EDI and EFT Security Using Cryptography: Part 1

advertisement
87-01-85 EDI and EFT Security Using
Cryptography: Part 1
Previous screen
Addison Fischer
Payoff
A business would not immediately fill a purchase order that arrives in the mail without
letterhead or signatures. Yet that is what happens every day in businesses using electronic
data interchange. The fraud that has resulted from such laxity has led to calls for improved
security for these transactions. This article, the first in a two-part series, examines the
security issues involved in electronic data interchange and electronic funds transfers and
introduces the types of controls commonly used to secure these transactions. Part 2 will
provide a detailed review of cryptographic solutions that not only address these security
exposures, but also provide new capabilities at reduced cost.
Introduction
Electronic data interchange (EDI) and Electronic Funds Transfer processes are integrated
components of automated business systems. As electronic business practices extend to
every sector of industry (often over unsecured networks), the threats to such transactions
increase. This article, the first in a two-part series, presents a functional and technical
overview of Electronic Document Interchange and electronic funds transfer (EFT)
technologies, standards governing EDI, and security controls. Part 2in this series will
focus on the use of cryptographic controls to secure these transactions.
Overview of EDI and EFT Systems
EDI is a rapidly emerging technology that allows automated commercial transactions to be
conducted within organizations and among enterprises. Using Electronic Document
Interchange, a business document can be created as an electronic file in the sender's
system, sent via any of several possible transmission modes, and processed directly by the
recipient's computer. Little or no human intervention is required. EDI documents include,
but are certainly not limited to, purchase orders, invoices, letters of credit, tariff filings, tax
returns, bills of lading, insurance claims, financial reports, and requests for quotations.
Organizations transacting business are known as trading partners.
Certain industries have well-developed EDI systems in place. They include retailing,
apparel, textile and transportation industries. The health care industry is just beginning to
implement EDI widely. Nearly every serious proposal for health care reform includes EDI
as an integral component.
The standardization of EDI is continuing as many existing industry standards are being
incorporated in national and international standards. Among the potential benefits of this
technology are considerable cost savings, information accuracy, and improved timeliness.
EFT, a subset of EDI, is well-developed and tested. The use of Electronic Funds
Transfer by the federal government is substantial. The social security checks of more than
22 million Social Security recipients are deposited electronically. Nearly half of federal
salaries are now paid by electronic funds transfer (EFT). Most banks and savings and loans
now offer electronic payment of mortgages, loans, and recurring bills.
Automated teller machines, electronic deposit, and the rapid clearing of checks among
banks are but the most visible benefits ofelectronic funds transfer (EFT) to the consumer.
The use of electronic funds transfer (EFT) at point of sale with debit cards is increasing
rapidly with online debit networks introduced by VISA, Mastercard, and the Cash Station.
Two-thirds of the nation's grocery stores now accept debit cards. Electronic Funds
Previous screen
Transfer networks are now international in scope, allowing consumers to obtain cash
worldwide and banks to transfer funds globally.
Security concerns are of paramount importance to the financial industry. electronic
funds transfer (EFT) systems have therefore made extensive and very effective use of
cryptography to safeguard financial transactions.
Advantages of EDI
The advantages of EDI are considerable. It can reduce the storm of paper flowing
between trading partners, eliminate data reentry errors, speed document filing, and reduce
document storage costs. Kmart and Wal-Mart mandated in 1990 that all their trading
partners use EDI to conduct business. All suppliers to Target Stores, Inc. use EDI.
The use of EDI to reduce inventories and shorten supplier cycle times is critical to
modern manufacturing using the just- in-time strategy. This is but one reason General
Motors has mandated the use of Electronic Document Interchange by all its suppliers, as
have most automotive manufacturers.
Similarly, modern grocery retailing is tying its point-of-sale scanners to its inventory
management by using the quick response strategy. Inventory records reflect each sale
across the checkout scanners, and supplies can be reordered without human intervention at
selected threshold levels. The grocery industry's enthusiasm forEDI has expanded beyond
quick response as the reception of efficient consumer response strategies demonstrate.
