E-Payment - DePaul University

Download Report

Transcript E-Payment - DePaul University

E-Payment
ECT 582
Robin Burke
Outline
Schedule changes
 Characteristics
 Select protocols

Characteristics of payment
systems
Security / Privacy
 Convenience
 Cost
 Overhead
 Interoperability

Security / Privacy





Anonymous
 seller or buyer authentication required?
Non-repudiation
 secure receipt generated?
Security
 against theft?
 against forgery?
 against double-spending?
Privacy
 properties of transaction hidden from involved parties
Fail-safe
 is money lost / created in system failure?
Cost

Fixed cost


Transaction cost


cost per transaction
Float


cost to adopt the technology
accrual of accumulated interest
Risk

possible financial loss to buyer / seller
Convenience

Complexity


Two-way


does one or both parties need a special account established
in advance?
Respendability


no need for connection to third-party during transaction
Account


peer to peer payment possible
Off-line


number of steps to complete transaction
no intermediate steps between receiving and spending
Portable

not location-dependent
Interoperability

Exchangeable


Transferable


can be subdivided into smaller units
Hardware independent


can be transferred from individual to
individual
Divisible


one type of currency for another
no special hardware required
Monetary value

built-in value
Overhead

Scalability


Delay


transactions / users
how long does the transaction take?
Hardware / software requirements
Examples
Cash
 Check
 Credit card
 Online credit card
 Mondex
 PayPal
 Digital wallet

Framework

Players


Processes


who is involved
what is the protocol
Properties
costs
 risks
 etc

Cash

Players


buyer / seller (Bob & Susie)
Process
secure document
 fixed amount
 physical exchange

Cash properties
anonymity
 exchangable
 low cost
 repudiable, without receipt step
 low tech
 monetary
 untraceable

Check

Players




Bob, Susie
Bob's bank BK, Susie's bank SK
Verification service V
Process






physical exchange
secure document with biometric ID
Susie may verify with V before accepting
Susie deposits with SK
SK settles with BK via ACH
Bob's account at BK debited
Check properties

Accounts required




Traceable
Non-anonymous
Medium cost



Bob and Susie
10-20¢
Risk to seller if verification not in place
Non-transferable (in theory)

biometric authentication
PayPal

Players


Bob, Susie, PayPal
Setup

Bob needs a PayPal account
• linked to a bank account or credit card

Process


Bob uses the PayPal application to send
money using Susie's email address
Susie can access her funds by creating a
PayPal account linked to her email address
Characteristics




Low transaction cost
Re-spendable
On-line only
Viral


recipient must get an account to get paid
Traceable, non-anonymous


must be "backed"
by a credit card or bank account
Credit card

Players




Bob, Susie, SK (acquirer)
Card issuer BC
Transaction processor T
Setup



Susie must have card processing account
SK leases POS hardware and network
access
Bob must have credit card
Credit card cont'd

Presentation



Authorization





Bob presents card or
Bob presents card number plus other information
Susie contacts SK with card info
SK contacts T
T contacts BC
BC can accept, deny, etc.
Capture

Transaction is committed
•



Authorization steps happen again with capture flag
card balance debited
Settlement


goods accepted
BC transfers money to SK
Billing


BC sends Bob a monthly bill
Bob pays BC
Credit card cont'd
non-anonymous
 non-transferable
 security weak esp. CNP

designed to thwart simple theft
 off-line = low security

not interoperable
 low cost / low risk for buyer


BC absorbs fraud risk
Online credit card


same as before except
weak buyer authentication






physical card never present
physical signature never present
security reduced from biometric to data
weak seller authentication
major fraud opportunity
SSL protects only passive attacks on IP
traffic
SET


Same players as credit card
Central idea

Susie only needs to know that she will get
paid
• Bob's card number not essential


BC only needs to know enough to validate
the transaction
Segment the transaction
• Part for Susie
• Part for BC
SET cont'd
SET cont'd

Process







Susie and BC have public keys
Bob encrypts and signs an order O to Susie
Bob encrypts and signs payment information
P to BC
P is sent through the acquirer to BC
BC decrypts and validates the transaction
Sends Susie verification and transaction id
Susie presents transaction id to acquirer for
settlement
SET cont'd

