|
|||||
E-COMMERCE
IT430
VU
Lesson
24
SYMMETRIC
KEY ALGORITHMS
Cryptographic
algorithms are measured in terms of
key length. Following is the list of
some popular
symmetric
key algorithms:
DES
(Data Encryption Standard) 56
bits
IDEA
(International Data Encryption Algorithm
(IDEA) 128 bits
RC2
(block cipher) 1-2048 bits
RC4
(stream cipher) 1-2048 bits
Rinjdael
128-256 bits
Attacks
on Symmetric Key
Algorithms
Following
attacks have been reported on
symmetric key algorithms:
Key
Search Attacks
Cryptanalysis
System-based
Attacks
Key
Search (Brute Force) Attacks
In this type of
attack an attempt is made by the attacker
to decrypt the message with every
possible key.
Thus,
the greater the key length, the more
difficult it is to identify the
key.
Cryptanalysis
Encryption
algorithms can be defeated by using a
combination of sophisticated mathematics
and computing
power so
that many encrypted messages
can be deciphered without
knowing the key. Such type of an
attack
is
called cryptanalysis.
System-Based
Attacks
In it the
attack is made on the cryptographic
system that uses the cryptographic
algorithm without
actually
attacking the
algorithm itself.
Public
Key Algorithms
Following
is the list some popular
public key algorithms:
DSS
Digital Signature Standard
based on DSA (Digital
Standard Algorithm)
key
length is between 512-1024
bits
RSA
Elliptic
Curves
Attacks
on Public Key
Algorithms
Key
Search Attacks
The
public key and its
corresponding private key are
linked with each other
with the help of a
large
composite
number. These attacks attempt to derive the
private key from its
corresponding public key
using
that
number. According to an estimate 1024
bit RSA public key
may be factored due to fast
computers by
2020.
Note that both symmetric
and asymmetric algorithms are
based on different techniques. In
case of
108
E-COMMERCE
IT430
VU
asymmetric
algorithms the increase in key length
does not much increase the
difficulty level for the
attacker
as
compared to symmetric algorithms. Thus, a
128-bit RC2 symmetric key
may prove to be much
stronger
than a
1024 bit RSA asymmetric
public key.
Analytical
Attacks
Such
attacks use some fundamental
flaw in the mathematical problem on
which the encryption system
itself
is
based so as to break the
encryption.
Quantum
computing is the branch of computer
science that deals with the
development of cryptographic
algorithms. It
can also be used to find
flaws in the cryptographic system/algorithms and to
launch attacks.
Electronic
Payment Systems
Most
of the electronic payment systems on
internet use cryptography in one
way or the other to
ensure
confidentiality
and security of the payment
information. Some of the popular
payment systems on
internet
include the
credit-card based payment
systems, electronic checks, electronic
cash, micro-payment systems
(milicent, payword
etc.)
The
Process of Using Credit
Cards
It may
be useful to see how payment is
made through a credit card in the
traditional sense. Fig. 1
below
shows
the steps to be followed in this
regard:
Merchant
Card
Holder
2.
Show
Credit
Card
3.
Authorization
4.
Capture
1.Issue
Credit Card
1.Issue
Credit Card
5.
r
Pa
fe
ns
y
m
a
Tr
en
nt
t
ou
Re
Am
qu
Card
Brand
6.
es
t
Acquirer
Bank
Issuer
Bank
Merchant
Account
Cardholder
Account
Fig.
1
1. A
potential cardholder requests an issuing
bank in which the cardholder may have an
account,
the
issuance of a card brand (like
Visa or MasterCard). The
issuing bank approves (or
denies)
the application. If
approved, a plastic card is physically
delivered to the customer's address
by
mail.
The card is activated as
soon as the cardholder calls the bank for
initiation and signs
the
back
of the card.
2. The
cardholder shows the card to a merchant
whenever he or she needs to
pay for a product or
service.
3. The
merchant then asks for
approval from the brand company (Visa
etc.) and the transaction
is
paid by credit.
The merchant keeps a sales
slip.
