Secure Electronic Transactions (SET)
#1



ABSTRACT


A protocol designed to ensure the security and integrity of online communications and purchases, Secure Electronic Transaction (SET) uses digital certificates, issued to merchants and other businesses and customers, to perform a series of security checks verifying that the identity of a customer or sender of information is valid. SET provides the basic framework within which many of the various components of securing digital transactions function. Digital certificates, digital signatures, and digital wallets all function according to the SET protocol.

Secure Electronic Transactions (SET) relies on the science of cryptography – the art of encoding and decoding messages. Cryptography dates back many centuries – even in the time of Julius Caesar, encryption was used to preserve the secrecy of messages. Preserving the secrecy of transactions is no different, though stronger encryption algorithms are used, as well as significantly stronger encryption keys. Encryption advancements have come about through its application by the military, and by advances in computing power and mathematics.
The SET protocol relies on two different encryption mechanisms, as well as an authentication mechanism. SET uses symmetric encryption, in the form of the aging Data Encryption Standard (DES), as well as asymmetric, or public-key, encryption to transmit session keys for DES transactions (IBM, 1998). Rather than offer the security and protection afforded by public-key cryptography, SET simply uses session keys (56 bits) which are transmitted asymmetrically – the remainder of the transaction uses symmetric encryption in the form of DES. This has disturbing connotations for a "secure" electronic transaction protocol – because public key cryptography is only used only to encrypt DES keys and for authentication, and not for the main body of the transaction. The computational cost of asymmetric encryption is cited as reason for using weak 56 bit DES (IBM, 1998), however other reasons such as export/import restrictions, and the perceived need by law enforcement and government agencies to access the plain-text of encrypted SET messages may also play a role.

for more:
http://davidreillytopics/electronic_commerce/essays/secure_electronic_transactions.html
http://ecommerce.hostip.info/pages/925/S...n-SET.html




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: biometrics in secure e transactions pdf, centos ip sniffr, project on e secure transactions, set up engineering wandsworth, biometrics in secure e transactions ppt download, biometrics in secure e transactions wikipedia, set course for weed,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ELECTRONIC EYE seminar class 18 14,767 02-02-2019, 12:56 PM
Last Post:
  ELECTRONIC DEVICE FOR BLIND MOBILITY AID seminar class 9 6,864 23-08-2013, 10:56 AM
Last Post: computer topic
  ELECTRONIC WARFARE seminar class 5 3,659 20-07-2013, 09:51 AM
Last Post: computer topic
  Electronic starter for single phase induction motors with starting capacitor computer girl 1 1,635 13-11-2012, 11:59 AM
Last Post: seminar details
  ELECTRONIC EYE WITH DIAL-UP project report helper 1 4,453 02-11-2012, 03:57 PM
Last Post: seminar details
  The Electronic Passport and the Future of Government-Issued RFID-Based dentificatio seminar class 1 2,550 03-10-2012, 01:06 PM
Last Post: seminar details
  Seminar on Wireless Sensor Networks is an Intelligent Electronic Devices computer girl 0 1,282 11-06-2012, 04:03 PM
Last Post: computer girl
  Electronic Combination Lock using IC LS 7220 computer girl 0 1,082 07-06-2012, 12:05 PM
Last Post: computer girl
  BSV by Example- The next-generation language for electronic system design computer girl 0 1,202 05-06-2012, 05:03 PM
Last Post: computer girl
  SILC(Secure Internet Live conferencing) Computer Science Clay 7 5,906 12-03-2012, 12:25 PM
Last Post: seminar paper

Forum Jump: