Skip to:Content
|
Bottom
Cover image for Protocols for secure electronic commerce
Title:
Protocols for secure electronic commerce
Personal Author:
Series:
Advanced and emerging communications technologies series
Edition:
2nd
Publication Information:
Boca Raton, FL : CRC Press, 2004
ISBN:
9780849315091

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010138987 HF5548.3 S534 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology.

The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money.

Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.


Table of Contents

1 Overview of Electronic Commerce
Abstractp. 1
1.1 What Is Electronic Commerce?p. 1
1.2 Categories of Electronic Commercep. 3
1.2.1 Examples of Business-to-Business Commercep. 4
1.2.2 Examples of Business-to-Consumer Commercep. 5
1.2.3 Examples of Neighborhood Commerce and Payments to Automatic Machinesp. 7
1.2.4 Examples of Peer-to-Peer Commercep. 8
1.3 The Influence of the Internetp. 8
1.3.1 Some Leading Examplesp. 8
1.3.2 Internet and Transactional Securityp. 9
1.3.3 Putting the Internet in Perspectivep. 11
1.4 Infrastructure for Electronic Commercep. 13
1.5 Network Accessp. 15
1.5.1 Wireline Accessp. 16
1.5.2 Wireless Accessp. 16
1.5.3 Traffic Multiplexingp. 17
1.6 Consequences of E-Commercep. 21
1.6.1 Clientsp. 21
1.6.2 Suppliersp. 22
1.6.3 Substitutesp. 22
1.6.4 New Entrantsp. 23
1.6.5 Banksp. 24
1.6.6 Role of Governmentsp. 24
1.7 Summaryp. 25
Questionsp. 25
2 Money and Payment Systems
Abstractp. 27
2.1 The Mechanisms of Classical Moneyp. 27
2.2 Instruments of Paymentp. 29
2.2.1 Cashp. 31
2.2.2 Checksp. 33
2.2.3 Credit Transfersp. 37
2.2.4 Direct Debitp. 40
2.2.5 Interbank Transfersp. 41
2.2.6 Bills of Exchangep. 42
2.2.7 Payment Cardsp. 42
2.3 Types of Dematerialized Moniesp. 46
2.3.1 Electronic Moneyp. 46
2.3.2 Virtual Moneyp. 47
2.3.3 Digital Moneyp. 48
2.4 Purses and Holdersp. 49
2.4.1 Electronic Purses and Electronic Token (Jeton) Holdersp. 49
2.4.2 Virtual Purses and Virtual Jeton Holdersp. 50
2.4.3 Diffusion of Electronic Pursesp. 51
2.5 Transactional Properties of Dematerialized Currenciesp. 53
2.5.1 Anonymityp. 54
2.5.2 Traceabilityp. 55
2.6 Overall Comparison of the Means of Paymentp. 55
2.7 The Practice of Dematerialized Moneyp. 57
2.7.1 Protocols of Systems of Dematerialized Moneyp. 57
2.7.2 Direct Payments to the Merchantp. 62
2.7.3 Payment via an Intermediaryp. 62
2.8 Banking Clearance and Settlementp. 65
2.8.1 United Statesp. 66
2.8.2 United Kingdomp. 67
2.8.3 Francep. 68
2.9 Summaryp. 69
Questionp. 70
3 Algorithms and Architectures for Security
Abstractp. 71
3.1 Security of Commercial Transactionsp. 71
3.2 Security of Open Financial Networksp. 72
3.3 Security Objectivesp. 73
3.4 OSI Model for Cryptographic Securityp. 75
3.4.1 OSI Reference Modelp. 75
3.4.2 Security Services: Definitions and Locationsp. 75
3.5 Security Services at the Link Layerp. 78
3.6 Security Services at the Network Layerp. 79
3.7 Security Services at the Application Layerp. 82
3.8 Message Confidentialityp. 83
3.8.1 Symmetric Cryptographyp. 83
3.8.2 Public Key Cryptographyp. 84
3.9 Data Integrityp. 86
3.9.1 Verification of the Integrity with a One-Way Hash Functionp. 87
3.9.2 Verification of the Integrity with Public Key Cryptographyp. 88
