SlideShare a Scribd company logo
1 of 23
Download to read offline
Chapter 9:Chapter 9:Chapter 9:Chapter 9:----
Web SecurityWeb SecurityWeb SecurityWeb Security
By:- Sarthak Patel (www.sarthakpatel.in)
Outline
Web Security Requirement
SSLAndTransport Layer Security
Secure ElectronicTransactions (SET)
Firewall Design Principles
Sarthak Patel (sarthakpatel.in)2
Trusted Systems
Web Security
Web now widely used by business, government, individuals
but Internet &Web are vulnerable
have a variety of threats
integrity
confidentiality
Sarthak Patel (sarthakpatel.in)3
confidentiality
denial of service
authentication
need added security mechanisms
SSL (Secure Socket Layer)
transport layer security service
originally developed by Netscape
version 3 designed with public input
subsequently became Internet standard known asTLS
(Transport Layer Security)
Sarthak Patel (sarthakpatel.in)4
(Transport Layer Security)
usesTCP to provide a reliable end-to-end service
SSL has two layers of protocols
SSL Architecture
Sarthak Patel (sarthakpatel.in)5
SSL Architecture
SSL connection
a transient, peer-to-peer, communications link
associated with 1 SSL session
SSL session
an association between client & server
Sarthak Patel (sarthakpatel.in)6
an association between client & server
created by the Handshake Protocol
define a set of cryptographic parameters
may be shared by multiple SSL connections
SSL Record Protocol Services
message integrity
using a MAC with shared secret key
confidentiality
using symmetric encryption with a shared secret key defined by
Handshake Protocol
Sarthak Patel (sarthakpatel.in)7
Handshake Protocol
AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40,
RC4-128
message is compressed before encryption
SSL Record Protocol Operation
Sarthak Patel (sarthakpatel.in)8
SSL Change Cipher Spec Protocol
one of 3 SSL specific protocols which use the SSL Record
protocol
a single message
causes pending state to become current
hence updating the cipher suite in use
Sarthak Patel (sarthakpatel.in)9
hence updating the cipher suite in use
SSL Alert Protocol
conveys SSL-related alerts to peer entity
severity
warning or fatal
specific alert
fatal: unexpected message, bad record mac, decompression failure,
Sarthak Patel (sarthakpatel.in)10
fatal: unexpected message, bad record mac, decompression failure,
handshake failure, illegal parameter
warning: close notify, no certificate, bad certificate, unsupported
certificate, certificate revoked, certificate expired, certificate unknown
compressed & encrypted like all SSL data
SSL Handshake Protocol
allows server & client to:
authenticate each other
to negotiate encryption & MAC algorithms
to negotiate cryptographic keys to be used
comprises a series of messages in phases
Sarthak Patel (sarthakpatel.in)11
comprises a series of messages in phases
1. Establish Security Capabilities
2. ServerAuthentication and Key Exchange
3. ClientAuthentication and Key Exchange
4. Finish
SSL Handshake Protocol
Sarthak Patel (sarthakpatel.in)12
TLS (Transport Layer Security)
IETF standard RFC 2246 similar to SSLv3
with minor differences
in record format version number
uses HMAC for MAC
a pseudo-random function expands secrets
Sarthak Patel (sarthakpatel.in)13
has additional alert codes
some changes in supported ciphers
changes in certificate types & negotiations
changes in crypto computations & padding
Secure Electronic Transactions
(SET)
open encryption & security specification
to protect Internet credit card transactions
developed in 1996 by Mastercard,Visa etc
not a payment system
rather a set of security protocols & formats
Sarthak Patel (sarthakpatel.in)14
rather a set of security protocols & formats
secure communications amongst parties
trust from use of X.509v3 certificates
privacy by restricted info to those who need it
SET Components
Sarthak Patel (sarthakpatel.in)15
SET Transaction
1. customer opens account
2. customer receives a certificate
3. merchants have their own certificates
4. customer places an order
5. merchant is verified
Sarthak Patel (sarthakpatel.in)16
5. merchant is verified
6. order and payment are sent
7. merchant requests payment authorization
8. merchant confirms order
9. merchant provides goods or service
10. merchant requests payment
Dual Signature
customer creates dual messages
order information (OI) for merchant
payment information (PI) for bank
neither party needs details of other
but must know they are linked
Sarthak Patel (sarthakpatel.in)17
but must know they are linked
use a dual signature for this
signed concatenated hashes of OI & PI
DS=E(PRc, [H(H(PI)||H(OI))])
SET Purchase Request
SET purchase request exchange consists of
four messages
1. Initiate Request - get certificates
2. Initiate Response - signed response
3. Purchase Request - of OI & PI
Sarthak Patel (sarthakpatel.in)18
3. Purchase Request - of OI & PI
4. Purchase Response - ack order
Purchase Request – Customer
Sarthak Patel (sarthakpatel.in)19
Purchase Request – Merchant
1. verifies cardholder certificates using CA sigs
2. verifies dual signature using customer's public
signature key to ensure order has not been tampered
with in transit & that it was signed using cardholder's
private signature key
Sarthak Patel (sarthakpatel.in)20
private signature key
3. processes order and forwards the payment information
to the payment gateway for authorization (described
later)
4. sends a purchase response to cardholder
Purchase Request – Merchant
Sarthak Patel (sarthakpatel.in)21
Payment Gateway Authorization
1. verifies all certificates
2. decrypts digital envelope of authorization block to obtain
symmetric key & then decrypts authorization block
3. verifies merchant's signature on authorization block
4. decrypts digital envelope of payment block to obtain symmetric
key & then decrypts payment block
Sarthak Patel (sarthakpatel.in)22
key & then decrypts payment block
5. verifies dual signature on payment block
6. verifies that transaction ID received from merchant matches that
in PI received (indirectly) from customer
7. requests & receives an authorization from issuer
8. sends authorization response back to merchant
Payment Capture
merchant sends payment gateway a payment capture request
gateway checks request
then causes funds to be transferred to merchants account
notifies merchant using capture response
Sarthak Patel (sarthakpatel.in)23

More Related Content

What's hot

What's hot (10)

SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Act2000n
Act2000nAct2000n
Act2000n
 
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
 
Hyperledger whitepaper
Hyperledger whitepaperHyperledger whitepaper
Hyperledger whitepaper
 
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalDeja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
 
Deja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanDeja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet Suman
 
Technical Introduction to Hyperledger Fabric v1.0
Technical Introduction to Hyperledger Fabric v1.0Technical Introduction to Hyperledger Fabric v1.0
Technical Introduction to Hyperledger Fabric v1.0
 
Trusto Artificial Intelligence Blockchain platform 2018
Trusto Artificial Intelligence Blockchain  platform 2018 Trusto Artificial Intelligence Blockchain  platform 2018
Trusto Artificial Intelligence Blockchain platform 2018
 
PKI by Gene Itkis
PKI by Gene ItkisPKI by Gene Itkis
PKI by Gene Itkis
 
Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013
 

Viewers also liked

H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老
Tony Chen
 
Me visto, expreso y aprendo
Me visto, expreso y aprendoMe visto, expreso y aprendo
Me visto, expreso y aprendo
dec-admin
 
174.viva la familia
174.viva la familia174.viva la familia
174.viva la familia
dec-admin
 
296.tu participacion cuenta
296.tu participacion cuenta296.tu participacion cuenta
296.tu participacion cuenta
dec-admin
 
174. los infiltrados
174. los infiltrados174. los infiltrados
174. los infiltrados
dec-admin
 
Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学
junkonishimoto
 
164. juntos podemos llegar a la meta
164. juntos podemos llegar a la meta164. juntos podemos llegar a la meta
164. juntos podemos llegar a la meta
dec-admin
 
351.creando el área de juego
351.creando el área de juego351.creando el área de juego
351.creando el área de juego
dec-admin
 
Folder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLPFolder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLP
TeamInBalance
 
Fomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia socialFomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia social
dec-admin
 

Viewers also liked (20)

H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老H1336045813406八個覺悟一人幸福終老
H1336045813406八個覺悟一人幸福終老
 
Unidad 3 sección 2
Unidad 3 sección 2Unidad 3 sección 2
Unidad 3 sección 2
 
Me visto, expreso y aprendo
Me visto, expreso y aprendoMe visto, expreso y aprendo
Me visto, expreso y aprendo
 
Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
 
174.viva la familia
174.viva la familia174.viva la familia
174.viva la familia
 
96 mate2a
96 mate2a96 mate2a
96 mate2a
 
Redaccion de textos
Redaccion de textosRedaccion de textos
Redaccion de textos
 
296.tu participacion cuenta
296.tu participacion cuenta296.tu participacion cuenta
296.tu participacion cuenta
 
174. los infiltrados
174. los infiltrados174. los infiltrados
174. los infiltrados
 
84. lectura
84. lectura84. lectura
84. lectura
 
Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学Camu's philosophy カミュの哲学
Camu's philosophy カミュの哲学
 
164. juntos podemos llegar a la meta
164. juntos podemos llegar a la meta164. juntos podemos llegar a la meta
164. juntos podemos llegar a la meta
 
351.creando el área de juego
351.creando el área de juego351.creando el área de juego
351.creando el área de juego
 
FC Day2012
FC Day2012FC Day2012
FC Day2012
 
Sección 2. unidad 8 corregida1
Sección 2. unidad 8 corregida1Sección 2. unidad 8 corregida1
Sección 2. unidad 8 corregida1
 
Folder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLPFolder Duurzaam Communiceren met NLP
Folder Duurzaam Communiceren met NLP
 
Election management software gujrat
Election management software gujratElection management software gujrat
Election management software gujrat
 
Fomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia socialFomentemos los valores civicos de amistad y convivencia social
Fomentemos los valores civicos de amistad y convivencia social
 
Chocolate Box
Chocolate BoxChocolate Box
Chocolate Box
 
Sección 5. infracciones de la vida silvestre
Sección 5. infracciones de la vida silvestreSección 5. infracciones de la vida silvestre
Sección 5. infracciones de la vida silvestre
 

Similar to IS Unit 9_Web Security

IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network Security
Sarthak Patel
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
Sarthak Patel
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
koolkampus
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
Ram Dutt Shukla
 

Similar to IS Unit 9_Web Security (20)

ch17.ppt
ch17.pptch17.ppt
ch17.ppt
 
Ch17
Ch17Ch17
Ch17
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptx
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network Security
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Web Security
Web SecurityWeb Security
Web Security
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Unit -- 5.ppt
Unit -- 5.pptUnit -- 5.ppt
Unit -- 5.ppt
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket Layer
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

