AM FL Y TE Team-Fly® Security Fundamentals for E-Commerce For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians With the proliferation of open systems in general, and the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce (e-commerce) Against this background, the field of computer security has become very broad and includes many topics of interest The aim of this series is to publish state-of-the-art, high standard technical books on topics related to computer security Further information about the series can be found on the WWW by the following URL: http://www.esecurity.ch/serieseditor.html Also, if youd like to contribute to the series and write a book about a topic related to computer security, feel free to contact either the Commissioning Editor or the Series Editor at Artech House Recent Titles in the Artech House Computer Security Series Rolf Oppliger, Series Editor Information Hiding Techniques for Steganography and Digital Watermarking, Stefan Katzenbeisser and Fabien A P Petitcolas Security Fundamentals for E-Commerce, Vesna Hassler Security Technologies for the World Wide Web, Rolf Oppliger For a complete listing of the Artech House Computing Library, turn to the back of this book Security Fundamentals for E-Commerce Vesna Hassler Pedrick Moore Technical Editor Artech House Boston London www.artechhouse.com Library of Congress Cataloging-in-Publication Data Hassler, Vesna Security fundamentals for E-commerce / Vesna Hassler; Pedrick Moore, technical editor p cm (Artech House computer security series) Includes bibliographical references and index ISBN 1-58053-108-3 (alk paper) Electronic commerceSecurity measures Broadband communication systems I Moore, Pedrick II Title III Series HF5548.32 H375 2000 658.84dc21 00-064278 CIP British Library Cataloguing in Publication Data Hassler, Vesna Security fundamentals for e-commerce (Artech House computer security series) Business enterprisesComputer networksSecurity measures Electronic commerceSecurity measures Broadband communication systems I Title II Moore, Pedrick 005.8 ISBN 1-58053-406-6 Cover design by Wayne McCaul © 2001 ARTECH HOUSE, INC 685 Canton Street Norwood, MA 02062 All rights reserved Printed and bound in the United States of America No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Artech House cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark International Standard Book Number: 1-58053-108-3 Library of Congress Catalog Card Number: 00-064278 10 Contents ix 3.2 3.2.1 3.2.2 Public Key Infrastructure X.509 Certificate Format Internet X.509 Public Key Infrastructure 53 54 59 3.3 Encoding Methods 61 Part Electronic Payment Security 65 Electronic Payment Systems 67 4.1 Electronic Commerce 67 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.2.6 Electronic Payment Systems Off-line Versus Online Debit Versus Credit Macro Versus Micro Payment Instruments Electronic Wallet Smart Cards 68 69 70 70 70 75 75 4.3 Electronic Payment Security 76 Payment Security Services 79 5.1 5.1.1 5.1.2 5.1.3 Payment Security Services Payment Transaction Security Digital Money Security Electronic Check Security 79 81 83 83 5.2 Availability and Reliability 84 Payment Transaction Security 85 6.1 6.1.1 User Anonymity and Location Untraceability Chain of Mixes 85 86 To my families, Ristic′ and Hassler Contents Preface xix What is covered in this book xix Is security an obstacle to e-commerce development? xx Why I wrote this book xxi Some disclaimers xxi How to read this book xxi Acknowledgements xxii Part Information Security 1 Introduction to Security 1.1 Security Threats 1.2 Risk Management 1.3 Security Services 1.4 Security Mechanisms vii viii Security Fundamentals for E-Commerce Security Mechanisms 11 2.1 2.1.1 2.1.2 Data Integrity Mechanisms Cryptographic Hash Functions Message Authentication Code 11 12 14 2.2 2.2.1 2.2.2 Encryption Mechanisms Symmetric Mechanisms Public Key Mechanisms 15 15 24 2.3 2.3.1 2.3.2 2.3.3 2.3.4 Digital Signature Mechanisms RSA Digital Signature Digital Signature Algorithm Elliptic Curve Analog of DSA Public Key Management 36 37 38 40 41 2.4 2.4.1 2.4.2 Access Control Mechanisms Identity-Based Access Control Rule-Based Access Control 41 42 43 2.5 2.5.1 2.5.2 Authentication Exchange Mechanisms Zero-Knowledge Protocols Guillou-Quisquater 43 44 44 2.6 Traffic Padding Mechanisms 45 2.7 Message Freshness 46 2.8 Random Numbers 47 Key Management and Certificates 51 3.1 3.1.1 3.1.2 Key Exchange Protocols Diffie-Hellman Elliptic Curve Analog of Diffie-Hellman 51 52 53 Index prevention of, 237 Web server, 273 DER See Distinguished encoding rules DES See Data encryption standard Description of the order information, 9293, 99 Design vulnerability, 156 Detection-specific audit record, 249 Dictionary attack, 148, 275 Differential fault analysis, 373 Differential power analysis, 372 Diffie-Hellman protocol, 25, 36, 5253, 167, 200, 201, 203, 231, 236, 292 Diffusion, data encryption standard, 17, 19 Digest authentication, 258, 264, 26567, 269 Digital coins, 7374, 8081, 83 double spending, 81, 83, 102, 1039, 115 forging, 81, 83, 11011 identity-based, 103 stealing, 81, 83, 11116 Digital envelope, 62 Digital signature, 74, 76, 82, 231 description of, 6, 1112, 3637 elliptic curve analog, 4041 Internet Open Trading Protocol, 12731 mobile agent, 344 nonrepudiation, 9698 public key management, 41 RSA system, 3738 trust models, 299300 Digital signature algorithm, 36, 3840, 106, 166, 314 Digital signature standard, 38 Digital watermarking, 28082 Directive, 265 Directory service, 5859 DisablePrivilege, 311 Discrete logarithm problem, 3133, 38, 40, 5253 Discretionary access control, 4243 Distinguished encoding rules, 62 Distributed attack, 214 Distributive property, 26 395 DMZ See Demilitarized zone DNS See Domain name service Document type definition, 258 DOI See Domain of interpretation Domain name service, 185, 190, 210 Domain of interpretation, 23536 Double spending, protection against blind signature, 104 conditional anonymity, 1034 exchanging coins, 1045 guardian, 1059 serial numbers, 115 DSA See Digital signature algorithm DTD See Document type definition Dual-homed gateway, 158 Dual signature, 9395 Dynamically created code, 344 Dynamic binding, 303 Dynamic checking, 307 Dynamic document, 274 Dynamic key refreshing, 363 Dynamic redundancy, 84 Dynamic signature, 382 Dynamic testing, 252 Dynamic type checking, 3056 EAP See Extensible authentication protocol Eavesdropping, 3, 53, 77, 83, 150, 174, 178, 288, 293, 358, 372 eCash, 1023 ECB See Electronic codebook ECDSA See Elliptic curve digital signature algorithm ECML See Electronic commerce modeling language E-commerce See Electronic commerce ECP See Encryption control protocol EDGE See Enhanced data rates for GSM evolution EDI See Electronic data interchange EEPROM See Electrically erasable programmable memory Electrically erasable programmable memory, 370, 373, 376 Electronic banking, 68 Electronic check, 70, 7475, 81, 83 payment authorization transfer, 11923 396 Security Fundamentals for E-Commerce Electronic codebook, 2122 Electronic coin See Digital coins Electronic commerce description of, 67, 32122, 38587 Java, 32528 Joint Electronic Payments Initiative, 32425 micropayment markup, 324 mobile agents, 333 XML-based concepts, 32223 Electronic commerce database, 27880 Electronic commerce modeling language, 323 Electronic data interchange, 67, 322 Electronic Frontier Foundation, 22 Electronic government, 68 Electronic money See Digital coins Electronic payment systems availability and