Skip to main content

Explain Different Types of e-Payment Security Schemes in e-Commerce

Explain E-payment Security Schemes


Explain Different Types of e-Payment Security Schemes in e-Commerce

Following are the e-payment security schemes
1) Encryption 2) Certificates & Certificates Authority (CA) 3) Digital Signature
4) Digital Envelop 5) Message Digest 6) Transaction Certificates and Time Stamp

(1) Encryption

Encryption refers to changing a message into unreadable form. Later the encrypted message can be converted into readable form by Decryption.
There are two types of Encryption

(A) Secret Key Encryption/Private Key Encryption

In this scheme, same key called secret key is used by sender and receiver for Encryption (Making message unreadable) & Decryption (Getting original message).



Data Encryption Standards (DES) is the most widely used algorithm for secret key/private key encryption scheme.

(B) Public Key Cryptography




It is Also known as asymmetric Encryption. It uses two different keys (1) Private Key (2) Public Key. The receiver sends his public key to sender. The sender encrypts message with this public key. Then Message is sent to receiver. Now Receiver uses his private key to decrypt message.

2. Certificates & Certificates Authority (CA)

A certificate represents and identifying certificate issued by a trusted third party called Certificate of Authority. A certificate includes records such as series number name of Owner, Name of CA & Digital signature of CA.

Explain Different Types of e-Payment Security Schemes in e-Commerce

(VeriSign is a most popular pioneering CA. Established in 1999).

3. Digital Signature

Digital signature is a phrase (like Ahmed, Saeed Malik). It Is Encrypted by Sender’s private key. Digital signature is attached with the encrypted message and sent to receiver. Digital signature ensures that sender is verified. Receiver will use sender’s public key to decrypt message.

4. Digital Envelope

Is another encryption scheme. It is used to encrypt a secret key with the receiver’s public key. Now encrypted message & key is sent to receiver. Receiver will open the key first and then he will decrypt the message with this key.

5. Message Digest

It helps to verify that a message is not changed in its way from sender to receiver. Message digest is a bit string. It is unique for each message. A special formula is called hash function is used to calculate message digest of a message. The encrypted message with message digest is sent to receiver. Now if message is changed in the way then its message digest will not match.

6. Transaction Certificates and Time Stamp

A transaction certificate attests to some fact about the conduct of a transaction. It can be used to prevent repudiation (denial). Similarly a time stamp ensures that a document was present at a particular time.


Basics of eCommerce

  1. Definition and History of ECommerce
  2. Role of E-Commerce in Daily Life
  3. Classification of e-Commerce Applications
  4. Difference Between Electronic Market and IOS
  5. Types Of e-Commerce


Ecommerce Payment Systems/ ePayment

  1. Types of Popular e-Payment Systems
  2. Explain Credit Card Payment System
  3. Advantages Disadvantages of Credit Cards
  4. Difference Between Debit Card and Credit Card
  5. Types of E-payment Security Schemes
  6. Types of e-Payment Security Protocols

Comments

Andrea said…
Great ! I am grateful to you for sharing all the schemes that are used for security purpose in e payment systems. You have explained a short description of each of the type. After knowing all of them I would like to know which one is the most secured means.
digital signature Adobe Reader

Popular posts from this blog

Definition and History of ECommerce

What do you mean by E-Commerce? Electronic Commerce (e-Commerce) is a general concept covering any form of business transaction or information exchange executed using information and communication technologies (ICTs). e-Commerce takes place between companies, between companies and their customers, or between companies and public administrations. Electronic Commerce includes electronic trading of goods, services and electronic material. BRIEF HISTORY OF E-COMMERCE + E-commerce started in early 1970’s with invention of electronic fund transfer(EFT). + Only used by large organizations, financial institutions and a few small business at that time. + After invention of EDI (Electronic Data Interchange) from financial institutions to manufacturers retailers, services and so on. + Many other e-commerce applications started from stock trading to travel reservation system. + With commercialization of internet in early 1990’s. The term electronic commerce was used. Interne...

Who Invented First PC Virus? Pakistanis Invented First PC Virus in 1986

Who Invented The First PC VIRUS-Video Proof by F-Secure two Pakistani bothers, Amjad Farooq Alvi and Basit Farooq Alvi, invented this very first PC Virus Who invented the first PC Virus? First ever PC computer virus was named as Brain. In 1986,   two Pakistani bothers, Amjad Farooq Alvi and Basit Farooq Alvi, invented this very first PC Virus. Amjad farooq Alvi and Basit farooq Alvi  are currently running an ISP under the name of Brain Telecommunication Limited, in Lahore, Pakistan. First PC virus invented by Pakistani brothers amjad and basit Mikko Hypponen travelled to Pakistan to find the writers of the first PC virus. The first virus to infect PC computers was discovered in 1986. Intriguingly, the virus contained the contact details of its authors in Pakistan. 25 years later, in February 2011, Mikko Hypponen, Chief Research Officer at F-Secure, travelled to the city of Lahore in Pakistan to find the authors . The authors were identified as brothers Amjad F...

Important objective type questions 1-50

FTP stand for     file transfer protocol. Lady ADA is the mother of computer.    VINT CERF     is the father of Internet. Nibble consists of   4   bits.   Google     and   Yahoo   are the two search engines. TCP/IP stands for Transmission control protocol/Internet protocol. One sector on Hard Disk holds   512    bytes.   Dos, window and UNIX are three operating systems. Demodulation converts Analog signal into Digital signal. ARPANET stands for advanced research project agency network. URL stands for uniform resource locator . Charles Babbage is the father of computer. Lady ADA is the first computer programmer. Nibble contains 04 numbers of bits. Name Two Mail service mail Yahoo.com. VOIP stands for Voice over internet protocol. One sector holds 512 numbers of bytes. N...