Skip to main content

Explain Different Types of e-Payment Security Schemes in e-Commerce

Explain E-payment Security Schemes


Explain Different Types of e-Payment Security Schemes in e-Commerce

Following are the e-payment security schemes
1) Encryption 2) Certificates & Certificates Authority (CA) 3) Digital Signature
4) Digital Envelop 5) Message Digest 6) Transaction Certificates and Time Stamp

(1) Encryption

Encryption refers to changing a message into unreadable form. Later the encrypted message can be converted into readable form by Decryption.
There are two types of Encryption

(A) Secret Key Encryption/Private Key Encryption

In this scheme, same key called secret key is used by sender and receiver for Encryption (Making message unreadable) & Decryption (Getting original message).



Data Encryption Standards (DES) is the most widely used algorithm for secret key/private key encryption scheme.

(B) Public Key Cryptography




It is Also known as asymmetric Encryption. It uses two different keys (1) Private Key (2) Public Key. The receiver sends his public key to sender. The sender encrypts message with this public key. Then Message is sent to receiver. Now Receiver uses his private key to decrypt message.

2. Certificates & Certificates Authority (CA)

A certificate represents and identifying certificate issued by a trusted third party called Certificate of Authority. A certificate includes records such as series number name of Owner, Name of CA & Digital signature of CA.

Explain Different Types of e-Payment Security Schemes in e-Commerce

(VeriSign is a most popular pioneering CA. Established in 1999).

3. Digital Signature

Digital signature is a phrase (like Ahmed, Saeed Malik). It Is Encrypted by Sender’s private key. Digital signature is attached with the encrypted message and sent to receiver. Digital signature ensures that sender is verified. Receiver will use sender’s public key to decrypt message.

4. Digital Envelope

Is another encryption scheme. It is used to encrypt a secret key with the receiver’s public key. Now encrypted message & key is sent to receiver. Receiver will open the key first and then he will decrypt the message with this key.

5. Message Digest

It helps to verify that a message is not changed in its way from sender to receiver. Message digest is a bit string. It is unique for each message. A special formula is called hash function is used to calculate message digest of a message. The encrypted message with message digest is sent to receiver. Now if message is changed in the way then its message digest will not match.

6. Transaction Certificates and Time Stamp

A transaction certificate attests to some fact about the conduct of a transaction. It can be used to prevent repudiation (denial). Similarly a time stamp ensures that a document was present at a particular time.


Basics of eCommerce

  1. Definition and History of ECommerce
  2. Role of E-Commerce in Daily Life
  3. Classification of e-Commerce Applications
  4. Difference Between Electronic Market and IOS
  5. Types Of e-Commerce


Ecommerce Payment Systems/ ePayment

  1. Types of Popular e-Payment Systems
  2. Explain Credit Card Payment System
  3. Advantages Disadvantages of Credit Cards
  4. Difference Between Debit Card and Credit Card
  5. Types of E-payment Security Schemes
  6. Types of e-Payment Security Protocols

Comments

Andrea said…
Great ! I am grateful to you for sharing all the schemes that are used for security purpose in e payment systems. You have explained a short description of each of the type. After knowing all of them I would like to know which one is the most secured means.
digital signature Adobe Reader

Popular posts from this blog

Basic Structure of HTML Document

Basic Structure of HTML Document  The basic structure of an HTML document is given below: <HTML>         <HEAD>                  </HEAD>                 <BODY>                </BODY> </HTML> The above format shows that an HTML document starts with <HTML> tag and ends with </HTML> tag. It is also clear that an HTML document consists of two main sections:  Head Section Head section is used to specify a title of the web page, normally. There are some other uses of Head section too, like linking external style sheets and Java script code, etc. Head section starts with the <HEAD> tag and ends with the </HEAD> tag. <TITLE> tag is used to display a title of...

What are Different Types of Input Devices With Examples

Topic: Different types of input devices of a computer system with examples, pictures and explanation:  Topics Covered are: Definition of Input Devices Functions of Input Devices ( How input devices work? ) Examples of Input Devices Pictures / Images of different input devices Different Examples of Input Devices With Description Keybboard Mouse Trach Ball Trackpad Joy Stick Light Pen Microphone Scanner Graphic Tablet ( Digitizer ) Digital Camera Touch Screen ( I/O Device / Dual Device - Perform Both Functions input + Output ) INPUT DEVICES ( Definition ) Input devices are used to enter data and instructions into computer memory from external world. Input Device is a hardware part of the computer that is used to enter data and instructions into computer memory. The examples of input devices include: Keyboard, Mouse , Track ball, Track Pad, Joy stick, Touch Screen, Light pen,   Scanner , Digital Camera, Microphone, Graphics tablet e...

What are Different Types of Computer Hardware

What is Hardware? The physical parts of a computer are called hardware. Hardware can be touched or seen by us. For example, hard disk, mouse, keyboard, CD, CD-ROM Drive, Floppy Disk, Speakers, Modem and Printers - all are computer hardware. Explain different types of computer hardware Different types of hardware components on the basis of the functionality  they provide are as follows: 1.    Input devices Input devices are used to enter data and instructions into computer. Examples of input devices are: Keyboard, mouse, scanner, digital camera etc. Microphone Mouse Keyboard 2.    The Central Processing unit Central processing unit is the brain of the computer . It is also called CPU or Processor. Intel is the leading manufacturer of microprocessors. For example, Intel Pentium IV 3.2 MHz is an example of a CPU. You can see the images of processors / Micro processors or CPUs. Images of CPU or Microprocessor or s...