Skip to main content

Explain Different Types of e-Payment Security Schemes in e-Commerce

Explain E-payment Security Schemes


Explain Different Types of e-Payment Security Schemes in e-Commerce

Following are the e-payment security schemes
1) Encryption 2) Certificates & Certificates Authority (CA) 3) Digital Signature
4) Digital Envelop 5) Message Digest 6) Transaction Certificates and Time Stamp

(1) Encryption

Encryption refers to changing a message into unreadable form. Later the encrypted message can be converted into readable form by Decryption.
There are two types of Encryption

(A) Secret Key Encryption/Private Key Encryption

In this scheme, same key called secret key is used by sender and receiver for Encryption (Making message unreadable) & Decryption (Getting original message).



Data Encryption Standards (DES) is the most widely used algorithm for secret key/private key encryption scheme.

(B) Public Key Cryptography




It is Also known as asymmetric Encryption. It uses two different keys (1) Private Key (2) Public Key. The receiver sends his public key to sender. The sender encrypts message with this public key. Then Message is sent to receiver. Now Receiver uses his private key to decrypt message.

2. Certificates & Certificates Authority (CA)

A certificate represents and identifying certificate issued by a trusted third party called Certificate of Authority. A certificate includes records such as series number name of Owner, Name of CA & Digital signature of CA.

Explain Different Types of e-Payment Security Schemes in e-Commerce

(VeriSign is a most popular pioneering CA. Established in 1999).

3. Digital Signature

Digital signature is a phrase (like Ahmed, Saeed Malik). It Is Encrypted by Sender’s private key. Digital signature is attached with the encrypted message and sent to receiver. Digital signature ensures that sender is verified. Receiver will use sender’s public key to decrypt message.

4. Digital Envelope

Is another encryption scheme. It is used to encrypt a secret key with the receiver’s public key. Now encrypted message & key is sent to receiver. Receiver will open the key first and then he will decrypt the message with this key.

5. Message Digest

It helps to verify that a message is not changed in its way from sender to receiver. Message digest is a bit string. It is unique for each message. A special formula is called hash function is used to calculate message digest of a message. The encrypted message with message digest is sent to receiver. Now if message is changed in the way then its message digest will not match.

6. Transaction Certificates and Time Stamp

A transaction certificate attests to some fact about the conduct of a transaction. It can be used to prevent repudiation (denial). Similarly a time stamp ensures that a document was present at a particular time.


Basics of eCommerce

  1. Definition and History of ECommerce
  2. Role of E-Commerce in Daily Life
  3. Classification of e-Commerce Applications
  4. Difference Between Electronic Market and IOS
  5. Types Of e-Commerce


Ecommerce Payment Systems/ ePayment

  1. Types of Popular e-Payment Systems
  2. Explain Credit Card Payment System
  3. Advantages Disadvantages of Credit Cards
  4. Difference Between Debit Card and Credit Card
  5. Types of E-payment Security Schemes
  6. Types of e-Payment Security Protocols

Comments

Andrea said…
Great ! I am grateful to you for sharing all the schemes that are used for security purpose in e payment systems. You have explained a short description of each of the type. After knowing all of them I would like to know which one is the most secured means.
digital signature Adobe Reader

Popular posts from this blog

Introduction to Algorithms and Algorithmic Notation With Examples

Topic: Introduction to Algorithm and Algorithmic Notation With Examples What is an Algorithm? The step by step procedure to solve a particular problem is called an Algorithm .  A Good Programmer always writes algorithms before developing programs. Algorithmic Notation with example algorithms  Advantages of  writing an Algorithm The process of solving a problem becomes simpler and easier with the help of  algorithm. There are less chance of errors in the program, if we design algorithms before writing our programs in any programming language. We can convert an algorithm into a program of any programming language. It is not dependent on any programming language. Therefore it is easy to understand for anyone even without programming knowledge. What is the Relationship between an Algorithm and a Program Sponsored Links An algorithm is the sequenc of steps to perform a task, whereas a program is the set of statements to perfor...

What are Dual Devices or Both Input/ Output Devices

The devices that can be used to perform both functions -input and output- are called Dual Devices. These devices are also called Dual Purpose Devices or Both Input/Output Devices. With the help of a dual purpose device, we can enter data into computer as well as we can output data from the computer to outside world.  For example, Dual devices include:  Touch Screen Monitor, Modem, Network Interface Card, Sound card, Hard disk drive, Floppy disk Drive, Magnetic Tape Drive CD-Writer and DVD-Writer etc. These are also called Input/output devices, because they perform both functions. Touch Screen Monitor Dual Devices or Both Input / Output Devices - Touch screens Touch Screen Monitor is an input/output device. It uses a special touch sensitive screen. The User can enter data by touching icons or menus on the screen. As soon as the user selects a command from menu, output is displayed on screen. Commonly touch screen monitors use sensors to detect touch of finger. ...

Define Data and Information With Examples

DATA Data is the collection of raw facts and figures. Actually data is unprocessed, that is why data is called collection of raw facts and figures. Define Data and Information with Examples We collect data from different resources. After collection, data is entered into computer for processing. Data may be collection of words, numbers, pictures,  or sounds etc. Examples of Data 1) Student Data on Admission Forms When students get admission in a college. They fill admission form. This form  contains raw facts (data of student) like name, father’s name, address of student, obtained marks, photo graph etc. 2)    Data of Citizens During census, data of all citizens is collected. The staff will go house to house and collect data about citizens like number of persons living in a home, either they are literate or illiterate, number of children, data of each child, cast, religion, Computerized national Identity Card number, address, how many rooms and...