SlideShare a Scribd company logo
1 of 11
Download to read offline
Secure Electronic
Transaction (SET)
Credit and Debit Cards on the Internet
• Problem: communicate credit and debit card
  and purchasing data securely to gain consumer
  trust
   – Authentication of buyer and merchant
   – Confidential transmissions
• Systems vary by
   – Type of public-key encryption
   – Type of symmetric encryption
   – Message digest algorithm
   – Number of parties having private keys
   – Number of parties having certificates
Secure Electronic Transaction (SET)

• Developed by Visa and MasterCard
• Designed to protect credit and debit
  card transactions
• Confidentiality: all messages encrypted
• Trust: all parties must have digital
  certificates
• Privacy: information made available
  only when and where necessary
Participants in the SET System
SET Business Requirements (1)

• Provide confidentiality of payment and
  ordering information
• Ensure the integrity of all transmitted data
• Provide authentication that a cardholder is
  a legitimate user of a credit or debit card
  account
• Provide authentication that a merchant
  can accept credit or debit card
  transactions through its relationship with a
  financial institution
SET Business Requirements (2)

• Ensure the use of the best security
  practices and system design techniques
  to protect all legitimate parties in an
  electronic commerce transaction
• Create a protocol that neither depends on
  transport security mechanisms nor
  prevents their use
• Facilitate and encourage interoperability
  among software and network providers
SET Transactions (1)
SET Transactions (2)
• The customer opens an account with a
  card issuer.
   – MasterCard, Visa, etc.
• The customer receives a digital certificate
  signed by a bank.
• A merchant who accepts a certain brand of
  card must possess two digital certificates.
   – One for signing & one for key exchange
• The customer places an order for a product
  or service with a merchant.
• The merchant sends a copy of its certificate
  for verification.
SET Transactions (3)
• The customer sends order and payment
  information to the merchant.
• The merchant requests payment
  authorization from the payment gateway
  prior to shipment.
• The merchant confirms order to the
  customer.
• The merchant provides the goods or
  service to the customer.
• The merchant requests payment from
  the payment gateway.
SET Supported Transactions
  •   card holder registration
  •   merchant registration
  •   purchase request
  •   payment authorization
  •   payment capture
  •   certificate query
  •   purchase inquiry
  •   purchase notification
  •   sale transaction
  •   authorization reversal
  •   capture reversal
  •   credit / payment reversal
Key Technologies of SET

• Confidentiality of information: 3DES
• Integrity of data: RSA digital signatures
  with SHA-1 hash codes
• Cardholder account authentication:
  digital certificates with RSA signatures
• Merchant authentication: digital
  certificates with RSA signatures
• Privacy: separation of order and
  payment information using dual
  signatures

More Related Content

What's hot (20)

Key management.ppt
Key management.pptKey management.ppt
Key management.ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
S/MIME
S/MIMES/MIME
S/MIME
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 

Viewers also liked

E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking Salman Memon
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip securityrajakhurram
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchangeAbhishek Nayak
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 

Viewers also liked (15)

E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
ip security
ip securityip security
ip security
 
Ip security
Ip security Ip security
Ip security
 
IP Security
IP SecurityIP Security
IP Security
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
IP Security
IP SecurityIP Security
IP Security
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchange
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 

Similar to Secure electronic transaction (set)

Similar to Secure electronic transaction (set) (20)

SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
 
Fdp week 1 presentation
Fdp week 1 presentationFdp week 1 presentation
Fdp week 1 presentation
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Securing Online Card Transactions
Securing Online Card TransactionsSecuring Online Card Transactions
Securing Online Card Transactions
 
E commerce
E commerceE commerce
E commerce
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
E-Business security
E-Business security E-Business security
E-Business security
 
Secnet
SecnetSecnet
Secnet
 

Recently uploaded

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

Secure electronic transaction (set)

  • 2. Credit and Debit Cards on the Internet • Problem: communicate credit and debit card and purchasing data securely to gain consumer trust – Authentication of buyer and merchant – Confidential transmissions • Systems vary by – Type of public-key encryption – Type of symmetric encryption – Message digest algorithm – Number of parties having private keys – Number of parties having certificates
  • 3. Secure Electronic Transaction (SET) • Developed by Visa and MasterCard • Designed to protect credit and debit card transactions • Confidentiality: all messages encrypted • Trust: all parties must have digital certificates • Privacy: information made available only when and where necessary
  • 4. Participants in the SET System
  • 5. SET Business Requirements (1) • Provide confidentiality of payment and ordering information • Ensure the integrity of all transmitted data • Provide authentication that a cardholder is a legitimate user of a credit or debit card account • Provide authentication that a merchant can accept credit or debit card transactions through its relationship with a financial institution
  • 6. SET Business Requirements (2) • Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction • Create a protocol that neither depends on transport security mechanisms nor prevents their use • Facilitate and encourage interoperability among software and network providers
  • 8. SET Transactions (2) • The customer opens an account with a card issuer. – MasterCard, Visa, etc. • The customer receives a digital certificate signed by a bank. • A merchant who accepts a certain brand of card must possess two digital certificates. – One for signing & one for key exchange • The customer places an order for a product or service with a merchant. • The merchant sends a copy of its certificate for verification.
  • 9. SET Transactions (3) • The customer sends order and payment information to the merchant. • The merchant requests payment authorization from the payment gateway prior to shipment. • The merchant confirms order to the customer. • The merchant provides the goods or service to the customer. • The merchant requests payment from the payment gateway.
  • 10. SET Supported Transactions • card holder registration • merchant registration • purchase request • payment authorization • payment capture • certificate query • purchase inquiry • purchase notification • sale transaction • authorization reversal • capture reversal • credit / payment reversal
  • 11. Key Technologies of SET • Confidentiality of information: 3DES • Integrity of data: RSA digital signatures with SHA-1 hash codes • Cardholder account authentication: digital certificates with RSA signatures • Merchant authentication: digital certificates with RSA signatures • Privacy: separation of order and payment information using dual signatures