Properties





authentication of seller
non-disclosure of credit card #
non-disclosure of order details
enhanced privacy
hardware / software requirement
• electronic wallet

Slow adoption of SET



requires PKI (hierarchical)
requires client-side software
incompatible wallet implementations
Mondex

Players


Bob, Susie
Setup



Bob and Susie both have Mondex smart cards
Bob has downloaded cash tokens to his Mondex card
Bob or Susie has a Mondex terminal
• money exchange device

Process






connect cards to terminal
enter respective PINs
cards authenticate each other's certificates
Susie's card generates signed purchase request
Bob's card acknowledges request and deletes stored
tokens
Susie's card adds tokens
Mondex cont'd

Characteristics

limited maximum storage
• reduces danger of money laundering

some buyer risk
• stolen card is lost cash




respendable
two-way
convenient
dependent on secure hardware
• risky assumption
Secure hardware

Private key stored in device



Similar to private key token for PKI BUT


key used to authenticate as "real" Mondex
device
key used to encrypt memory contents
owner has incentive to break in
How to build



packaging
internal consistency checks
"reset on fault"
Attacks against secure
hardware

Problem


physics of device cannot be hidden
Attackers can

etch new circuitry
• remove deletion step
• alter encryption algorithm

monitor encryption to capture secret key
• power consumption
• timing
• bus probe
Should we worry?

Question


where does "expected payoff" > "investment
to break"
Answer

if Mondex becomes widespread
• chip tampering = printing money

Attackers



Class I – capable outsider
Class II – knowledgeable insider
Class III – determined organization
eCash

Players


Bob, Susie
Setup


Bob and Susie have eCash accounts and
eCash software or smart card
Bob loads secure "coins" to wallet
• a coin = a $$ amount, an id and a digital signature

Process


Bob transfers coins to Susie
Susie deposits in account
Characteristics
Anonymous
 Two-way
 Non-traceable
 Respendable
 Forgery


cryptographic problem
Anonymity


Coin only has bank's identifier
Bank doesn't know



who originally withdrew it
whose hands it has passed through
Problem

double spending
• bank can detect but is Susie or Bob at fault

withdrawal
• when coins are given to Bob, ids could be
recorded
Blind signature


Problem
 sign a document without looking at it
Solution
 multiple message by a factor M*F
 sign M*F creating M*F + S
 factor out F leaving M + S/F
• for certain algorithms S/F is the correct signature for M

Bob can
 create a message = "$1"
 blind it
 have bank sign it
 deduct $1 from Bob's account
 create coin
Cut and choose


Bob could also
 create a message = "$100"
 blind it
 tell the bank it says "$1"
 have bank sign it
Solution
 Bob creates n messages
 Bank examines n-1 at random
 if they all say "$1"
• then the bank signs

we pick n to be as large as necessary for security
• may depend on size of transaction
Double spending
What if Bob spends the same coins
twice?
 What if Susie deposits the same coins
twice?
 Bank can detect

same id deposited twice
 can't distinguish

Conditional anonymity

Bob encrypts self-identifying information in
the coin


When spending



bank can verify just like $ amount
Bob discloses 50% of the key used to
decrypt personal info
if he spends twice, his identity becomes
known to the bank
A similar device can be used to protect
against double deposits
Double spending
eCash viability

Untraceability + anonymity + virtuality
many opportunities for crime
 governments hate it


DigiCash
founder Chaum
 went bankrupt
 some patents will expire soon

Digital wallet


The cure-all that wasn't
eWallet


Java Wallet


discontinued
MS Passport


out of business
no longer includes credit card info
W3C digital wallet initiative

discontinued
Why?

information not portable


information too portable


single machine
third party
insufficient trust in client software
Conclusion


Very few e-payment success stories
Credit cards



approximately 1.8 billion in fraud on-line in
2002
still the dominant mechanism
Reasons

convenience
• already in use

low buyer risk
Homework #5
Protocol design
 Tax uploading problem

Next week
Internet security
 Firewalls
