is the key to e-Commerce as well as SET. But
the serious question remains about just how
intuitive it will be for users to install the
necessary applications to do SET-based
transactions. Neither Microsoft nor Netscape
are in any rush to build SET into their browsers
until there is a demand for it. But merchants
won’t support it until their customers ask for it,
and their customers won’t ask for it until it’s
built into their browsers. Although Vendors like
VeriFone and IBM have developed SET wallet
plug-ins for the popular Web browsers, Internet
users are not keen on using external plug-ins.
Because they have to install SET from the
external plug-ins that adds payment
functionality to a browser, and also register
with a financial institution or trusted third party,
which then issues digital certificates that
identify the cardholder to the merchant and
vice versa. Although in the long run SET
backers expect certificates to be included in
wallets -- which in turn will be built into
browsers.
Generally speaking, different versions of
SET software are currently available in the
market but it is critical that these packages
interoperate. Without interoperability, any
protocol is dead. SET defines interoperability
between all parts of the card-payment process.
A system can be built with parts from multiple
vendors. To offer these benefits, SET requires
that software be installed in the banking
network, in merchants’ systems, and on
consumers’ PCs. This “deployment obstacle”
has slowed the adoption of SET, which also
requires that certificates be issued to all parties.
These requirements make SET quite
inconvenient and expensive to deploy all over
the world.
iii Lack key and certificate management:
Today’s popular operating systems are
unreliable and insecure, so they are highly
vulnerable to attack, particularly when
connected to the Internet. For this reason,
non-repudiation really exists only when private
signing keys are kept out of untrusty PCs
(Abbott, 1999). But SET refers nothing about
how to securely keep keys and certificates out
of attacks after finishing an electronic
transaction. It appears that these will need to be
stored on participants' workstations and servers,
or additional peripherals installed on
workstations and servers to handle a secure
token (Clark, 1996). A secure token, such as a
smart card, is a good tool to store and exercise
private signing keys and certificates for its
holder. It can also provide an easy way for
signing keys and certificates to be issued and
carried around. The SET was designed
specifically for smart cards, and all SET wallets
support tokens. This beneficially ties token
directly to e-Commerce, because the certificate
authenticates the customer as a cardholder and
directly signifies that transaction is taking place.
However, smart cards are distributed very
slowly, because no one has solved the problem
of how to get card readers attached to
everyone’s PC. But other form-factor tokens
are appearing, including small
universal-serialbus tokens (key fobs, for
example) that can do the same job. Some SET
pilots also are being conducted without tokens,
with the expense of the added complexity of
distributing and managing certificates as
software files. In fact, the smart card’s set-up is
beyond the average cardholder. Actually it's a
very troublesome procedure.
4.2 ECC-based Improvement of SET
Our proposition is based on substituting RSA
algorithm by using ECC to provide SET’s
cryptography (See Figure 1). Our laboratory
experiments have proved that ECC provides greater
security and more efficient performance than the
first generation public key techniques.
i ECC from the consumer:
The consumer use the ECC hash algorithm
(SHA-1) to produce message digest for the
original message and encrypt the message
digest with ECC private key to produce the
digital signature. This generates a random
symmetric key that encrypt the original
message, digital signature and a copy of the
consumer’s certificate, which contains public
signature key. The symmetric key is encrypted
by using the merchant’s ECC public
key-exchange key and the encrypted key
(digital envelope) will be sent to the merchant
along with the encrypted message. Sending a
set of message to the merchant consists of the
symmetric encrypted original message, as well
as the asymmetrically encrypted symmetric key
(the digital envelope).
WEBIST 2007 - International Conference on Web Information Systems and Technologies
316