TLS, SSL, and SET

TLS, SSL, and SET

Manuel Mogollon (University of Dallas, USA)
Copyright: © 2008 |Pages: 34
DOI: 10.4018/978-1-59904-837-6.ch012
OnDemand PDF Download:
$37.50

Abstract

In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted using transport layer security (TLS) or secure socket layer (SSL) protocols. When a purchase is made online using a credit card, does the customer’s bank need to know what was purchased? Not really. Does the seller need to know the customer’s credit card number? Actually, the answer is no. The responses to these questions were the main premises of the secure electronic transaction (SET). In the late 1990’s, SET was approved as the credit card standard, but it failed to be accepted because of its cost and the problems regarding distribution of end-user certificates. However, SET is explained in this chapter as an ideal protocol, from the point of view of certificates, digital signatures, and cryptography for securing credit card transactions over the Internet.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
John H. Nugent
Acknowledgment
Manuel Mogollon
Chapter 1
Classic Cryptography  (pages 1-14)
Manuel Mogollon
Chapters 1 and 2 cover information on classic cryptography and the aspects of information security related to security services and mechanisms. The... Sample PDF
Classic Cryptography
$37.50
Chapter 2
Information Assurance  (pages 15-32)
Manuel Mogollon
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in... Sample PDF
Information Assurance
$37.50
Chapter 3
Manuel Mogollon
Mathematics plays an important role in encryption, public-key, authentication, and digital signatures. Knowing certain basic math concepts such as... Sample PDF
Number Theory and Finite Fields
$37.50
Chapter 4
Manuel Mogollon
In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement... Sample PDF
Confidentiality: Symmetric Encryption
$37.50
Chapter 5
Manuel Mogollon
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically... Sample PDF
Confidentiality: Asymmertic Encrypton
$37.50
Chapter 6
Manuel Mogollon
In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash... Sample PDF
Integrity and Authentication
$37.50
Chapter 7
Access Authentication  (pages 152-188)
Manuel Mogollon
Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication... Sample PDF
Access Authentication
$37.50
Chapter 8
Manuel Mogollon
For the same level of security that public-key cryptosystems such as RSA have, elliptic curve cryptography (ECC) offers the benefit of smaller key... Sample PDF
Elliptic Curve Cryptograpy
$37.50
Chapter 9
Manuel Mogollon
In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its... Sample PDF
Certificates and Public Key Infrastructure
$37.50
Chapter 10
Electronic Mail Security  (pages 246-265)
Manuel Mogollon
In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto... Sample PDF
Electronic Mail Security
$37.50
Chapter 11
VPNS and IPSEC  (pages 266-299)
Manuel Mogollon
Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks... Sample PDF
VPNS and IPSEC
$37.50
Chapter 12
TLS, SSL, and SET  (pages 300-333)
Manuel Mogollon
In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted... Sample PDF
TLS, SSL, and SET
$37.50
Chapter 13
Web Services Security  (pages 334-408)
Manuel Mogollon
A service is an application offered by an organization that can be accessed through a programmable interface. Web services allow computers running... Sample PDF
Web Services Security
$37.50
Chapter 14
Wireless Security  (pages 409-446)
Manuel Mogollon
The nature of wireless is that of a physically open medium which makes authentication, access control, and confidentiality necessary in the... Sample PDF
Wireless Security
$37.50
Glossary of Terms
About the Author