3.9.3 Blind Signaturep. 91
3.9.4 Verification of the Integrity with Symmetric Cryptographyp. 91
3.10 Identification of the Participantsp. 94
3.10.1 Biometric Identificationp. 94
3.10.2 Summary and Evaluationp. 100
3.11 Authentication of the Participantsp. 102
3.12 Access Controlp. 104
3.13 Denial of Servicep. 106
3.14 Nonrepudiationp. 108
3.14.1 Time-Stamping and Sequence Numbersp. 109
3.15 Secure Management of Cryptographic Keysp. 110
3.15.1 Production and Storagep. 110
3.15.2 Distributionp. 111
3.15.3 Utilization, Withdrawal, and Replacementp. 111
3.15.4 Key Revocationp. 112
3.15.5 Deletion, Backup, and Archivingp. 112
3.15.6 Comparison between Symmetric and Public Key Cryptographyp. 112
3.16 Exchange of Secret Keys: Kerberosp. 113
3.16.1 Message (1)--Request of a Session Ticketp. 114
3.16.2 Message (2)--Acquisition of a Session Ticketp. 114
3.16.3 Message (3)--Request of a Service Ticketp. 115
3.16.4 Message (4)--Acquisition of the Service Ticketp. 115
3.16.5 Message (5)--Service Requestp. 116
3.16.6 Message (6)--Optional Response of the Serverp. 117
3.17 Public Key Kerberosp. 117
3.17.1 Where To Find Kerberos?p. 118
3.18 Exchange of Public Keysp. 118
3.18.1 Diffie-Hellman Exchangep. 118
3.19 ISAKMP (Internet Security Association and Key Management Protocol)p. 119
3.20 SKIP (Simple Key Management for Internet Protocols)p. 121
3.21 Key Exchange Algorithmp. 121
3.22 Certificate Managementp. 122
3.22.1 Basic Operationp. 125
3.22.2 Description of an X.509 Certificatep. 126
3.22.3 Certification Pathp. 128
3.22.4 Hierarchical Certification Pathp. 128
3.22.5 Nonhierarchical Certification Pathp. 131
3.22.6 Cross-Certificationp. 131
3.22.7 Online Management of Certificatesp. 133
3.22.8 Banking Applicationsp. 133
3.22.9 Example: VeriSignp. 134
3.22.10 Procedures for Strong Authenticationp. 138
3.22.11 Certificate Revocationp. 140
3.22.12 Attribute Certificatesp. 141
3.22.13 Auditsp. 143
3.23 Encryption Cracksp. 143
3.24 Summaryp. 146
3.25 Appendix I: Principles of Symmetric Encryptionp. 147
3.25.1 Modes of Algorithm Utilization for Block Encryptionp. 147
3.25.2 Examples of Symmetric Block Encryption Algorithmsp. 153
3.26 Appendix II: Principles of Public Key Encryptionp. 155
3.26.1 RSAp. 156
3.26.2 Public Key Cryptography Standards (PKCS)p. 157
3.26.3 Pretty Good Privacy (PGP)p. 159
3.26.4 Elliptic Curve Cryptography (ECC)p. 159
3.27 Appendix III: Principles of the Digital Signature Algorithm (DSA)p. 161
3.28 Appendix IV: Comparative Datap. 162
3.28.1 Performance Data for JSAFE 1.1p. 163
3.28.2 Performance for S/WANp. 164
3.28.3 Performance for BSAFE 3.0p. 165
3.28.4 Performance for BSAFE 4.1p. 166
Questionsp. 166
4 Business-to-Business Commerce
Abstractp. 173
4.1 Overview of Business-to-Business Commercep. 174
4.2 Examples of Business-to-Business Electronic Commercep. 177
4.2.1 A Short History of Business-to-Business Electronic Commercep. 177
4.2.2 Banking Applicationsp. 178
4.2.3 Aeronautical Applicationsp. 178
4.2.4 Applications in the Automotive Industryp. 179
4.2.5 Other Examplesp. 180
4.2.6 Effect of the Internetp. 180
4.3 Business-to-Business Electronic Commerce Platformsp. 181
4.4 Obstacles Facing Business-to-Business Electronic Commercep. 182
