SET Comparative Performance Analysis A White Paper from

  • Slides: 51
Download presentation
SET Comparative Performance Analysis A White Paper from Gartner. Group Summarized by Sasan Adibi

SET Comparative Performance Analysis A White Paper from Gartner. Group Summarized by Sasan Adibi Secure Electronic Transaction Sasan Adibi

Agenda • • Objective SSL and it’s issues SET and it’s issues Principles of

Agenda • • Objective SSL and it’s issues SET and it’s issues Principles of Cryptography • • • Privacy Authentication Authorization Integrity Non-Repudiation Certificates Authorities Master. Card Examples Different Performance Comparisons Conclusion Secure Electronic Transaction Sasan Adibi 2

Objective To discuss different online transaction mechanisms and compare their functionality versus performance and

Objective To discuss different online transaction mechanisms and compare their functionality versus performance and cost Secure Electronic Transaction Sasan Adibi 3

Leading protocols for securing the online purchase process , • Secure Sockets Layer (SSL)

Leading protocols for securing the online purchase process , • Secure Sockets Layer (SSL) protocol (encrypted transaction) • Secure Electronic Transaction (SET) protocol (authenticate buyers) • OFX • OBI Secure Electronic Transaction Sasan Adibi 4

SSL (Secure Socket Layer) • Session Level Security • Certain level of trust between

SSL (Secure Socket Layer) • Session Level Security • Certain level of trust between online purchaser and online seller • Purchaser is authorized to use the credit card • Seller is authorized to accept credit cards • Seller protects against all types of security issues Secure Electronic Transaction Sasan Adibi 5

SSL’s Drawbacks • Security is always an on-going issue • Specially for “soft goods”

SSL’s Drawbacks • Security is always an on-going issue • Specially for “soft goods” • Complex communication/handshaking • Slow • Minimal graphics, lack of visual attractions Secure Electronic Transaction Sasan Adibi 6

SET (Secure Electronic Transaction) • Ensure your customer is authorized to use his account

SET (Secure Electronic Transaction) • Ensure your customer is authorized to use his account • Customer wants to make sure you are the legit seller • Ensure payment is received • Ensure goods are received Secure Electronic Transaction Sasan Adibi 7

Five Principles of Cryptosystems • Privacy (only the intended recipient can • • read

Five Principles of Cryptosystems • Privacy (only the intended recipient can • • read your messages) Authentication (you are who you say you are) Authorization (who can do what) Integrity (you and the recipient both know nothing got changed) Non-repudiation (no one can falsely deny a transaction) Secure Electronic Transaction Sasan Adibi 8

Privacy • Privacy means that the message contents cannot be seen by anyone but

Privacy • Privacy means that the message contents cannot be seen by anyone but the intended parties • Accomplished through the use of encryption Secure Electronic Transaction Sasan Adibi 9

Authentication • Authentication means that each party involved in the transaction is identified as

Authentication • Authentication means that each party involved in the transaction is identified as legitimate • Accomplished through the use of certificates • A certificate is a notarized public key (like a passport or a driver’s license) • Issued by a trusted third party called a Certificate Authority • Binds the certificate owner to the public key within the certificate Secure Electronic Transaction Sasan Adibi 10

Authorization • Lists of users who have different rights to do various tasks on

Authorization • Lists of users who have different rights to do various tasks on a web site • Being able to track individuals throughout your computing systems and multiple logins Secure Electronic Transaction Sasan Adibi 11

Integrity • Integrity of data means that it cannot be altered by anyone during

Integrity • Integrity of data means that it cannot be altered by anyone during transmission, to avoid a “man in the middle” attack • Encryption allows only the intended recipient to open the digital envelope • A digital envelope (or ”hash”) = contents of an encrypted message + digital signature Secure Electronic Transaction Sasan Adibi 12

Non-repudiation • Non-repudiation means both parties to the transaction are ensured that the message

Non-repudiation • Non-repudiation means both parties to the transaction are ensured that the message is genuine and cannot be disputed • Parties are identified with certificates that have been notarized by a trusted Certificate Authority • It will be much harder for customers to claim they never placed the order Secure Electronic Transaction Sasan Adibi 13

Why Should You Get a Server Certificate? • You want those who visit your

Why Should You Get a Server Certificate? • You want those who visit your web site to know you are a legitimate business • A certificate is required to operate a secure server (SSL) Secure Electronic Transaction Sasan Adibi 14