reliability, 84 debit versus credit, 70 electronic wallet, 75 macro versus micro, 70 off-line versus online, 6970 overview of, 6869 payment instruments, 7075 security, 7678 smart cards, 7576 Electronic signature, 74 Electronic wallet, 7576 ElGamals signature, 38 Elliptic curve, 3133 over finite fields, 3336 security, 36 Elliptic curve analog of Diffie-Hellman, 53 Elliptic curve digital signature algorithm, 36, 4041 Elliptic curve discrete logarithm problem, 3133, 38, 40, 52, 53 E-mail, 28990, 29697 EME-OAEP See Encoding method for encryption optimal asymmetric encryption EMV specification, 370 EnablePrivilege, 311 Encapsulating security payload, 19699, 2069 Encapsulation, 137, 140, 151, 171, 172, 175, 179, 180, 225, 226, 246, 332 Encoding method for encryption optimal asymmetric encryption, 61 Encoding methods, 6162 Encrypted functions, computing with, 344 Encryption, 6, 11 symmetric mechanisms, 1524 vulnerabilities in, 155 Encryption control protocol, 179 End entities, 60 End-to-end security, 143, 146, 151, 157, 163, 164, 170 Enhanced data rates for GSM evolution, 355 Entity authentication, 164, 16566 Environmental key generation, 34344 ESP See Encapsulating security payload Ethernet, 140, 162 ETSI See European Telecommunications Standards Institute Eulers Totient Function, 2728 European Commission, 54 European Telecommunications Standards Institute, 35455, 365 European Union, 386 Event detection, Exception handling, 305 Exchanging coins, 1045 Executable content, 149, 287, 289, 302 See also Mobile code Execution history, mobile agent, 340 Expansion permutation, 19 Expensive-to-produce digital coin, 11011 Extended set of actions, 190 Extensible authentication protocol, 17678 Extensible authentication protocol TLS, 177 Extensible markup language, 126, 258, 32223 Face recognition, 381 Facial thermogram, 381 Factoring problem, 25, 3031 Failure-recovery procedures, 156 False match rate, 37879, 380, 381 Index False negative, 214 False nonmatch rate, 37879, 381 False positive, 214 Fault domain, 301 Fault injection, 252 FCS See Frame check sequence FDM See Frequency division multiplexing Feedback, 22 Feistel network, 20, 23, 24 Fermats Little Theorem, 2728 File transfer protocol, 157, 188, 190, 235 problems with, 190191 Filtering, 21516, 24445 See also Packet filtering Final permutation, 19 Financial services markup language, 323 Fingerprinting, 281 Fingerprints, 381 FIPA See Foundation for Intelligent Physical Agents FIPS 188 security label, 168 Firewalls, 15759, 170, 186, 195, 273, 289 packet filtering, 18694 Firewall Toolkit, 244 Firewall traversal, 223 FIRST See Forum of Incident Response and Security Teams First Virtual payment transaction, 8890 Flooding attack, 152, 19294 FLT See Fermats Little Theorem FMR See False match rate FNR See False nonmatch rate Forged message, 77 Forum of Incident Response and Security Teams, 148 Forward certificate, 54 Forward integrity, 342 Foundation for Intelligent Physical Agents, 348 Fragment, 227 Fragmentation, 190 Frame check sequence, 173 Frame relay, 142 Frames, 139, 142, 172, 173, 31011 Fraud credit card, 7273 electronic payment systems, 7677 397 traditional payment systems, 76 Frequency division multiplexing, 14243 Freshness of payment transaction messages, 80, 8283, 98100 FSML See Financial services markup language FTP See File transfer protocol Galois Field, 3336 Garbage collection, 303, 305 Gateways, 158, 170, 244, 25960, 302 security association, 19799 SYNDefender, 19394 Gateway security model, 32628 Gbit Ethernet, 142 General packet radio service, 355, 365 German Information and Communication Services Act, 54 Get method, 26061, 274 GF See Galois Field Global system for mobile communications data and connection confidentiality, 36061 introduction to, 35456 security, 35658 