4.5 Business-to-Business Electronic Commerce Systemsp. 184
4.5.1 Generation and Reception of Structured Datap. 185
4.5.2 Management of the Distributionp. 187
4.5.3 Management of Securityp. 187
4.6 Structured Alphanumeric Datap. 187
4.6.1 Definitionsp. 188
4.6.2 ANSI X12p. 189
4.6.3 EDIFACTp. 190
4.6.4 Structural Comparison between X12 and EDIFACTp. 195
4.7 Structured Documents or Formsp. 195
4.7.1 SGMLp. 197
4.7.2 XMLp. 198
4.7.3 Integration of XML with Alphanumeric EDIp. 198
4.8 EDI Messagingp. 203
4.8.1 X.400p. 203
4.8.2 Internet (SMTP/MIME)p. 204
4.9 Security of EDIp. 206
4.9.1 X12 Securityp. 207
4.9.2 EDIFACT Securityp. 208
4.9.3 IETF Proposalsp. 216
4.9.4 Protocol Stacks for EDI Messagingp. 220
4.9.5 Interoperability of Secured EDI and S/MIMEp. 221
4.9.6 Security of XML Exchangesp. 223
4.10 Relation of EDI with Electronic Funds Transferp. 223
4.10.1 Funds Transfer with EDIFACTp. 226
4.10.2 Funds Transfer with X12p. 228
4.11 Electronic Billingp. 228
4.12 EDI Integration with Business Processesp. 228
4.13 Standardization of the Exchanges of Business-to-Business Electronic Commercep. 230
4.13.1 EDI/EDIFACTp. 230
4.13.2 XML/EDI Integrationp. 234
4.13.3 XMLp. 235
4.14 Summaryp. 236
Questionsp. 236
5 SSL (Secure Sockets Layer)
Abstractp. 239
5.1 General Presentation of the SSL Protocolp. 239
5.1.1 Functional Architecturep. 240
5.1.2 SSL Security Servicesp. 241
5.2 SSL Subprotocolsp. 243
5.2.1 SSL Exchangesp. 244
5.2.2 Synopsis of Parameters Computationp. 247
5.2.3 The Handshake Protocolp. 249
5.2.4 The ChangeCipherSpec Protocolp. 258
5.2.5 The Record Protocolp. 258
5.2.6 The Alert Protocolp. 259
5.2.7 Summaryp. 261
5.3 Example of SSL Processingp. 261
5.3.1 Assumptionsp. 262
5.3.2 Establishment of a New Sessionp. 263
5.3.3 Processing of Application Datap. 270
5.3.4 Connection Establishmentp. 271
5.4 Performance Accelerationp. 274
5.5 Implementationsp. 276
5.6 Summaryp. 277
Questionsp. 278
Appendix 5.1 Structures of the Handshake Messages
A5.1 Messages of the Handshakep. 279
6 TLS (Transport Layer Security) and WTLS (Wireless Transport Layer Security)
Abstractp. 285
6.1 From SSL to TLSp. 285
6.1.1 Start of the Encryption of Transmitted Datap. 286
6.1.2 The Available Cipher Suitep. 286
6.1.3 Computation of MasterSecret and the Derivation of Keysp. 286
6.1.4 Alert Messagesp. 288
6.1.5 Responses to Record Blocks of Unknown Typep. 289
6.2 WTLSp. 290
6.2.1 Architecturep. 290
6.2.2 From TLS to WTLSp. 292
6.2.3 Service Constraintsp. 299
6.3 Summaryp. 305
Questionsp. 306
7 The SET Protocol
Abstractp. 307
7.1 SET Architecturep. 308
7.2 Security Services of SETp. 311
7.2.1 Cryptographic Algorithmsp. 312
7.2.2 The Method of the Dual Signaturep. 314
7.3 Certificationp. 316
7.3.1 Certificate Managementp. 316
7.3.2 Registration of the Participantsp. 320
7.4 Purchasing Transactionp. 326
7.4.1 SET Payment Messagesp. 327
7.4.2 Transaction Progressp. 329
7.5 Optional Procedures in SETp. 337
7.6 SET Implementationsp. 338
7.7 Evaluationp. 339
7.8 Summaryp. 341
Questionsp. 341
8 Composite Solutions
Abstractp. 343
8.1 C-SET and Cyber-COMMp. 343
8.1.1 General Architecture of C-SETp. 344
8.1.2 Cardholder Registrationp. 346
8.1.3 Distribution of the Payment Softwarep. 348
8.1.4 Purchase and Paymentp. 348