Certificate Authorities (CAs) • Anyone who issues certificates is a Certificate Authority (CA). They’re

Certificate Authorities (CAs) • Anyone who issues certificates is a Certificate Authority (CA). They’re required to publish the certificate they issue. In practice this functionality is broken down into other subtasks… • Trusted third parties, similar to notaries • Can be external or internal (server is managed within your own company) • Choice of a CA may depend on your merchant server software Secure Electronic Transaction Sasan Adibi 15

Steps in Certificate Creation • Refer to you server software documentation for selection of

Steps in Certificate Creation • Refer to you server software documentation for selection of a CA and instructions • Generally you will do the following: • • Generate a key pair of public and private keys Send the public key and other information to CA CA verifies information provided Upon verification, CA creates a certificate containing public key and expiration date • The Certificate is sent back to applicant and may be posted publicly, if appropriate Secure Electronic Transaction Sasan Adibi 16

Examples of Certificate Authorities • Veri. Sign • www. Verisign. com • GTE Cyber.

Examples of Certificate Authorities • Veri. Sign • www. Verisign. com • GTE Cyber. Trust Solutions, Inc. • www. cybertrust. gte. com • Thawte Consulting • www. thawte. com Secure Electronic Transaction Sasan Adibi 17

Different Classes of Certs • Class 1 (No authentication, emails) • Class 2 (Minimum

Different Classes of Certs • Class 1 (No authentication, emails) • Class 2 (Minimum authentication) • Class 3 (Substantial authentication) • Class 4 (High security) Secure Electronic Transaction Sasan Adibi 18

Certificate Management • Once public key certificates are issued, they must be managed to

Certificate Management • Once public key certificates are issued, they must be managed to maintain integrity • They contain expiration dates • They may be revoked for various reasons • Upon expiration, certificates must be renewed or reissued • This is a consideration for using an external CA, as opposed to managing an internal CA Secure Electronic Transaction Sasan Adibi 19

How is this accomplished? • Secure servers and browsers • Capable of strong encryption

How is this accomplished? • Secure servers and browsers • Capable of strong encryption (up to 128 bit) • 40 bit encryption is no longer considered adequate for financial transactions • Digital certificates • Ensure the identity of the certificate holder and are used to prevent impersonation/man-in-the middle attack • Also called digital IDs • The common protocol in use today is Secure Sockets Layer (SSL) Secure Electronic Transaction Sasan Adibi 20

Secure Sockets Layer Protocol (SSL) • Authenticates the merchant server • Merchant Certificate obtained

Secure Sockets Layer Protocol (SSL) • Authenticates the merchant server • Merchant Certificate obtained from trusted Certificate Authority • Provides privacy through encryption of the message for both the sender and receiver • Secure “pipe” negotiates maximum encryption compatible at browser and server for each message transmitted • Ensures integrity of data transmitted • Message authenticity check (algorithm) Secure Electronic Transaction Sasan Adibi 21

Secure Sockets Layer Protocol (SSL) Merchant’s Certificate (Digital ID) can be viewed by any

Secure Sockets Layer Protocol (SSL) Merchant’s Certificate (Digital ID) can be viewed by any secure browser • https: // in the URL = a secure connection • SSL allows customers to verify who the merchant is • The merchant’s digital ID does not certify the integrity of the merchant Secure Electronic Transaction Sasan Adibi 22

Secure Sockets Layer Protocol (SSL) Customer Order with Encrypted Payment Information order sent Customer

Secure Sockets Layer Protocol (SSL) Customer Order with Encrypted Payment Information order sent Customer order decrypted at merchant server • SSL encrypts the customer order, which includes the payment information • This data is sent from the customer to the merchant via a secure “pipe” Secure Electronic Transaction Sasan Adibi 23

What SSL Doesn’t Encrypt • Once the data arrives on the secure server, it

What SSL Doesn’t Encrypt • Once the data arrives on the secure server, it could be stored in an insecure location! • Or if someone has physical access to your desktop or server Secure Electronic Transaction Sasan Adibi 24

