Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

29
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt

Transcript of Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Page 1: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications:A First Course

Chapter 14

by

David G. Messerschmitt

Page 2: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications:A First Course

Electronic payments

by

David G. Messerschmitt

Page 3: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course3

Electronic payments: the players

Consumer Merchant Financial institutions

Physical tokensrepresenting value

Page 4: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course4

Some forms of spending money

Demand deposit

Cash reserves

Credit

Debit

Check

Cash

Loan

Withdrawal

Withdrawal

Withdrawal

Page 5: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course5

Questions about value tokens

• Who will back the value?

• How is fraud, counterfeiting, etc. prevented?

• Will value restored if lost or stolen?

• Is it subject to regulation?

• Who pays for the system?

• Is it traced?

Page 6: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course6

Policy dilemmas

• Multiplicity of incompatible payment systems?

• Tracing and auditing:– Criminal prosecution– Taxation

vs– Personal privacy

Page 7: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course7

Some privacy initiatives

• Open Profiling Standard

• TRUSTe

• Anonymous digital cash

Page 8: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course8

Electronic credit and debit

• Standard authentication, confidentiality, and non-repudiation techniques can be used– Asymmetric encryption and certificates

• Framework must take into account different institutions involved

• Example: Secure Electronic Transactions (SET) of Visa/Mastercard

Page 9: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course9

Participants

• Consumer (cardholder)

• Merchant

• Acquirer: financial institution acting as transaction clearinghouse for merchant

• Issuer: financial institution that issued consumer credit/debit card

• Association: Visa or Mastercard

Page 10: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course10

SET chain of trust

Cardholder

Acquirer

Issuer

AssociationSET Root

Merchant

(self-signed,included in allsoftware)

Page 11: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course11

SET order/payment protocol

initiate

purchase authorize

capture

Consumer Merchant Acquirer Issuer

authorize

capture

Page 12: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course12

Smartcard

Card that contains encapsulated electronics and can be used for various forms of electronic commerce (and other things)

Page 13: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course13

Prepaid smartcard options

• Memory card– Memory plus password/PIN protection

• Shared-secret– Mutual authentication of any terminal sharing the secret

• Signature-carrying– Carries signatures created by institution

• Signature-creating– Hardware to create signature based on secret key

Page 14: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course14

Smartcard merits

• Memory– Closed system: single institution– No authentication of terminal

• Shared-secret– Requires encapsulated module in terminal, one

to carry each card secret– One secret per institution implies that all cards

of that institution can be compromised

Page 15: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course15

Smartcard merits (con’t)

• Signature– Terminals need only public keys– Easy to handle multiple institutions

• All but signature-carrying have unique card identity, and hence institutions can invade privacy by linking transactions

Page 16: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course16

Hard vs. digital cash

Withdraw

Deposit

Page 17: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course17

Digital cash010110101101010111010110101011010110101011010110101011010101101010110111101011111011010000000110101010110101

Since digital cash is represented by data, it is easily replicated. How do we prevent:

•Counterfeiting?

•Multiple spending?

Page 18: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course18

What is a digital cash token?

Unique identifier

Value attribute

Bank digital signature

Bitstring

Preventscounterfeiting

Preventsspending more than once

Page 19: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course19

Financial institution perspectiveConsumer’s demand deposit

Branch ATM Digital branch

Currency in wallet

Currency in smartcard

Merchant

Merchant’s demand deposit

Vault cash Digital cashliability

Payment

Deposit

Withdrawal

May returnas moredigital cash

Page 20: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course20

Digital cash must be deposited

Consumer wallet Consumer smartcard

Merchant Merchant

Hard currency

Spend Deposit

Digital cash

Deposit

Withdrawas newdigital cash

Page 21: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course21

Possible characteristics of digital cash

• Anonymity of consumer– Merchant knows who paid, but that information

is not inherent to the digital cash itself– Financial institution knows what merchant

deposited

• Attribution of cheating– Double spending

• Authorized traces

Page 22: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course22

Spending anonymity

Withdrawal

PaymentDeposit

Withdrawal and deposit are traceable, but can we break the chain somewhere?

Page 23: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications:A First Course

Supplements

by

David G. Messerschmitt

Page 24: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course24

Message digest

MDalgorithm

Message Message digest

• MD is a fixed length (128 or 160 bit) summary of message

• One way: message cannot be recovered from MD

• Collision-free: computationally infeasible to find a message corresponding to a given MD

Page 25: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course25

Digital signature based on a message digest

MDEncrypt

secret keyMessage Decrypt

public key

MD

Compare

Sig

natu

reSignaturegeneration

Signaturechecking

Page 26: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course26

Dual signature

Offer

Paymentauthorization

Dualsignature

Merchant

Acquirer

Consumer

MD

MD

Acquirer can verify binding of offer and authorization, does not see offer

Merchant can verify binding ofoffer and authorization, does not seeauthorization

Page 27: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course27

Spending anonymityCreate $$,including identifier

Blindsignature

If the consumer’s software creates the digital cash, and the bank signs it blindly, the bank will not see the identifier. The cut and choose protocol assures the bank the $$ is proper.

Repeat n times

Cut and choose one

Page 28: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course28

Blind signature analogy

TokenCarbon

Put token and carbon in envelope

$$

Present to bank for embossing

Remove token from envelope

$$

Consumer gets bank to sign cash token without observing contents

Page 29: Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.

Understanding Networked Applications A First Course29

Cut and choose protocol$$$$$$$$$$

$$Randomlychoose one,check others

Blindsignature

$$

Although the bank can’t see what it is signing, with the cut and choose the incentive for the consumer is to generate legitimate instances of digital cash.