8.1.5 Encryption Algorithmsp. 351
8.1.6 Interoperability of SET and C-SETp. 352
8.2 Hybrid SSL/SET Architecturep. 353
8.2.1 Hybrid Operation SET/SSLp. 356
8.2.2 Transaction Flowsp. 358
8.2.3 Evaluation of the Hybrid Mode SET/SSLp. 361
8.3 3-D Securep. 362
8.3.1 Enrollmentp. 364
8.3.2 Purchase and Payment Protocolp. 365
8.3.3 Clearance and Settlementp. 367
8.3.4 Securityp. 368
8.4 Payments with CD-ROMp. 369
8.5 Summaryp. 370
Questionsp. 370
9 Micropayments and Face-to-Face Commerce
Abstractp. 371
9.1 Characteristics of Micropayment Systemsp. 372
9.2 Potential Applicationsp. 373
9.3 Chipperp. 374
9.4 GeldKartep. 376
9.4.1 Registration and Loading of Valuep. 377
9.4.2 Paymentp. 377
9.4.3 Securityp. 380
9.5 Mondexp. 381
9.5.1 Loading of Valuep. 382
9.5.2 Paymentp. 382
9.5.3 Securityp. 383
9.5.4 Pilot Experimentsp. 384
9.6 Protonp. 384
9.6.1 Loading of Valuep. 385
9.6.2 Paymentp. 385
9.6.3 International Applicationsp. 386
9.7 Harmonization of Electronic Pursesp. 386
9.7.1 Authentication of the Purse by the Issuerp. 387
9.7.2 Loading of Valuep. 388
9.7.3 Point-of-Sales Paymentsp. 388
9.8 Summaryp. 389
Questionsp. 389
10 Remote Micropayments
Abstractp. 391
10.1 Security without Encryption: First Virtualp. 392
10.1.1 Buyer's Subscriptionp. 392
10.1.2 Purchasing Protocolp. 392
10.1.3 Acquisition and Financial Settlementp. 394
10.1.4 Securityp. 394
10.1.5 Evaluationp. 395
10.2 NetBillp. 395
10.2.1 Registration and Loading of Valuep. 395
10.2.2 Purchasep. 396
10.2.3 Financial Settlementp. 401
10.2.4 Evaluationp. 401
10.3 KLELinep. 402
10.3.1 Registrationp. 403
10.3.2 Purchase and Paymentp. 403
10.3.3 Financial Settlementp. 406
10.3.4 Evaluationp. 406
10.3.5 Evaluation and Evolutionp. 407
10.4 Millicentp. 408
10.4.1 Secretsp. 409
10.4.2 Description of the Scripp. 409
10.4.3 Registration and Loading of Valuep. 411
10.4.4 Purchasep. 412
10.4.5 Evaluationp. 414
10.5 PayWordp. 415
10.5.1 Registration and the Loading of Valuep. 416
10.5.2 Purchasep. 417
10.5.3 Financial Settlementp. 419
10.5.4 Computational Loadp. 419
10.5.5 Evaluationp. 421
10.6 MicroMintp. 421
10.6.1 Registration and Loading of Valuep. 422
10.6.2 Purchasep. 422
10.6.3 Financial Settlementp. 422
10.6.4 Securityp. 422
10.6.5 Evaluationp. 424
10.7 eCoinp. 424
10.8 Comparison of the Different First-Generation Remote Micropayment Systemsp. 425
10.9 Second-Generation Systemsp. 427
10.9.1 Prepaid Cards Systemsp. 427
10.9.2 Systems Based on Electronic Mailp. 427
10.9.3 Minitel-like Systemsp. 430
Questionsp. 431
11 Digital Money
Abstractp. 433
11.1 Building Blocksp. 434
11.1.1 Case of Debtor Untraceabilityp. 434
11.1.2 Case of Creditor Untraceabilityp. 438
11.1.3 Mutual Untraceablityp. 438
11.1.4 Description of Digital Denominationsp. 439
11.1.5 Detection of Counterfeit (Multiple Spending)p. 442
11.2 DigiCash (Ecash)p. 445
11.2.1 Registrationp. 446
11.2.2 Loading of Valuep. 446
11.2.3 Purchasep. 447
11.2.4 Financial Settlementp. 448
11.2.5 Deliveryp. 448
11.2.6 Evaluationp. 449
11.3 NetCashp. 449
11.3.1 Registration and Value Purchasep. 450
11.3.2 Purchasep. 450
11.3.3 Extensions of NetCashp. 451
11.3.4 Evaluationp. 454
11.4 Summaryp. 455
Questionsp. 456
12 Dematerialized Checks
Abstractp. 457
12.1 Classical Processing of Paper Checksp. 458