SSL: How do you get a certificate for your merchant server? ‘ • Apply

SSL: How do you get a certificate for your merchant server? ‘ • Apply to Certificate Authority • Instructions built into merchant server software • You will be asked to provide valid business license and other ID • Cost is dependent upon level of certification Secure Electronic Transaction Sasan Adibi 25

Encryption Strength • It is illegal to export outside the US products containing encryption

Encryption Strength • It is illegal to export outside the US products containing encryption that is stronger than 40 bits • It is not illegal to use encryption stronger than 40 bits internationally • Financial institutions do not consider 40 bit encryption adequate for Internet transactions Secure Electronic Transaction Sasan Adibi 26

Encryption Strength • Newer browser and server software capable of 128 -bit encryption •

Encryption Strength • Newer browser and server software capable of 128 -bit encryption • 128 -bit encryption is exponentially stronger than 40 -bit encryption Secure Electronic Transaction Sasan Adibi 27

SET: Authenticate Buyers • What is the protocol • How it works • Advantages

SET: Authenticate Buyers • What is the protocol • How it works • Advantages and disadvantages Secure Electronic Transaction Sasan Adibi 28

What is SET protocol? • Secure Electronic Transaction protocol is a common standard that

What is SET protocol? • Secure Electronic Transaction protocol is a common standard that was developed jointly by Visa, Master. Card and other partners to ensure the processing of secure transactions. • Based on RSA encryption • Uses public and private key pairs that have a mathematical relationship Secure Electronic Transaction Sasan Adibi 29

How is SET Different from SSL? • Digital certificates for SET will be payment-

How is SET Different from SSL? • Digital certificates for SET will be payment- specific • Merchants will be certified as legitimate to accept branded payment card transactions • Cardholders will be certified as valid account holders • Merchants will not see customer’s account number (it will only be passed to the acquirer) Secure Electronic Transaction Sasan Adibi 30

How is SET Different from SSL? With SET: Customer’s Digital ID related to a

How is SET Different from SSL? With SET: Customer’s Digital ID related to a specific account + Customer Order info Merchant Server gets Customer’s Digital ID minus the account number + Customer Order Acquirer gets order receipt + Customer’s Digital ID with account number Secure Electronic Transaction Sasan Adibi 31

The Mechanics of SET • (1) Payment info sent from user to merchant •

The Mechanics of SET • (1) Payment info sent from user to merchant • (2) Merchant confirms, fees charged • (3) Transaction to bank, funds debited/credited • (4) Merchant sends item to user Secure Electronic Transaction Sasan Adibi 32

How Will Certificates (Digital IDs) be issued for e. Commerce? ‘ • Hierarchy of

How Will Certificates (Digital IDs) be issued for e. Commerce? ‘ • Hierarchy of trust for certificate issuance • Visa and Master. Card will designate a Certificate Authority to hold the Trusted Root • Merchants will obtain certificates from banks’ or acquirers’ Certificate Authority, then store on SET server software • Cardholders will obtain certificates (digital IDs) from their banks’ Certificate Authority, then store in electronic wallet Secure Electronic Transaction Sasan Adibi 33

Master. Card® Example of a SET Transaction ‘ http: //www. mastercard. com/set/screen 1. html

Master. Card® Example of a SET Transaction ‘ http: //www. mastercard. com/set/screen 1. html Secure Electronic Transaction Sasan Adibi 34

SSL vs. SET SSL • Server authentication • Merchant certificate as legitimate business •

SSL vs. SET SSL • Server authentication • Merchant certificate as legitimate business • Possible for client SET • Server authentication • Merchant certificate tied to accept payment brands • Customer authentication • Not tied to payment method • Digital certificate tied to certain payment method • Privacy • Encrypted message to merchant includes account number • Encrypted message does not pass account number to merchant • Integrity • Message authenticity check (MAC) • Hash/message envelope Secure Electronic Transaction Sasan Adibi 35

Is SET the Answer to e. Commerce? • SET has been proposed as the

Is SET the Answer to e. Commerce? • SET has been proposed as the answer to secure and interoperable e. Commerce • It is not currently mandated by Visa and Master. Card • There are big implementation issues for all concerned • The SET protocol is definitely more secure than SSL • However. . . Secure Electronic Transaction Sasan Adibi 36

SET Issues • Implementation of SET has some big drawbacks: • Lack of interoperability