These strategies use EDI to confront a host of management issues, including product
assortment, product promotion, and space allocation. EDI works synergistically with such
inventory and management strategies; without EDI, they would require cumbersome and
comparatively slow manual systems.
Ideally, human intervention should be needed only when a given EDI transaction
creates an unanticipated condition. By eliminating or considerably reducing human
intervention, EDI can more than just trim transaction costs. The financial industry cost
estimates for each electronic funds transfer (EFT) transaction range from 3c to 6c, onesixth to one-twelfth of the same transaction made by check. The Office of Management and
Budget figures that federal transactions made through Electronic Document Interchange
cost six cents, but those made by check cost 36 cents.
New EDI network services will soon allow corporations to electronically file most
types of state tax forms. Electronic Data Systems Corp TaxNet will be operated by the
TaxNet Governmental Communications Corp., a division of the Federal of Tax
Administrators. National Data Corp. operates the Electronic Tax Filing Service. Both
services allow rapid electronic filing, payment, and notification of the receipt of a return.
States may mandate such filings if they replicate the cost savings demonstrated by EDI in
business.
The advantages of EDI for such highly competitive businesses as trucking and the
airlines can be considerable. In mature EDI markets, for example, the retailing, apparel,
and textile industries, the implementation of EDI is truly a matter of corporate survival, not
just competitive advantage. The same may be aid of firms wishing to do business with the
US government or in global markets.
Components
The following sections discuss the functional components of any EDI system.
EDI Software.
EDI software generally contains a translation component that maps data from the
user's (i.e., originator's) application (i.e., record formats) to the Electronic Document
Interchange standard message formats. The translation of messages in standard EDI
Previous screen
formats to the recipient's application is performed by the recipient's EDI software. The
communications component adds items to the message to form a complete interchange and
interfaces to the underlying communications mechanism. This mechanism can be a lowlevel protocol, such as bisync, or a full-blown messaging protocol, such as X.400.
Communications might flow directly to the recipient (i.e, point-to-point) or by means of a
third party.
There may also be components that handle report writing, management, audit, and
printing functions. Nearly all existing EDI implementations, unlike those for electronic
funds transfer (EFT), do not currently use cryptography for security. However, a
substantial number of Electronic Document Interchange products offering encryption and
digital signatures will filter into the market soon.
An EDI interchange consists of the production, transmission, receipt of, and response
to a formatted text message. Originator and recipient IDs and associated information, as
well as one or more functional groups of business data, constitute a message. A functional
group consists of one or more related transaction sets, each representing a common
business document. For example, transaction set 813 is a tax return; 832 is a price or sales
catalog. The transaction sets are usually composed of multiple data segments that provide
such information as names, addresses, rates, and handling instruction in a specified
sequence. Each data segment is uniquely designated by two or three letter identifiers.
Network Systems.
Once prepared, an EDI document must be delivered to the trading partner. Data can
be sent via high-speed data lines or lower speed dial-up lines, by magnetic tape or diskette,
or on X.25 public switched data networks. The documents may be delivered directly, or
more typically, by a third-party, value-added network (VAN) or clearinghouse—an EDI
postal system. The use of a VAN simplifies the communications process substantially,
because communications must be coordinated with one party rather than with all trading
partners. The VAN can convert protocols and line speeds, enabling communication
between otherwise incompatible systems. Some VANs also offer format translation,
electronic forms, fax services, message switching, and access to a variety of data bases.
Typical VANs presently provide only a few useful security capabilities. Passwords or
authorization codes are required to send or receive documents from electronic mailboxes. A
VAN also tracks the movement of documents within its domain and can provide
notification of delivery and an audit trail when required.
The EDI document originator logs on to the network by using a password. The
uploaded document is placed in the recipient's electronic mailbox. The recipient, after
meeting network security tests, retrieves mail periodically. Some VANs specialize in
particular vertical markets; others are generalists. Examples include Advantis, EDI*Net,
EDI*EXPRESS, and AT EasyLink. VANs typically support all public and industry
specific standards.
