Skip to main content

Verifying the Purchase Request in SET Protocol

  • Conference paper
  • First Online:
Web Technologies and Applications (APWeb 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2642))

Included in the following conference series:

Abstract

The Secure Electronic Transaction (SET) protocol has been jointly developed by Visa and MasterCard toward achieving secure online-transactions. This paper presents formal verification of the Purchase Request phase of SET, by using ENDL (extension of non-monotonic logic). The analysis unveils some potential flaws. To overcome these vulnerabilities, some feasible countermeasures are proposed accordingly during the validation. Also, the modelling of Purchase Request is described to implement the mechanically model checking instead of manual verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.idc.com

  2. Needham R. and Schroeder M., Using Excryption for Authentication in Large Networks of Computers. Comm. of the ACM, 21(12), pages 993–999, Dec 1978.

    Article  MATH  Google Scholar 

  3. Gritizalis S., Security Protocols over Open networks and distributed systems: Formal methods for their Analysis, Design, and Verification, Computer Communications, 22(8), pages 695–707, May 1999.

    Google Scholar 

  4. Dolev D, Yao A., On the Security of Public Key Protocols. IEEE Transaction on Information Theory, 29(2), pages 198–208, 1983

    Article  MATH  MathSciNet  Google Scholar 

  5. Meadows C., The NRL Protocol Analyzer: An overview, Journal of Logic Programming, 26(2), pages 113–131, 1996.

    Article  MATH  Google Scholar 

  6. Burrows M., Abadi M., Needham R., A logic for Authentication. ACM Transactions on Computer Systems, 8(1):18–36, February 1990.

    Article  Google Scholar 

  7. Gong L, Needham R, and Yahalom R., Reasoning about belief in cryptographic protocols. Proceeding of the Symposium on Security and Privacy, pages 234–248, Oakland, CA, May 1990.

    Google Scholar 

  8. Meadows C., The NRL Protocol Analyzer: An overview, Journal of Logic Programming, 26(2), pages 113–131, 1996.

    Article  MATH  Google Scholar 

  9. Brackin S., Automatic formal analyses of two large commercial protocols. Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997.

    Google Scholar 

  10. Meadows C, Syverson P., A formal specification of requirements for payment transactions in the SET protocol. Proceedings of Financial Cryptography 98, volume 1465 of Lecture Notes in Comp. Sci. Springer-Verlag, pages 122–140, 1998.

    Google Scholar 

  11. SET Secure Electronic Transaction Specification, Book 1: Business Description, Version 1.0, May 31, 1997.

    Google Scholar 

  12. SET Secure Electronic Transaction Specification, Book 2: Programmer’s Guide, Version 1.0, May 31, 1997.

    Google Scholar 

  13. SET Secure Electronic Transaction Specification, Book 3: Formal Protocol Definition, 1.0, May 31, 1997.

    Google Scholar 

  14. Chen Q.F, Zhang C.Q, Zhang S.C., A Logical Framework ENDL for Verifying Secure Transaction Protocols. Journal of Knowledge and Information Systems, Springer, accepted, forthcoming.

    Google Scholar 

  15. Chen Q.F, Zhang C.Q, Lu J., The Verification of Merchant Registration in SET Protocol, Proceedings of The International Conference on Internet omputing, Las Vegas, pages 1098–1104, 2002.

    Google Scholar 

  16. Chen Q.F, Zhang C.Q., Using ENDL to Verify Cardholder Registration in SET Protocol, Proceeding of International Conference on e-Business (ICEB2002), Beijing, pages 616–623, 2002.

    Google Scholar 

  17. Denning D., Sacco G., Timestamp in Key Distribution Protocols, Communications of ACM, 24(8), 533–536, August 1981.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, Q., Zhang, C., Zhang, S., Li, C. (2003). Verifying the Purchase Request in SET Protocol. In: Zhou, X., Orlowska, M.E., Zhang, Y. (eds) Web Technologies and Applications. APWeb 2003. Lecture Notes in Computer Science, vol 2642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36901-5_27

Download citation

  • DOI: https://doi.org/10.1007/3-540-36901-5_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-02354-8

  • Online ISBN: 978-3-540-36901-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics