Matakuliah Tahun Versi : M0284/Teknologi & Infrastruktur E-Business : 2005 : <<versi/revisi>> Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money 1 Learning Objectives • Determine how and why encryption is important for e-commerce. • Understand how security applies to e-mail, the Web, the intranet, and the extranet. • Appreciate how virtual private networks are relevant to the future of e-commerce. • Plan for strategies to fend-off security threats. • List and understand various e-commerce modes of payment. 2 Confidentiality • Confidentiality has two aims: – To use the digital signature or encrypted hash function to authenticate the identity of the sender. – To protect the content of the message from eyes other than those of the intended recipient. • Cryptography is used to implement privacy – Encoded message has no apparent meaning 3 Confidentiality • Two steps involved: – In the first step, a clear message is encrypted. – The reverse aspect is the deciphering by the recipient. • Secure Socket Layer (SSL) – Developed by Netscape for transmitting private documents via the Internet 4 Confidentiality • Organizations – Government – Industry Self-Regulation • Platform for Privacy Preferences Project (P3P). • TRUSTe • Better Business Bureau Online 5 Authentication “Authentication is the process of identifying an individual or a message usually based on a user name and password or a file signature.” Authentication is distinct from Authorization 6 Authentication • Log-in Passwords • Weak method with short passwords 7 Authentication • Features commonly used to identify and authenticate an user: – Something the user knows (e.g. password). – Something the user has (e.g. token, smartcard). – Something that is part of the user (e.g. fingerprint). 8 Authentication Digital Signature “A digital signature is a code attached to an electronically transmitted message to identify the sender.” 9 Authentication Digital Signature 1. The sender composes the document. 2. The sender uses a hash algorithm to create a “one-way” hash. 3. The user uses his or her private part of a public key system to encrypt the one-way hash to create the digital signature. 4. The sender then combines the original document with the digital signature to create a new signed document and send it to the receiver 10 Authentication Digital Signature 1. The receiver separates the document from its signature. 2. The receiver decrypts the digital signature using the sender public key. 3. The receiver applies the hashing algorithm to the original electronic document to produce a new one-wayhash. 11 Authentication Digital Signature 12 Authorization “Gives someone permission to do or have something.” • • Role or privileges based system. Access lists to hardware, programs, data 13 Integrity • • • Control Redundancy Check (CRC) Secure Hash Algorithm (SHA-1) RSA’s Message Digest (MD5) 14 Auditing “As no system will ever be completely secure, policies need to be devised where unauthorized usage will not occur.” 15 Non-repudiation “Nonrepudiation is a proof that a message has been sent or received.” “Nonrepudiation is specially important for the secure completion of online transactions.” 16 Non-repudiation • • Digital Certificates can be used to verify the identity of a person, website or JavaScript/ Java applet. The certificate always include: – – – – – Public key. The name of the entity. Expiration date. The name of the certification authority (CA). The digital signature of the CA. 17 Non-repudiation 18 Non-repudiation - PKI 19 E-mail and Internet Security • • • • • • Secure Sockets Layer (SSL). Secure Electronic Transactions (SET). Password Authentication Protocol/ Challenge Handshake Authentication Protocol (PAP/CHAP). Private Communications Technology (PCT). S/MIME Pretty Good Privacy (PGP). 20 E-mail and Internet Security • Secure Sockets Layer (SSL). – – – – – – Created by Netscape Widely used Uses RSA’s encryption system. Uses temporary keys Implement Certificate Authorities (CA) Client and server certificates 21 E-mail and Internet Security • Secure Electronic Transactions (SET) – Enables the use of electronic payment methods and provides assurance about the identification of customers, merchants and banks. – Industry protocol. 22 E-mail and Internet Security • PAP/CHAP – Commonly used with PPP connections. – With PAP the password is sent as open text, with CHAP is encrypted. – With CHAP the authentication is repeated every 10 minutes, with PAP only at connection time. 23 E-mail and Internet Security • Private Communications Technology. – Microsoft Initiative. – Symmetric encryption. – Authenticates of server to client via certificate or CA. – Verifies message integrity with hash function message digests – Can be implemented with HTTP and FTP. – Allows a stronger encryption 24 E-mail and Internet Security • Secure MIME. – Secure method of sending e-mails. – An IETF standard – RFC 1521 25 E-mail and Internet Security • Pretty Good Privacy (PGP) – World’s de facto standard. – Freeware (There is also a commercial version). 26 Virtual Private Network “A virtual private network (VPN) is a network available when the user needs it.” • • • IP Security Protocol (IPSec) Layer Two Tunneling Protocol (L2TP) Transport Layer Security (TLS) 27 Virtual Private Network – L2TP 28 Encryption Export Policy • • • Regulations affect the global use of encryption techniques. Companies are allowed to export encryption items (but with weak encryption) Encryption classified as a weapon 29 Payment Systems • • • • Cash Checks Money Orders ORDER/INVOICE – bank transfer – (feasible for B2B) • Credit Card Payments – (used most for B2C e-commerce) 30 Electronic Money • Not widely adopted • • • • Cybercash VeriFone Stored-Value Smart Cards. Digital Cash – Visa Cash – Mondex – Digicash • Micropayment 31