smart cards, 370 standard 02.57, 365 subscriber identity authentication, 359360 subscriber identity confidentiality, 359 subscriber identity module, 36465, 377 GPRS See General packet radio service Grantee, 122 Grantor, 122 Group-specific coin, 113 GSM See Gateway security model; Global system for mobile communications Guardian, 1059, 345 Guillou-Quisquater protocol, 4445 Hand geometry, 381 Handshake protocols, 16566, 169, 192 challenge, 17476 transport layer security, 22732 wireless, 363 Hardware implementation, 155 398 Security Fundamentals for E-Commerce ICMP See Internet control message protocol ICV See Integrity check value ID See Intrusion detection IDEA See International data encryption algorithm Identifier field, 175 Identity-based access control, 4243 Identity protection exchange, 238 IDS See Intrusion detection systems IEC, 58, 165, 370 IEEE 802.2 standard, 139, 142 IEEE 802.3 standard, 139, 162 IEEE 802.5 standard, 139 IEEE P1363 standard, 36 IETF See Internet Engineering Task Force IKE See Internet key exchange iKP mechanism, 90, 9193 IMEI See International mobile equipment identity Implementation vulnerability, 156 IMSI See International mobile subscriber number Inbound connection, 188 Inference, 27980 Infiltration, 4, 150, 15253 TE AM FL Y Hash function chain, 114 Hash functions, 1214, 37, 99, 110, 113, 174, 265, 34243 one-time password, 17778 Hash payload, 240 Hashsum, 12 HDLC See High-level data link control Headers, 140, 26263, 26566, 270, 28788 Head method, 26061 Helper application, 302 High-level data link control, 17273, 180 High-speed circuit-switched data, 35455 HLR See Home location register HMAC, 205, 209, 225 Home location register, 358, 35960 Host anonymity, 8586 Host authentication, 210 Host-based intrusion detection, 211 audit records, 249 intruder types, 24950 statistical, 25051 Host-based keys, 145, 150 Host-host layer See Transport layer Hostile applets, 310 Host-oriented keying, 235 HSCSD See High-speed circuitswitched data HTML See Hypertext markup language HTTP See Hypertext transfer protocol HTTPS See Hypertext transfer protocol with SSL Human factors, 155 Hypertext markup language, 258, 274 Hypertext transfer protocol, 255 cache security, 26364 client authentication, 26467 cookies, 28788 description of, 25860 headers, 26263 messages, 26062 SSL tunneling, 26768 transaction security, 26871 Hypertext transfer protocol with SSL, 153, 268 Informational exchange, 238 Information and Communication Services Act, 54 Information flow control, 43 Inheritance, 3034 Initialization vector, 22, 236 Initial permutation, 19 Instrumentation techniques, 252 Integrated services digital network, 141, 173 Integrity See Data integrity Integrity check value, 205, 208 Intelligent agent, 333 Interbank clearing network, 7172, 74 International data encryption algorithm, 2223 International mobile equipment identity, 358 International mobile subscriber number, 35859 Team-Fly® Index International Organization for Standardization, 5, 6, 7, 54, 58, 61, 165, 370 International Telecommunications Union, 54, 58 Internet control message protocol, 154 Internet Engineering Task Force, 125, 212, 258, 323 Internet Explorer, 312 Internet key exchange, 19697, 199204 Internet layer, 13940, 14345, 185 Internet model, 13841, 151 data link layer, 16162 network access layer, 16162 See also Network access layer Internet open trading protocol, 12527, 322 description of, 12527 with digital signatures, 12831 security issues, 12728 Internet protocol, 138, 13940, 190 Internet Protocol addresses, 140 filtering based on, 18691 Internet protocol control protocol, 173 Internet protocol packets (messages), 140 Internet protocol security authentication header, 143, 151, 19699, 2026, 209 Internet protocol security encapsulating security