12.1.1 Checkbook Deliveryp. 458
12.1.2 Check Processingp. 458
12.2 Dematerialized Processing of Paper-Based Checksp. 459
12.2.1 Electronic Check Presentmentp. 460
12.2.2 Point-of-Sale Check Approvalp. 461
12.2.3 Check Imagingp. 461
12.3 NetChequep. 462
12.3.1 Registrationp. 463
12.3.2 Payment and Financial Settlementp. 464
12.4 Bank Internet Payment System (BIPS)p. 466
12.4.1 Types of Transactionsp. 466
12.4.2 BIPS Service Architecturep. 467
12.5 eCheckp. 470
12.5.1 Payment and Settlementp. 470
12.5.2 Representation of eChecksp. 473
12.6 Comparison of Virtual Checks with Bankcardsp. 474
12.7 Summaryp. 476
Questionsp. 477
13 Security of Integrated Circuit Cards
Abstractp. 479
13.1 Overviewp. 479
13.1.1 Classification of Smart Cards and Their Applicationsp. 480
13.1.2 Integrated-Circuit Cards with Contactsp. 482
13.1.3 Contactless Integrated-Circuit Cardsp. 482
13.2 Description of Integrated-Circuit Cardsp. 484
13.2.1 Memory Typesp. 484
13.2.2 Operating Systemsp. 485
13.3 Standards for Integrated-Circuit Cardsp. 486
13.3.1 ISO Standardsp. 486
13.3.2 EMV (EuroPay, MasterCard, Visa)p. 487
13.4 Security of Microprocessor Cardsp. 489
13.4.1 Security during Productionp. 489
13.4.2 Physical Security of the Card during Usagep. 492
13.4.3 Logical Security of the Card during Usagep. 493
13.4.4 Examples of Authenticationp. 496
13.4.5 Evaluationp. 503
13.5 Multiapplication Smart Cardsp. 504
13.5.1 File System of ISO/IEC 7816-4p. 504
13.5.2 The Swedish Electronic Identity Cardp. 506
13.5.3 Management of Applications in Multiapplication Cardsp. 506
13.6 Integration of Smart Cards with Computer Systemsp. 509
13.6.1 OpenCard Frameworkp. 510
13.6.2 PC/SCp. 511
13.7 Limits on Securityp. 512
13.7.1 Logical (Noninvasive) Attacksp. 512
13.7.2 Physical (Destructive) Attacksp. 513
13.7.3 Attacks due to Negligence in the Implementationp. 513
13.7.4 Attacks against the Chip-Reader Communication Channelp. 514
13.8 Summaryp. 515
Questionsp. 517
14 Systems of Electronic Commerce
Abstractp. 519
14.1 SEMPERp. 519
14.1.1 SEMPER Architecturep. 520
14.1.2 Payment Terminology in SEMPERp. 522
14.1.3 The Payment Managerp. 523
14.2 CAFEp. 523
14.3 JEPIp. 526
14.4 PICS and P3Pp. 526
14.5 Analysis of User Behaviorp. 527
14.6 Fidelity Cardsp. 528
14.7 Quality of Service Considerationsp. 529
14.8 Summaryp. 530
Questionsp. 531
15 Electronic Commerce in Society
Abstractp. 533
15.1 Communication Infrastructurep. 534
15.2 Harmonization and Standardizationp. 536
15.3 Issuance of Electronic Moneyp. 537
15.4 Protection of Intellectual Propertyp. 538
15.5 Electronic Surveillance and Privacyp. 539
15.6 Filtering and Censorshipp. 543
15.7 Taxation of Electronic Commercep. 544
15.8 Fraud Preventionp. 545
15.9 Archives Dematerializationp. 545
Questionsp. 547
Web Sites
Generalp. 549
Standardsp. 549
Encryptionp. 550
Kerberosp. 550
Certificationp. 551
Biometricsp. 551
Generalp. 551
Standards Organizationsp. 552
Productsp. 552
EDIFACTp. 553
XMLp. 554
Integration XML/EDIFACTp. 554
SSL/TLS/WTLSp. 555
SETp. 555
Pursesp. 555
Micropaymentsp. 556
Smart (Microprocessor) Cardsp. 556
Electronic and Virtual Checksp. 557
SEMPERp. 558
Labeling Organizationsp. 558
Organizationsp. 559
Acronymsp. 561
Referencesp. 575
Indexp. 597
Go to:Top of Page