Skip to main content

Explain Different Types of e-Payment Security Schemes in e-Commerce

Explain E-payment Security Schemes


Explain Different Types of e-Payment Security Schemes in e-Commerce

Following are the e-payment security schemes
1) Encryption 2) Certificates & Certificates Authority (CA) 3) Digital Signature
4) Digital Envelop 5) Message Digest 6) Transaction Certificates and Time Stamp

(1) Encryption

Encryption refers to changing a message into unreadable form. Later the encrypted message can be converted into readable form by Decryption.
There are two types of Encryption

(A) Secret Key Encryption/Private Key Encryption

In this scheme, same key called secret key is used by sender and receiver for Encryption (Making message unreadable) & Decryption (Getting original message).



Data Encryption Standards (DES) is the most widely used algorithm for secret key/private key encryption scheme.

(B) Public Key Cryptography




It is Also known as asymmetric Encryption. It uses two different keys (1) Private Key (2) Public Key. The receiver sends his public key to sender. The sender encrypts message with this public key. Then Message is sent to receiver. Now Receiver uses his private key to decrypt message.

2. Certificates & Certificates Authority (CA)

A certificate represents and identifying certificate issued by a trusted third party called Certificate of Authority. A certificate includes records such as series number name of Owner, Name of CA & Digital signature of CA.

Explain Different Types of e-Payment Security Schemes in e-Commerce

(VeriSign is a most popular pioneering CA. Established in 1999).

3. Digital Signature

Digital signature is a phrase (like Ahmed, Saeed Malik). It Is Encrypted by Sender’s private key. Digital signature is attached with the encrypted message and sent to receiver. Digital signature ensures that sender is verified. Receiver will use sender’s public key to decrypt message.

4. Digital Envelope

Is another encryption scheme. It is used to encrypt a secret key with the receiver’s public key. Now encrypted message & key is sent to receiver. Receiver will open the key first and then he will decrypt the message with this key.

5. Message Digest

It helps to verify that a message is not changed in its way from sender to receiver. Message digest is a bit string. It is unique for each message. A special formula is called hash function is used to calculate message digest of a message. The encrypted message with message digest is sent to receiver. Now if message is changed in the way then its message digest will not match.

6. Transaction Certificates and Time Stamp

A transaction certificate attests to some fact about the conduct of a transaction. It can be used to prevent repudiation (denial). Similarly a time stamp ensures that a document was present at a particular time.


Basics of eCommerce

  1. Definition and History of ECommerce
  2. Role of E-Commerce in Daily Life
  3. Classification of e-Commerce Applications
  4. Difference Between Electronic Market and IOS
  5. Types Of e-Commerce


Ecommerce Payment Systems/ ePayment

  1. Types of Popular e-Payment Systems
  2. Explain Credit Card Payment System
  3. Advantages Disadvantages of Credit Cards
  4. Difference Between Debit Card and Credit Card
  5. Types of E-payment Security Schemes
  6. Types of e-Payment Security Protocols

Comments

Andrea said…
Great ! I am grateful to you for sharing all the schemes that are used for security purpose in e payment systems. You have explained a short description of each of the type. After knowing all of them I would like to know which one is the most secured means.
digital signature Adobe Reader

Popular posts from this blog

Types Of Headings In HTML

HTML Hedings Headings in HTML are used to display Titles, Sub-Titles of Sub-Sub-Titles for your web page text. There are six types of headings in HTML. H1 is the largest heading and H6 is the smallest heading. <H1> is opening tag whereas </H1> is the closing tag for the largest heading. The text between <h1> and </h1> will be displayed as the main Title in your web page. Following are the six tags used for six types of headings in HTML. <H1> ... </H1> <H2> ... </H2> <H3> ... </H3> <H4> ... </H4> <H5> ... </H5> <H6> ... </H6> The H1 heading is used for main titles. Actually H1 heading will show the text in largest font size. H2 headings is used for Sub-Titles. H2 displays text in smaller font size than H1, H3 displays text of font size smaller than H1 and H2, and so on. H1 is for largest heading in a text page and H6 is for smallest heading.   Importance Of Headings in SEO H...

Explain Advantages Of Networks

Define Network with examples. Give importance of Computer Network. COMPUTER NETWORK We can define a Computer Network as a set of two or more connected computers to share information and other resources (data, files, printers, hard disk, modem, CD-Rom Drive, CD-Writer, DVD-Rom Drive, DVD-Writer etc.). The computers in a network can share: Data, Information, Files Software Hardware (printers, disk, modems)etc. Advantages of Computer Networks EXAMPLES OF COMPUTER NETWORK Computer network can be used in an office. Different people in the office can share common information and printer. Net Cafes use Computer Network for internet sharing. Net Cafe Owners can save money by sharing one DSL Routers / Modem and a single Internet Connection. Computer Network is used in Computer Laboratories of Schools, Colleges and other educational institutes. Internet, is also an example of a computer network. Internet is a network of millions of computers connected through phone lin...

Explain different types of storage devices

Topic: Explain different types of storage devices in Computer systems Storage Devices Storage devices are used to store data and instructions permanently. Storage devices are also called secondary storage devices / backing storage devices / external storage devices or auxiliary storage devices. Examples of storage devices include Hard Disk, CD and DVD etc. Why Secondary Storage Devices are Used? Secondary storage devices are used because: Primary memory(RAM) is volatile and temporary. When computer is switched off, all data in ram is erased. Storage devices can store large amounts of data and instructions permanently whereas Primary memory has less capacity of storing data. Types Of Storage Devices There are three main types of storage devices:  Magnetic Tape   Magnetic Disk   Optical Disk   Flash Memory storage devices 1. Magnetic Tape Magnetic tape is the oldest storage device. It is made of plastic coated with m...