payload, 19699, 2069 Internet protocol security extensions, 150, 158, 162, 185 authentication header, 2046 combining AH and ESP, 209 description of, 19697 encapsulating security payload, 143, 152, 2069 Internet key exchange, 197204 Internet protocol spoofing, 192 Internet security association and key management protocol, 197, 199, 202, 222, 23541 anticlogging tokens, 152 description of, 235 domain of interpretation, 23536 exchange types, 23738 negotiations, 23641 399 payload types, 24041 protocol messages, 237 Internet service digital network connection, 171 Internet worm, 14749, 274, 331 Interoperability, 146, 153, 236, 322 Interpretation attack, 281 Intranet, 141, 157 Intruder, 152 Intrusion detection, 9, 156, 158 anomaly methods, 213 correlation methods, 213 network-based, 21016 penetration identification methods, 213 rule-based, 21314 statistical, 21314 threshold methods, 213 transition-based method, 213 See also Host-based intrusion detection Intrusion detection system, 21113 Intrusion prevention, 214 Intrusion response system, 211 Intrusion techniques, 152 IOTP See Internet open trading protocol IP See Internet protocol IPCP See Internet protocol control protocol IPsec See Internet protocol security extensions Iris scanning, 38182 ISAKMP See Internet security association and key management protocol ISDN See Integrated services digital network ISO See International Organization for Standardization Issuers signature, 1089 Iterated hash function, 15 ITSEC, 247 ITU See International Telecommunications Union IV See Initialization vector JAAS See Java authentication and authorization service Janus function, 296 Janus personalized Web anonymizer, 295 400 Security Fundamentals for E-Commerce Java, 274, 275, 299, 300 applets, 244, 276, 299, 303, 30810 introduction to, 3024 protection domains, 31214 safety, 3045 security manager and access controller, 301 stack inspection, 31012 threads and timing attacks, 307 type safety, 3057 writing secure applications, 31415 Java authentication and authorization service, 314 JavaBeans, 325 Java Card, 365, 373, 37677 Java Card Virtual Machine, 376 Java Commerce, 32528 Java cryptography architecture, 31415 Java cryptography extension, 314 Java runtime environment, 308 JavaScript, 287, 289, 299, 31617 Java secure socket extension, 31415 Java Virtual Machine, 303, 309, 313, 366 Java Wallet, 325 JC See Java Commerce JCA See Java cryptography architecture JCVM See Java Card Virtual Machine JDK 1.1.x, 309, 313 JDK 1.2.x, 310, 31214 JDK permission architecture, 276 JEPI See Joint Electronic Payments Initiative JIT compiler See Just-in-time compiler Joint Electronic Payments Initiative, 32425 Jondo process, 29294 JRE See Java runtime environment JSSE See Java secure socket extension Just-in-time compiler, 303 JVM See Java Virtual Machine Kerberos, 12021, 122 Key agility, 167 Key agreement, 51, 23032 Key distribution centers, 5354 Key exchange payload, 240 Key exchange protocols asynchronous transfer mode, 164, 16667 description of, 5152 Diffie-Hellman, 5253 elliptic curve analog, 53 Key length, 2021 Key management, 9, 16, 14445, 150, 292 Keyspace, 15 Keystroke dynamics, 382 Key transport protocols, 51 L2TP See Layer two tunneling protocol LA See Location area Label-based access control, 168 LAI See Location area identifier LAN See Local area network Layering protocols, 135, 141 Layer two forwarding protocol, 179 Layer two tunneling protocol, 162, 17981 LCP See Link control protocol LDAP See Lightweight directory access protocol Least privilege principal, 300, 313 Lehmanns primality test, 30 Length field, 175 Lightweight directory access protocol, 59, 23335 Link control protocol, 17174 Link dead, 171 Link encryption, 161 Link establishment, 171 Link-level encryption, 14344 Link termination, 172 LLC sublayer See Logical link control sublayer Local access network emulation, 164 Local area network, 139, 16162 Location area, 357 Location area identifier, 357 Location untraceability, 80, 81, 8588 Location update, 357 Log files See Audit trails Logical link control sublayer, 161 Logic bomb, 147 LPWA See Lucent personalized Web assistant Lucent personalized Web assistant, 29597 Index MAC See Medium access control; Message authentication code Macropayment system, 70 Macro virus, 149 Magic number, 174 Main mode negotiation, 199202, 238 Malicious applet, 310 Malicious client, 194 Malicious programs, 144, 145, 14647 executable content, 149 Internet worm, 14749 macro virus, 149 Malicious user, 24950 Management plane, 164 Mandatory access control, 43, 246 See also Rule-based access control Mapping, 140, 210 MARS cipher, 23 MASIF See Mobile Agent System Interoperability Facilities Masquerading, 3, 150, 152, 250 Master, 214 Master key, 169, 376 M-commerce See Mobile commerce MD See Message digest Medium access control, 115, 151, 168 Medium access control sublayer, 139, 16162 Meet-in-the-middle attack, 21 Memory model, 3001 Merchants, dishonest, 91 Message authentication code, 1415 application layer, 248 database integrity, 278 hypertext transfer protocol, 270 transport layer security, 227, 22830 Message confidentiality, 26869 Message digest protocols, 1213, 209, 225, 229, 265, 267 Message freshness, 4647, 26869 Message integrity, 26869 Message origin authentication, 26869 Messages, Internet open trading protocol, 12627 Message tampering, MExE See Mobile station application execution environment 401 Microbrowser, 361 MicroMint, 110, 113 Micropayment, 70, 324 Microsoft CHAP, 174 Microsoft Word, 299 Millicent system, 11416 Misfeasor, 250 Mixmaster, 290 Mobile agent protection interval, 344 Mobile agents agent protection, 33948 benefits of, 33233 cooperating, 34546 description of, 33134 platform protection, 33639 replicated agents, 34648 security issues, 33436 standardization, 34849 weak and strong mobility, 334, 337 Mobile Agent System Interoperability Facilities, 34849 Mobile code, 255, 276, 333 development of, 33334 security, 299302 Mobile commerce global system for mobile communications, 35661 introduction to, 35354 mobile station application execution environment, 36566 outlook for, 36667 SIM toolkit, 36465 technology overview, 35456 wireless application protocol, 36164 Mobile cryptography, 344 Mobile station, 35758, 360 Mobile station application execution environment, 36566 Mobile switching center, 357, 358, 360 Mobile telephony, 136 Modular arithmetic, 2630 Modular inverse, 2627 Moores law, 30 Morris worm, 14749 MS See Mobile station MSC See Mobile switching center Multicast connections, 163, 169 402 Security Fundamentals for E-Commerce Multihomed gateway, 158 Multihop migration, 334, 338 Multilevel security policy, 246 Multiplexing, 14243 Mutable agent information, 337, 33839 Mutual authentication, 176 Name field, 175 Namespace, 308 NAPT See Network address port translation NAS See Network access server NAT See Network address translation National Institute of Standards and Technology, 17, 168, 252 N-Code, 215 NCP See Network control protocol Negotiation of security attributes, 153 asynchronous transfer mode, 165166 hypertext transfer protocol, 271 Internet key exchange, 199204 ISAKMP, 23641 layer two tunneling protocol, 181 transport layer security, 232 NetCash, 1023, 11113 NetCheque, 11922 Netscape browser, 302, 312, 315 Network access layer, 16162, 164 Network access server, 245 Network address port translation, 195 Network address translation, 195 Network-anonymizing technique, 290 Network-based intrusion detection, 21016 Network control protocol, 17173 Network file system, 248 Networking