Sunday, July 10, 2011

E-COMMERCE SECURITY USING SECURE ELECTRONIC TRANSACTIONS

Technological developments have changed the way we think about shopping for a more effective, efficient and energy saving. We no longer need to spend time and effort to get to the store, memilih2 goods, and queuing at the cashier. Now we can relax in front of the computer, select the item from the global markets of goods, pay with credit cards and after a few days things have come our message.
In practice, shopping on the web requires a connection to the Internet and a browser that supports secure electronic transactions, such as Microsoft Internet Explorer and Netscape Navigator. Which indicates a retailer's web site is safe or not is a special mark that appears in the status bar at the bottom of the browser screen. In IE, the sign that appears are locked padlock sign in the right corner of the status bar. While users of Netscape Navigator, will see a key in the left corner of the status bar. If these signs appear, it means you are tar-connect on a secure server. However, because the standard used for secure connection is relatively new, yet all cybershop using this standard.
Microsoft and Netscape, in cooperation with a company credit card (Visa and MasterCard), as well as internet security companies (such as VeriSign), has made ​​a special encryption standards that make transactions via the web to be very safe. In fact, Visa and MasterCard provide 100% security guarantee to users that use credit cardnya e-com.Mereka can do so because they develop the SET (Secure Electronic Transaction).

SET (Secure Electronic Transaction)
SET is the Secure Electronic Transaction protocol developed by Visa and MasterCard specifically to enable secure credit card transactions on the Internet. Using digital certificates to verify the identity of all parties involved in the purchase and encrypt credit card information before sending it on the Internet.
Components for the SET Protocol
• Card Holder Application, also known as digital wallets, organized by the online consumer and package digital signature and credit card information to ensure its identity and its protection of financial information through a complex encryption system.
• Merchant Server Component is product verification conducted by the merchant to process card payments online.
• Payment Gateway component is held by an acquiring bank or trusted third parties who receive and process verification of the merchant and customer payment information and filter them to the appropriate financial institution.
• Component Certificate Authority, usually run by a financial institution, is a trusted agent that issued the digital certificate and is responsible for ensuring that all users of digital certificates really secure and reliable customers.
SET mechanism

Standard encryption used in e-commerce at present is SET (Secure Electronic Transaction). Besides being used for payment by credit card, SET is also used for payment with the smartcard. By using the SET, the confidentiality of customer information (as the name and card number) can be maintained. SET can also keep the autotentifikasi or identity of the seller and the customer, so it can not be misused by anyone.
SET uses a special cryptographic called asymmetric cryptography to guarantee the security of a transaction. Asymmetric cryptography is also called by the name of the Public-Key Cryptography. This encryption uses two keys / key (ie code), a key used to encrypt the data, and other key to decrypt the data. The two keys are mathematically linked with a specific formula, so that the data has been encrypted by one key can only be decrypted using a key partner.
Each user has two keys, namely puclic key and private key. Users can freely distribute a public key. Because of the special relationship between the two keys, users and anyone who receives the public key received assurance that the data has been encrypted with a public key and sent to the user can only be decrypted by private key. Security is assured for the user to maintain the confidentiality of private keys. This key pair must be created specifically by the user. The algorithms typically used to manufacture key is the RSA algorithm (named after the initials of the author, namely: Rivest, Shamir, and Adleman).
That is, a party e-commerce managers that use SET, should make a special key partner for the web. The public key will be deployed, and this is usually done through the dissemination of a web browser. The public key is included for free to every web browser, and have been available if the browser is installed. Private key, public key pair for the pair is held by the manager of e-com.
If buyers use a browser to send a form of transaction, the buyer will use a public key that has been available on the web browser. Other people who do not have the private key partner, will not be able to decrypt the form data sent with the public key. After the data up to the manager of e-com, the data will be decrypted using the private key. That is, only the manager of e-com could get that data in the form of the truth, and identity data and customer credit card numbers will not fall into unauthorized hands.

No comments:

Post a Comment