Trading Partner Agreements and Third-Party Service Provider
Agreements
Trading partner agreements (TPAs) or interchange agreements are contractual agreements
between two entities that conduct business electronically. They structure the electronic
relationship between trading partners, dealing with standards, liability, responsibility, and
fees. They are essential to reduce misunderstanding and act as the basis for enforcing future
Electronic Document Interchange transactions. The use of Trading Partner Agreement is
increasing between EDI users as various model agreements become available and EDI case
law develops.
Previous screen
TPAs can and should explicitly define the security obligations of the two parties,
because the EDI system's trustworthiness and reliability are inextricably tied to these
obligations. The agreement should cover verification of message delivery, access control,
use of cryptographic algorithms, use of digital signatures, notification, and remedial actions
in the event of security breaches.
Model agreements can, over time, establish common trade practice. As case law
develops around them, many trading partners find common provisions are considered to
apply to their transactions without their explicit consent.
Third-party service provider agreements are similar in concept toTPAs but are
contractual agreements between trading partners and VANs or other providers of
communications services. The areas that third-party agreements should address include, but
are not limited to, access to audit data, data storage periods, and the full range of access
control and security procedures.
EDI Standards
Standards are an essential consideration for the successful implementation of almost any
Electronic Document Interchange or Electronic Funds Transfer system. Adherence to
standards ensures a uniform level of information protection and suitability for a given task.
They are also critical to interoperability and compatibility—factors that are important in
software specifically designed to connect a variety of disparate systems. EDI standards
establish the format and content for electronic business transactions.
International Standards
Several international standards are relevant to EDI and Electronic Funds Transfer but
the predominant standard is EDIFACT (EDI for Administration Commerce and Trade). The
EDIFACT standard is synonymous with the International Standards Organization standard
9735 and was developed by the United Nations Economic Commission for Europe. Unlike
the U.S. standards developed from the bottom up, EDIFACT is a top-down standard. Its
creation was a proactive attempt to keep the proliferation of European national standards
from becoming an impediment to open trade. EDIFACT is the most popular EDI standard
for international electronic business and is likely to be the universal standard after 1997.
EDIFACT is not nearly as developed as the principal US EDI standard, but this disparity
will probably disappear by 1997 as this international standard becomes aligned with the
predominant US standard. An early EDIFACT proponent in the US was the Customs
Service, an avid supporter of a global customs system. Other international standards
include theTelecommunications Standardization Sector of the International
Telecommunications Union's (ITU-TSS), EDI messaging system, X.435, and United
Nations Trade Data Interchange, which is principally used in the United Kingdom and
likely to be replaced by EDIFACT.
The International Telecommunications Union-TSS has standardized a means to convey
EDI transactions(both the US X12 and the international EDIFACT) over a reliable message
handling system (MHS). This standard, X.435, defines an EDI message type and the
services for use in an X.400 MHS.X.400 is the global Message Handling Service standard
and provides the following functions that are important to an EDI environment:
·
Delivery and nondelivery reports.
·
Message storage capabilities.
·
Grade of delivery (i.e., priority).
Previous screen
·
Multipart body (e.g., inclusion of computer drawings with an EDI purchase order).
·
Delivery control (i.e., restrictions on the types or sizes of messages that may be
delivered.
·
A full set of security services.
Many companies use X.400 gateways to link their electronic mail systems to the
disparate systems operated by their business partners or value-added networks. It promises
inexpensive delivery of EDI transactions by merging them with electronic mail to be sent
over anyX.400-compliant network.
X.435 provides for a single EDI interchange, along with other types of data (e.g.
electronic mail) to be conveyed in a message. It is receiving a great deal of interest from
VANs, as well as from government agencies currently implementing EDI. Government
interest is driven primarily by the inclusion of X.400 and X.435 in the Government Open
Systems Interconnect Profile (GOSIP, version 3). Many EDI software developers and
VANs have either incorporated X.435 support into their products or announced their
intention to do so.
National Standards
The American National Standards Institute, founded in 1918, is a privately funded, notfor-profit, membership organization that coordinates the development of US voluntary
standards. American national Standards Institute (ANSI) is also the principal US member
of the International Organization for Standardization (ISO), the leading International
Standards Organization. American national Standards Institute (ANSI) does not develop
standards, and it approves them only when it has considerable evidence that those who will
be affected by the standards have reached consensus on their provisions.
In 1979, American national Standards Institute (ANSI) chartered a new committee,
known as Accredited Standards Committee (ASC) X12, to develop EDI standards. In the
US, most EDI standards have developed from de facto industry EDI implementations.
Many of these specialized industry standards will continue to be used, for example, in the
warehousing and transportation industries, but a migration to the more general
X12standard is likely to continue. Many industry associations represented on and working
with various ASC X12 subcommittees are developing new transaction sets to meet their
particular needs.
Version 1 of X12 was approved in 1983, followed in 1986 by Version 2. The current
version, Version 3, is periodically updated and expanded. X12 standards are properly
referred to by a six digit code. The first three digits signify the version number. The fourth
and fifth digits stipulate the release number, and the sixth digit represents the subrelease
number. These first six digits are typically followed by a six-character industry or trade
association identification. The full, twelve-character string is transmitted (in Data Element
480 in the Functional Group Header segment) in all transactions to facilitate coordination
and translation.
All Trading Partner Agreement involving direct communications should stipulate the
version of the standards that are to be used. Partners implementing differing versions
cannot be assured of successful data exchanges because X12 releases are neither upwardly
nor downwardly compatible. Most EDI software has provisions supporting multiple
releases. The use of a VAN to coordinate communications and provide translation also
helps with this problem.
Often, standards are refined and revised so that disparate standards can be aligned. This
is clearly the case with the X12standards. The ASC committee has announced its intention
Previous screen
of aligning X12 with EDIFACT by 1997 and has established a X12/EDIFACT Alignment
Task Group to coordinate future development with a like EDIFACT group.
The US government's approach to EDI standards is to follow Federal information
Processing Standard (FIPS) 161, which was developed under the auspices of National
Institute of Standards and Technology (NIST). Because this standard allows the use of
either EDIFACT or X12, the standards alignment should create a unified methodology.
Which set of standards to support is an important decision. The most recent release of
X12 is a wise choice for domestic users who currently have little need to do business with
foreign firms. In the long term, X.435 provides the most comprehensive set of EDI-related
open systems standards.
Most EDI software is designed to support multiple standards. Periodic revision to X12
or EDIFACT may require the installation of periodic maintenance releases or upgrades to
EDI software.
Security
As both Electronic Document Interchange and Electronic Funds Transfer become more
widespread, so does the opportunity for misuse and corruption. With the increasing
population of users, progressively more traffic will pass between organizations that have
dissimilar backgrounds, security needs, and security controls. The speed with which EDI
is being implemented into progressively smaller organizations that were previously little
concerned with data security, will leave many users vulnerable.
The open system can be interpreted as the conjunction of large networks of computer
systems in which computer activity and data flow among the population at large. This
understanding encompasses transorganizational computing and views all the world's
networks as an aggregated system. This view is appropriate when considering electronic
mail, EDI, and electronic commerce in general.
Old security paradigms called for a fortress approach in which corporate computing and
information resources were structured around a central mainframe, or group of
mainframes, concentrated in one or more sites. The goal was to make the site physically
secure, to ensure that the networks that accessed the computer were well understood and
appropriately secure, to require user validation with passwords, and then to ensure that
users could access only programs and data pertinent to their work.
In open systems, everyone has a platform. There is no longer a central computer
managed by computer security professionals. Even if all users in such organizations
manage their own computer security carefully and diligently, all users outside the
organization surely will not.
Old security paradigms cannot be discarded; they must be augmented. Security for the
typical EDI system incorporates security paradigms perfected over the past 30 years and
requires new ones as well. Public key cryptography is an essential one.