technologies, 14143 Network latency, 332, 333 Network layer, 13738 Network layer protocol, 171, 172 Network network interface, 170 Network traffic, 332 New group mode negotiation, 199200 NFS See Network file system NIST See National Institute of Standards and Technology NNI See Network network interface Node, 141 Nonce, 9899, 241 Nonrepudiation of origin, 82, 95 Internet open trading protocol, 12728 mobile agent, 338, 34043 Web transactions, 26869 Nonrepudiation of payment authorization, 9798 Nonrepudiation of payment transaction messages, 80, 82, 9598 Nonrepudiation of submission and delivery, 95 Nonshared cache, 259 Notarization, Notification payload, 241 Number theory, 2630 Oak programming language, 3023 OAM See Operation, administration, and maintenance Object linking and embedding control, 315 Object migration, 334 OCSP See Online certificate status protocol OCX See Object linking and embedding control OFB See Output feedback Offer response trading block, 12930 Off-line payment system, 6970, 83, 105, 114 1KP payment protocol, 98100 One-time pad, 1617 One-time password, 17778 One-way hash function, 12, 174, 177, 231 Onion routing, 289, 29091, 297 Online certificate status protocol, 6061 Online payment system, 6970, 105 OpenBSD, 248 Open systems interconnection, 13638, 141 security at layers, 14346 security services placement, 78 X.500 standard, 59 Operating system security, 24648, 273 Operation, administration, and maintenance, 168, 169 OPSEC/CCI, 212 Index Optimal normal basis representation, 33 Optimized handshake, 363 Options method, 26061 Order information, 91 Organization for the Advancement of Structured Information Standards, 322 Origin address, 152 Origin server, 259 OSI See Open systems interconnection OTP See One-time password Outbound connection, 188 Output feedback, 2122 Ownership assertion, 281 P1363 standard, 36 Packet-based protocol, 164 Packet filtering IP addresses, 18688 IP addresses and port numbers, 18891 network address translation, 195 TCP problems, 19194 Packet filtering rules, 186, 18889, 191 Packets security threats, 15053 source routing, 156 switching, 14142 Padding, 17, 207 Paging, 35758 PAP See Password authentication protocol Partial result authentication code, 342 Partial result chaining, 340, 34143 Partial security, 279 Passive gateway, 194 Password authentication protocol, 17374 Password-based authentication, 245 Password file, UNIX, 14849 Passwords, stealing, 145, 275 Password sniffing, 177 PASV command, 191 Path histories, 33738 Path key, 294 Payer anonymity, 80, 8182, 102, 103 pseudonyms, 8890 Payment authorization transfer, 81, 83 cascaded proxy, 12223 description of, 119 403 Kerberos, 12021 proxies, 12023 restricted proxy, 12122 Payment instruction, 91 Payment instruments, 7075 Payment security services, 7981 Payment-system independence, 126 Payment system participants, dishonest, 77 Payment transaction security, 8083 Payment transaction untraceability, 80, 82, 9091, 95, 1013 PayWord, 114 P-box permutation, 19 PDU See Protocol data unit Peer entity authentication, 5, 225 Penetration identification intrusion detection, 213 PEP See Protocol extension protocol Perfect encryption, 16 Perfect forward entry, 199 Per-fee link, 324 Perl, 274, 275 Permission scoping, 312 Permutation, 19 Persistent connections, 25859 Personal identification number, 37476 Personal unblocking key, 374 Pervasive security mechanisms, 6, 89 PGP See Pretty good privacy Physical layer, 137, 138, 164 PIN See Personal identification number PKCS See Public key cryptography standard PKIX See Public key infrastructure X.509 Plaintext, 15 Plug-ins, 302, 315 Point-of-sale terminal, 75 Point-to-multipoint connections See Multicast Point-to-point protocol, 136, 138, 139, 162 challenge-handshake authentication