109
E-COMMERCE
IT430
VU
4. The
merchant sends the slip to the acquirer
bank and pays a fee for the
service. This is called
a
capturing
process.
5. The
acquirer bank requests the brand to clear
for the credit amount and gets
paid.
6.
Then the brand asks for
clearance to the issuer bank. The amount
is transferred from issuer
to
brand.
The same amount is deducted
from the cardholder's account in the
issuing bank.
Note
that in case of a credit card the
issuer bank charges interest
from the client at a specified
rate on the
amount
lent. On the other hand, in
case of a debit card no such
interest is payable since the
customer uses
his/her
own money in that
case.
Virtual
PIN Payment System
It is
one of the earliest credit card-based
systems launched for the
internet in 1994 by a company;
First
Virtual
Holdings, Inc. Virtual PIN
system does not involve the
use of encryption. Payment is made
through
the credit
card in this system. The objective
was to allow the selling of low-value
information items
without
the
use of any special client
software or hardware.
Both
merchants and buyers are
required to register with First Virtual
(FV). A buyer registering with
FV
forwards
his or her credit card
details and email address to
FV and in exchange receives a
pass phrase called,
Virtual
PIN. Buyer makes a telephone
call to FV to provide his/her credit
card number. FV establishes a
link
between the Virtual PIN and the credit
card number without using the credit
card number on the
network.
A Merchant goes through a
similar registration process. He provides
his bank details to FV and
is
given a
merchant Virtual PIN. The
merchant can now request to
process payments from
registered FV
customers.
The transfer takes place
with the help of Automated
Clearing House (ACH) service.
Note that
an ACH
is a centralized system to which
different banks are electronically
connected forming a network
for
clearing
payment requests. At the end the
payment proceeds from the credit
card issuer bank to the
account
of the
merchant with acquirer bank
(merchant's bank) through ACH, after FV
deducts a per-transaction
charge
for its services.
Fig. 2
below shows the working of
Virtual PIN payment
system.
Buying with First
Virtual
2. Account ID
Valid?
FirrstVirrtualIInternet
Fist Vitual
nternet
PaymenttSysstem
Paymen Sy
tem
Web
Serrver
Web
Sever
3. Account
OK!
Serrver
Sever
((Sellilng
Sel
ing
Goodss)
Good
)
5. Transaction
Details
4.
Information
Goods
6.
Satisfied?
1. Account
ID
7.
Accept/Reject or
Fraud
Indication
Buyer
Fig.
2
A buyer
browses the web server where
FV registered merchant is selling
goods. The buyer is asked to
enter
his/her
Virtual PIN by the merchant site
(step
1). Merchant
queries the FV Internet Payment
System
Server
(FVIPSS) to confirm Virtual PIN (step
2). If
Virtual PIN is not blacklisted (step
3), the
merchant
110
E-COMMERCE
IT430
VU
may
acknowledge this fact to the buyer by email
and sends the goods, and
also sends transaction
details to
FV (steps
4 & 5). FVIPSS or simply
FV server sends email to the buyer if the
goods were
satisfactory
(step
6). There
are three possible answers
to that (step
7). If the
answer is "accept" then the
payment
proceeds,
in case the answer is "reject" it
means that either the goods
have not been received or
the buyer is
not
satisfied with the quality of
goods. Then the payment is
not made to the merchant. If the
answer
indicates
"fraud" it means that the
goods were never ordered. In
such an eventuality the FVIPSS
immediately
blacklists Virtual PIN so that it cannot
be used in the future.
Time
period may be a few minutes to a
few days for answering the
email in step no. 6 above,
otherwise
FV
shall proceed to arrange the
payment. If a Virtual PIN has
been stolen and the buyer
does not
indicate
fraud within the time period
for answering the said email
the bogus transactions are
possible
before the
Pin is finally blacklisted. A
stolen credit card number can
also be used to set up
Virtual PIN
associated
with an email address
controlled by the attacker to carry
out bogus
transactions.
111
Table of Contents:
|
|||||