IS Unit 9_Web Security

  • 1. Chapter 9:Chapter 9:Chapter 9:Chapter 9:---- Web SecurityWeb SecurityWeb SecurityWeb Security By:- Sarthak Patel (www.sarthakpatel.in)
  • 2. Outline Web Security Requirement SSLAndTransport Layer Security Secure ElectronicTransactions (SET) Firewall Design Principles Sarthak Patel (sarthakpatel.in)2 Trusted Systems
  • 3. Web Security Web now widely used by business, government, individuals but Internet &Web are vulnerable have a variety of threats integrity confidentiality Sarthak Patel (sarthakpatel.in)3 confidentiality denial of service authentication need added security mechanisms
  • 4. SSL (Secure Socket Layer) transport layer security service originally developed by Netscape version 3 designed with public input subsequently became Internet standard known asTLS (Transport Layer Security) Sarthak Patel (sarthakpatel.in)4 (Transport Layer Security) usesTCP to provide a reliable end-to-end service SSL has two layers of protocols
  • 5. SSL Architecture Sarthak Patel (sarthakpatel.in)5
  • 6. SSL Architecture SSL connection a transient, peer-to-peer, communications link associated with 1 SSL session SSL session an association between client & server Sarthak Patel (sarthakpatel.in)6 an association between client & server created by the Handshake Protocol define a set of cryptographic parameters may be shared by multiple SSL connections
  • 7. SSL Record Protocol Services message integrity using a MAC with shared secret key confidentiality using symmetric encryption with a shared secret key defined by Handshake Protocol Sarthak Patel (sarthakpatel.in)7 Handshake Protocol AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128 message is compressed before encryption
  • 8. SSL Record Protocol Operation Sarthak Patel (sarthakpatel.in)8
  • 9. SSL Change Cipher Spec Protocol one of 3 SSL specific protocols which use the SSL Record protocol a single message causes pending state to become current hence updating the cipher suite in use Sarthak Patel (sarthakpatel.in)9 hence updating the cipher suite in use
  • 10. SSL Alert Protocol conveys SSL-related alerts to peer entity severity warning or fatal specific alert fatal: unexpected message, bad record mac, decompression failure, Sarthak Patel (sarthakpatel.in)10 fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown compressed & encrypted like all SSL data
  • 11. SSL Handshake Protocol allows server & client to: authenticate each other to negotiate encryption & MAC algorithms to negotiate cryptographic keys to be used comprises a series of messages in phases Sarthak Patel (sarthakpatel.in)11 comprises a series of messages in phases 1. Establish Security Capabilities 2. ServerAuthentication and Key Exchange 3. ClientAuthentication and Key Exchange 4. Finish
  • 12. SSL Handshake Protocol Sarthak Patel (sarthakpatel.in)12
  • 13. TLS (Transport Layer Security) IETF standard RFC 2246 similar to SSLv3 with minor differences in record format version number uses HMAC for MAC a pseudo-random function expands secrets Sarthak Patel (sarthakpatel.in)13 has additional alert codes some changes in supported ciphers changes in certificate types & negotiations changes in crypto computations & padding
  • 14. Secure Electronic Transactions (SET) open encryption & security specification to protect Internet credit card transactions developed in 1996 by Mastercard,Visa etc not a payment system rather a set of security protocols & formats Sarthak Patel (sarthakpatel.in)14 rather a set of security protocols & formats secure communications amongst parties trust from use of X.509v3 certificates privacy by restricted info to those who need it
  • 15. SET Components Sarthak Patel (sarthakpatel.in)15
  • 16. SET Transaction 1. customer opens account 2. customer receives a certificate 3. merchants have their own certificates 4. customer places an order 5. merchant is verified Sarthak Patel (sarthakpatel.in)16 5. merchant is verified 6. order and payment are sent 7. merchant requests payment authorization 8. merchant confirms order 9. merchant provides goods or service 10. merchant requests payment
  • 17. Dual Signature customer creates dual messages order information (OI) for merchant payment information (PI) for bank neither party needs details of other but must know they are linked Sarthak Patel (sarthakpatel.in)17 but must know they are linked use a dual signature for this signed concatenated hashes of OI & PI DS=E(PRc, [H(H(PI)||H(OI))])
  • 18. SET Purchase Request SET purchase request exchange consists of four messages 1. Initiate Request - get certificates 2. Initiate Response - signed response 3. Purchase Request - of OI & PI Sarthak Patel (sarthakpatel.in)18 3. Purchase Request - of OI & PI 4. Purchase Response - ack order
  • 19. Purchase Request – Customer Sarthak Patel (sarthakpatel.in)19
  • 20. Purchase Request – Merchant 1. verifies cardholder certificates using CA sigs 2. verifies dual signature using customer's public signature key to ensure order has not been tampered with in transit & that it was signed using cardholder's private signature key Sarthak Patel (sarthakpatel.in)20 private signature key 3. processes order and forwards the payment information to the payment gateway for authorization (described later) 4. sends a purchase response to cardholder
  • 21. Purchase Request – Merchant Sarthak Patel (sarthakpatel.in)21
  • 22. Payment Gateway Authorization 1. verifies all certificates 2. decrypts digital envelope of authorization block to obtain symmetric key & then decrypts authorization block 3. verifies merchant's signature on authorization block 4. decrypts digital envelope of payment block to obtain symmetric key & then decrypts payment block Sarthak Patel (sarthakpatel.in)22 key & then decrypts payment block 5. verifies dual signature on payment block 6. verifies that transaction ID received from merchant matches that in PI received (indirectly) from customer 7. requests & receives an authorization from issuer 8. sends authorization response back to merchant
  • 23. Payment Capture merchant sends payment gateway a payment capture request gateway checks request then causes funds to be transferred to merchants account notifies merchant using capture response Sarthak Patel (sarthakpatel.in)23