Chapter 14 by David G. Messerschmitt Understanding Networked Applications:

advertisement

Understanding Networked Applications:

A First Course

Chapter 14 by

David G. Messerschmitt

Understanding Networked Applications:

A First Course

Electronic payments by

David G. Messerschmitt

Electronic payments: the players

Consumer

Merchant

Financial institutions

Understanding Networked Applications

3

Physical tokens representing value

A First Course

Some forms of spending money

Credit

Debit

Loan

Withdrawal

Withdrawal Check

Cash

Demand deposit

Withdrawal

Cash reserves

Understanding Networked Applications

4

A First Course

Questions about value tokens

• Who will back the value?

• How is fraud, counterfeiting, etc. prevented?

• Will value restored if lost or stolen?

• Is it subject to regulation?

• Who pays for the system?

• Is it traced?

Understanding Networked Applications

5

A First Course

Policy dilemmas

• Multiplicity of incompatible payment systems?

• Tracing and auditing:

– Criminal prosecution

– Taxation vs

– Personal privacy

Understanding Networked Applications

6

A First Course

Some privacy initiatives

• Open Profiling Standard

• TRUSTe

• Anonymous digital cash

Understanding Networked Applications

7

A First Course

Electronic credit and debit

• Standard authentication, confidentiality, and non-repudiation techniques can be used

– Asymmetric encryption and certificates

• Framework must take into account different institutions involved

• Example: Secure Electronic Transactions

(SET) of Visa/Mastercard

Understanding Networked Applications

8

A First Course

Participants

• Consumer (cardholder)

• Merchant

• Acquirer

: financial institution acting as transaction clearinghouse for merchant

• Issuer

: financial institution that issued consumer credit/debit card

• Association

: Visa or Mastercard

Understanding Networked Applications

9

A First Course

SET chain of trust

SET Root Association

Acquirer Merchant

(self-signed, included in all software)

Issuer

Understanding Networked Applications

10

Cardholder

A First Course

SET order/payment protocol

Consumer Merchant Acquirer

Issuer initiate purchase authorize capture

Understanding Networked Applications

11 authorize capture

A First Course

Smartcard

Card that contains encapsulated electronics and can be used for various forms of electronic commerce (and other things)

Understanding Networked Applications

12

A First Course

Prepaid smartcard options

• Memory card

– Memory plus password/PIN protection

• Shared-secret

– Mutual authentication of any terminal sharing the secret

• Signature-carrying

– Carries signatures created by institution

• Signature-creating

– Hardware to create signature based on secret key

Understanding Networked Applications

13

A First Course

Smartcard merits

• Memory

– Closed system: single institution

– No authentication of terminal

• Shared-secret

– Requires encapsulated module in terminal, one to carry each card secret

– One secret per institution implies that all cards of that institution can be compromised

Understanding Networked Applications

14

A First Course

Smartcard merits (con’t)

• Signature

– Terminals need only public keys

– Easy to handle multiple institutions

• All but signature-carrying have unique card identity, and hence institutions can invade privacy by linking transactions

Understanding Networked Applications

15

A First Course

Hard vs. digital cash

Deposit

Withdraw

Understanding Networked Applications

16

A First Course

Digital cash

010110101101010111010110101

011010110101011010110101011

010101101010110111101011111

011010000000110101010110101

Since digital cash is represented by data, it is easily replicated. How do we prevent:

•Counterfeiting?

•Multiple spending?

Understanding Networked Applications

17

A First Course

What is a digital cash token?

Bit string

Unique identifier

Value attribute

Bank digital signature

Prevents spending more than once

Prevents counterfeiting

Understanding Networked Applications

18

A First Course

Financial institution perspective

Vault cash

Consumer’s demand deposit

Withdrawal

Branch ATM Digital branch

Digital cash liability

Currency in wallet

Payment

Merchant

Currency in smartcard

Deposit

Merchant’s demand deposit

May return as more digital cash

Understanding Networked Applications

19

A First Course

Digital cash must be deposited

Hard currency Digital cash

Consumer wallet

Spend

Merchant

Deposit

Consumer smartcard

Merchant

Deposit

Withdraw as new digital cash

Understanding Networked Applications

20

A First Course

Possible characteristics of digital cash

• Anonymity of consumer

– Merchant knows who paid, but that information is not inherent to the digital cash itself

– Financial institution knows what merchant deposited

• Attribution of cheating

– Double spending

• Authorized traces

Understanding Networked Applications

21

A First Course

Spending anonymity

Withdrawal

Payment

Deposit

Withdrawal and deposit are traceable, but can we break the chain somewhere?

Understanding Networked Applications

22

A First Course

Understanding Networked Applications:

A First Course

Supplements by

David G. Messerschmitt

Message digest

Message

MD algorithm

Message digest

• MD is a fixed length (128 or 160 bit) summary of message

• One way: message cannot be recovered from MD

• Collision-free: computationally infeasible to find a message corresponding to a given MD

Understanding Networked Applications

24

A First Course

Digital signature based on a message digest

Message MD

Encrypt secret key

Decrypt public key

Compare

Signature generation

Understanding Networked Applications

25

MD

Signature checking

A First Course

Consumer

Offer

Dual signature

Merchant

Merchant can verify binding of offer and authorization, does not see authorization

Acquirer

MD

MD

Dual signature

Payment authorization

Understanding Networked Applications

Acquirer can verify binding of offer and authorization, does not see offer

26

A First Course

Spending anonymity

Create $$, including identifier

Repeat n times

Cut and choose one

Blind signature

If the consumer’s software creates the digital cash, and the bank signs it blindly, the bank will not see the identifier. The cut and choose protocol assures the bank the $$ is proper.

Understanding Networked Applications

27

A First Course

Blind signature analogy

Carbon

Token

Consumer gets bank to sign cash token without observing contents

$$

$$

Remove token from envelope

Put token and carbon in envelope

Present to bank for embossing

Understanding Networked Applications

28

A First Course

Cut and choose protocol

$$

Randomly choose one, check others

$$

Although the bank can’t see what it is signing, with the cut and choose the incentive for the consumer is to generate legitimate instances of digital cash.

Blind signature

Understanding Networked Applications

29

A First Course

Download