Threats to EDI or electronic funds transfer (EFT) systems include both those from
outside the organization and those from within, those made deliberately and those made as
the result of error. All can be devastating. Insider threats are estimated to be responsible for
from 70% to 80% of the annual dollar loss attributable to all security threats. Much of that
loss is attributable to error, accident, and omission; dishonest and disgruntled employees'
actions are also responsible for sizable losses. Any security program that focuses
exclusively or even principally on threats from the outside is misdirected.
Deliberate threats include data destruction by deletion, with viruses or Trojan horses,
wiretapping, the creation of bogus documents, and the rerouting or replaying of authorized
documents. Accidental threats to an EDI system's security can include data entry errors,
deletion of data, misfiling, and the misrouting of documents.
Many security threats can be effectively countered by traditional data processing
security controls that safeguard entire systems (e.g., optimally scheduled data back-ups and
Previous screen
secure physical access and password control). Other security threats must rely on
innovative technologies, such as public key cryptography, for elegant solutions.
In the data communication content security controls are known as security services. The
five traditional services are confidentiality, integrity, authentication, nonrepudiation and
access control.
Any security system for EDI should provide for confidentiality to ensure that sensitive
or mission critical information is not disclosed or made available to unauthorized parties.
The security of EDI documents must be ensured while they are stored on a computer
system or are being transmitted between systems or trading partners.
As important as confidentiality is the need to ensure document integrity. This means
preventing the accidental or deliberate alteration or destruction of data or even its delay in
transit.
Authentication may be the most critical of the security concerns. Passwords and
personal identification numbers have often been used for keeping unauthorized users from
masquerading as legitimate. For high-value transactions, however, these measures are not
sufficient, because the systems they run on may be vulnerable to password guessing, data
line eavesdropping, and unauthorized disclosure.
In the context of electronic business, nonrepudiation is a critical security requirement in
two circumstances. If the sender of an electronic order or tax return can later deny
responsibility for originating that transmission, the recipient may be potentially injured or
the sender may benefit. Similarly, senders and receivers should try to avoid disputes over
whether a document was delivered or when delivery took place.
Access controls attempt to restrict access to components of the system exclusively to
authorized parties. Controls protect hardware, communications media, application
software, and data. But access control, long the mainstay of corporate computing security
efforts, is insufficient to protect against the roguish acts of authorized parties.
One additional capability that would be useful in EDI or electronic funds transfer (EFT)
systems is authorization. After ensuring that a particular user signed a transaction, systems
should ensure that user's authority to do so. This topic is a new area of interest in American
National Standards Institute X9 standards and should eventually find its way into the X12
standards. The intent is to provide additional certification defining what an individual is
allowed to do in the way of authorizing resources, such as expenditures, and how this
authority is limited. For example, a user might be limited to signing only purchase orders
for less than$50,000.
Another important limitation would be a stipulation specifying that dual control (e.g.,
multiple signatures) is required to exercise monetary authority. Such mandated multiple
signatures provide the electronic analogue to the tradition of dual controls designed to
ensure that individuals cannot act against their organization's policies.
Security Controls
Organizations using Electronic Document Interchange or Electronic Funds Transfer should
implement a variety of security controls. They include security policies and procedures,
access control and physical security, and security provisions inTrading Partner Agreement.
Security Policies and Procedures
An organization's policies and procedures should stress its intent to protect its
resources and outline the steps employees must take to provide that protection. These steps
should probably include data backup requirements, nondisclosure statements, steps to
protect against viruses, procedures for password protection, and requirements to destroy
documents in a variety of media.
Access Control and Physical Security
Previous screen
The most basic and obvious security need of an organization may be to control access
to its equipment through the use of locks, passwords, and employee identification.
Physical access control systems have evolved beyond basic mechanical locks securing one
point to microprocessor control systems controlling hundreds of barriers over great
distances. Many such systems also monitor fire alarm systems, provide environmental
controls, and track employee attendance. Magnetic card and keypad based systems now
predominate, with expensive systems relying on biometric criteria reserved for very highsecurity environments.