SET Issues • Implementation of SET has some big drawbacks: • Lack of interoperability among systems • Management of public key infrastructure • Distribution of digital certificates requires action on the part of the consumer • Will banks want to become cert authorities? • And who will pay for all this? • Meanwhile, e. Commerce goes on Secure Electronic Transaction Sasan Adibi 37

The Future of SET • Non-repudiation of transactions through digital certificates for both merchant

The Future of SET • Non-repudiation of transactions through digital certificates for both merchant and customer • SET may be the industry standard for payments, but yet to be implemented • It will be far more difficult for a customer to claim no knowledge of a transaction • Demonstrations continue Secure Electronic Transaction Sasan Adibi 38

Comparisons and Performance Analysis Secure Electronic Transaction Sasan Adibi

Comparisons and Performance Analysis Secure Electronic Transaction Sasan Adibi

E-Commerce Process Three processes: 1). Customer’s client PC, 2). Merchant’s e-commerce server, 3). acquiring

E-Commerce Process Three processes: 1). Customer’s client PC, 2). Merchant’s e-commerce server, 3). acquiring bank’s payment gateway server Secure Electronic Transaction Sasan Adibi 40

e_Commerce Server Performance The operations required for a SET transaction, each of the connections

e_Commerce Server Performance The operations required for a SET transaction, each of the connections represents a single encryption/decryption operation. As the figure shows, this results in the requirement for two operations per transaction at the client, six at the merchant and four at the acquirer. A SSL connection, in contrast, only requires a single operation at the client, three at the merchant and two at the acquirer. Secure Electronic Transaction Sasan Adibi 41

Technologies to Improve Performance • Symmetric multiprocessing (SMP) CPU scaling • OS’s allocation of

Technologies to Improve Performance • Symmetric multiprocessing (SMP) CPU scaling • OS’s allocation of functions of CPU • Clustering • Sharing application load among CPUs forming cluster • Cryptographic accelerators • Special-purpose hardware helping cryptography • Elliptical curve cryptography (ECC) • Efficient algorithm with small key size • Random Key Secure Stream (RKS) Electronic Transaction Sasan Adibi 42

Large e-Commerce Server Example Secure Electronic Transaction Sasan Adibi 43

Large e-Commerce Server Example Secure Electronic Transaction Sasan Adibi 43

Peak Transaction Per Second Load Secure Electronic Transaction Sasan Adibi 44

Peak Transaction Per Second Load Secure Electronic Transaction Sasan Adibi 44

Peak Load requirements vs. Capacity with Crypto acceleration Secure Electronic Transaction Sasan Adibi 45

Peak Load requirements vs. Capacity with Crypto acceleration Secure Electronic Transaction Sasan Adibi 45

The Effect of ECC Secure Electronic Transaction Sasan Adibi 46

The Effect of ECC Secure Electronic Transaction Sasan Adibi 46

Cost of performance with clustered systems ‘ Secure Electronic Transaction Sasan Adibi 47

Cost of performance with clustered systems ‘ Secure Electronic Transaction Sasan Adibi 47

Cost of performance with clustered systems and ECC, no cryptographic acceleration ‘ Secure Electronic

Cost of performance with clustered systems and ECC, no cryptographic acceleration ‘ Secure Electronic Transaction Sasan Adibi 48

Cost Comparison of SET and SSL Secure Electronic Transaction Sasan Adibi 49

Cost Comparison of SET and SSL Secure Electronic Transaction Sasan Adibi 49

Conclusion • • Independent of the protocol in use, Cryptographic processes require substantial compute

Conclusion • • Independent of the protocol in use, Cryptographic processes require substantial compute power, The cost of additional hardware support required to support SET is small in all of the application scenarios, including: • For the low and medium e-commerce applications, there is no additional server cost to support SET over SSL. • For the large e-commerce server application, supporting SET requires additional hardware acceleration in the medium term with a 5 percent to 6 percent difference in server cost. • For the small payment gateway application, hardware acceleration is required in the short term, but can be phased out as servers improve in performance and if other improvements, e. i. , elliptical-curve cryptography (ECC) become available. • We anticipate that the large payment gateway applications will always be based on clustered systems for reasons of robustness and reliability. Secure Electronic Transaction Sasan Adibi 50

The End Thank you Secure Electronic Transaction Sasan Adibi

The End Thank you Secure Electronic Transaction Sasan Adibi