheques and even merchants accepts debit card more
readily. Having restriction on amount being in bank account also helps customer to keep a
check on his/her spendings.
Smart Card
Smart card is again similar to credit card and debit card in apperance but it has a small
microprocessor chip embedded in it. It has the capacity to store customer work related/personal
information. Smart card is also used to store money which is reduced as per usage.
Smart card can be accessed only using a PIN of customer. Smart cards are secure as they
stores information in encrypted format and are less expensive/provides faster
processing.Mondex and Visa Cash cards are examples of smart cards.
E-Money
E-Money transactions refers to situation where payment is done over the network and amount
gets transferred from one financial body to another financial body without any involvement of a
middleman. E-money transactions are faster, convenient and saves a lot of time.
Online payments done via credit card, debit card or smart card are examples of e-money
transactions. Another popular example is e-cash. In case of e-cash, both customer and
merchant both have to sign up with the bank or company issuing e-cash.
A facilitative and legal framework is sine qua non for the promotion and development of
technology like electronic commerce. Besides developing the e- infrastructure in the
country through effective Telecom Policy measures, the Indian Government is taking
appropriate steps as confidence building measures for the growth
of e-commerce. It has created the necessary legal and administrative framework
through the enactment of Information Technology Act 2000, which combines the e-
commerce transactions and computer misuse and frauds rolled into an Omnibus Act.
While on the one hand it seeks to create the Public Key Infrastructure for electronic
authentication through the digital signatures, on the other hand, it seeks to build
confidence among the public that the frauds in the cyber space will not go unpunished.
The Controller of Certifying Authority (CCA) has been put in place for the effective
implementation of the IT Act, 2000. The Act also enables e-governance applications for
the electronic delivery of services to the public, business and government.
The Information Technology Act 2000 is based on the Model Law on Ecommerce
adopted by the United Nations Commission on International Trade Law (UNCITRAL)
and pioneering e-commerce enabling legislations such as the Utah Digital Signatures
Act, 1995; the Singapore Electronic Transactions Act, 1999 and the Malaysian
Electronic Signatures Act. The main objective behind the introduction of IT Act, 2000 is
to encourage the environment in which the laws are simple and transparent and in
which the advantages of e-commerce can be tapped . The Act aims to provide legal
recognition for the transactions carried out by the means of electronic data interchange
and other means of communications, commonly referred to as “Electronic Commerce”,
which involve the use of alternatives to paper based methods of the communication and
storage of information, to facilitate electronic filing of document with the government
agencies7. The Act comprises of the three significant aspect of e-commerce:
Legal recognition of electronic records and communications- contractual framework,
evidentiary aspects, digital signatures as the method of authentication, rules for
determining time and place of dispatch and receipt of electronic records.
Regulation of Certification Authorities- appointment of a Controller of CAs, grant of
license to CAs, duties vis-à-vis subscribers of digital signature certificates, recognition of
foreign CAs.
Cyber contraventions- civil and criminal violations, penalties, establishment of the
Adjudicating Authority and the Cyber Regulatory Appellate Tribunals As the Act
establishes the legal validity and enforceability of the digital signature and electronic
records as well as the secure digital signatures and secure electronic records, it will
enable the growth of e-commerce in India, because the secure computer based
signatures will:
Minimize the incidence of electronic forgeries.
Enable and foster authentication of computerized communications.
Facilitating commerce by the means of electronic communications.
Further, electronic filing of records and retention of information in electronic formats,
enabled by the IT Act, 2000 will help in saving costs, time and manpower for the
corporate.
By virtue of the recognition given to the electronic records, electronic documents and
electronic signature, consequal amendments have been made in some existing laws.
The Act amends the Indian Panel Code, 1860, the Indian Evidence Act, 1872, Banker’s
Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934, and for the matters
connected therewith or incidental thereto. The main purpose of these amendments is to
address the related issues of electronic commerce, electronic crimes and evidence, and
to enable further regulation as regards electronic fund transfer.
Indian law is also silent on the most important issue on the domain name dispute.
Domain names are registered on the first come first served basis and in such cases,
much depend on the observations of the courts. There is no specific Indian law on
domain names except the judicial pronouncements, which have reiterated the principles
of law that domain names are valuable property and are entitled to trade mark
protection. Another very important issue in e-commerce is that relating to content. If any
site contains material that is lascivious or appeals to the prurient interest of internet
users, the uploading of the material will distinctly attract the provision of Section 67 of
the Information Technology Act 2000 and such an act will be liable for the punishment.