Microcomputer encryption and access control products restrict access to a computer and
the data stored within or connected to it. Such advanced products as Fischer International
Systems Corp.'s Watchdog provide a host of controls limiting access to both hardware and
software and allow these controls to be fine tuned for particular situations. Products should
be capable of limiting access to the operating system, diskette and hard drives, parallel and
serial ports, and subdirectories and files. An audit trail is a useful security features, as is a
password lockout system to deter password guessing. Intrusion detection and reporting
capabilities can highlight security weakness in time to avoid catastrophic consequences.
Some access control products allow time-based screen blanking and hard disk locking.
Recent focus on the shortcomings of traditional password controls have led to the
introduction of proactive password checking capabilities that force periodic password
replacement and require or generate strong, nontrivial or nonsense passwords.
Most logical access control software products for large systems and networks can
restrict access based on an employee's classification. Even this basic feature, however, is
underused by most organizations.
The capability to encrypt the data on disk drives should be considered essential for
systems housing financial, medical, or other sensitive data. This is true for companies
using Electronic Document Interchange or electronic funds transfer (EFT), as well as for
those with computerized payroll, accounting, purchasing, or electronic mail systems.
Security on individual platforms, such as a workstation, is addressed by the
Department of Defense's Trusted Computer System Evaluation Criteria (TCSEC), also
known as the Orange Book. The criteria cover only nonclassified environments and are
primarily concerned with identification, authentication, and access control. TheTrusted
Computer Security Evaluation Criteria are currently undergoing revision to align them with
their Canadian and European equivalents. The revision provides security requirements for
various environments. It will more adequately address the needs of the commercial
environment, which has been poorly served by the Orange Book.
Security Provision in TPAs
Security provisions should be integral to most TPAs. The parties should agree to the
need for security, the level of security to be provided, and the form that security should
take. Different EDI transactions have varying security requirements. Low-value or low-risk
transactions have considerably different security needs than do high-value or high-risk
ones. A transaction that provides a catalog of products and prices may require only
assurance of document integrity, whereas a tax return or medical records require
authentication, confidentiality, and integrity assurance.
The level of security required and the detail necessary in a TPAs is determined by a risk
analysis for the types of transactions occurring between trading partners. Traditional risk
analysis tools have a limited value in the present Electronic Document Interchange
environment, and until EDI specific tools can be developed, such analysis must be based
on limited experience and common sense.
Cryptographic Controls
Previous screen
For more than two decades, the financial industry has mandated the use of symmetric
cryptography to safeguard its transactions. The Data Encryption Standard, first authorized
for use in 1977, is still in widespread use by numerous industries and has been recertified
by the National Institute for Standards and Technology in 1993 for a five-year extension of
use. It is unlikely to survive beyond 1998 for use in any but the financial sector.
In the EDI environment, cryptographic controls are still in their infancy. They were not
deemed necessary when EDI was conducted directly with a minimum number of trusted
trading partners. With the new standards and the capability to initiate ad hoc transactions,
these cryptographic controls will quickly mature.
Conclusion
Electronic data interchange is emerging as one of the critical enabling technologies
necessary for the rapid development of true global business capability. The spreading use
of Electronic Document Interchange leaves many organizations vulnerable to a variety of
attacks from both within and outside the organization. Security of the majority of existing
Electronic Document Interchange systems is far from ideal. In addition to strengthening
proven security safeguards, there is a need to provide new security capabilities. As will be
seen in Part 2 of this two-part series, cryptography offers a number of elegant solutions to
previously intractable security and legal problems.
Author Biographies
Addison Fischer
Addison Fischer, president and CEO of Fischer International Systems Corporation, is a
recognized authority on office automation, workflow technology, and computer security.
Fischer is a member of the X12 committee, responsible for developing standards in
electronic data interchange. He also serves a member of the X9 committee, involved in
formulating US computer security standards.
Download