protocol, 17476 description of, 17073 encryption control protocol, 179 extensible authentication protocol, 17678 404 Security Fundamentals for E-Commerce Point-to-point protocol (continued) password authentication protocol, 17374 Point-to-point tunneling protocol, 17980 Polynomial representation, 3336 Portability, 303 Port number filtering, 18891 Ports, communication, 140 POS terminal See Point-of-sale terminal Post method, 261, 263, 274 PostScript, 299 Power supply attack, 374 PPP See Point-to-point protocol PPTP See Point-to-point tunneling protocol PRAC See Partial result authentication code Presentation attack, 281 Presentation header, 137 Presentation layer, 137 Pretty good privacy, 62, 269 Primality test, 2930 Principal, 3, 82, 91 Priority level, 27879 Privacy, World Wide Web, 285, 28788 Private key, 2425, 279, 344, 375 Probable innocence, 293 Procedural programming language, 316 Process migration, 33334 Proof-carrying code, 301 Proposal payload, 240 Protection domain, 31214 Protocol data unit, 13637, 143, 15053 Protocol extension protocol, 324 Protocols, network, 82 Protocol selection, layers security, 14546 Protocol suite, 138 Proxies anonymizing services, 289, 29192, 295 application gateways, 158, 244 cascaded, 12223 hypertext transfer protocol, 259 NetCheque, 12021 restricted, 12122 security issues, 26364, 269 transparent and nontransparent, 259 Proxy application, 157 Proxy server, 23334 Pseudonym, 8890, 295, 296 Pseudorandom function, 9193, 99 Pseudorandom sequence generators, 47 Public administration See Electronic government Public key algorithm, multicast, 169 Public key certificates, 41, 9798, 100, 153 directory service, 5859 management, 41, 5354 transport layer security, 228 X.509 format, 5461 Public key infrastructure X.509, 5961 Public keys, 15, 61, 62, 74, 93, 95, 232 description of, 2425 elliptic curves, 3133, 36 Galois fields, 3336 RSA, 2531 Public key pair, 96 Public switched telephone network, 136 Publishing copyright protection, 28082 World Wide Web, 27374, 277 PUK See Personal unblocking key Put method, 261 Python, 274 QoS See Quality of Service Quality of Service, 143, 161, 168 Quantity-constrained resource, 301 Quick mode negotiation, 199200, 2024, 238 Rabin-Miller primality test, 30 Radicchio, 356 RADIUS, 245 Random access memory, 370 Randomized hashsum, 9091 Randomized signature, 1089 Random number, 47 RC See Rivest Cipher Read-only memory, 370, 373 Read-ups, 246 Real-time applications, 332 Real-time database, 27879 Reason phrase, 261 Index Record, 226 Record protocol, 22627 Recovery, intrusion detection, 211 Redirector, 291 Redundancy, static and dynamic, 84 Reference monitor, 7, 246 Registration authorities, 5960 Relay mechanism, 193 Reliability, system, 84 Remailer, 28990 Remote procedure call, 143 Replay attack, 4, 4647, 150, 174, 177, 200, 204, 206, 265 Replicated mobile agent, 34648 Reply block, 290 Repositories, 60 Request line, 26061, 269 Residue, 26 Resource record, 210 Restricted proxy, 119, 120, 12122 Restrictive blind signature, 109 Retinal pattern, 381 Reverse address resolution protocol, 140 Reverse certificate, 54 Reverse finger check, 223 RevertPrivilege, 311 Rewebber, 277 Rijndael cipher, 24 RIP See Routing information protocol Risk analysis as process, 45 and security policy, 7980 Risk level, Risk management, 45 Rivest Cipher, 23 Robustness attack, 281 Robust watermark, 280 Roles, gateway security model, 32627 Routing, anonymous, 29094 Routing control, Routing information protocol, 154 RPC See Remote procedure call RR See Resource record RSA public key, 2531, 166 RSA signature, 102 RST flag, 151 Rule-based access control, 43 405 Rule-based intrusion detection, 21314 attack signatures, 21516 SA See Security agent Safety check, 300301 SAMP See Security attribute modulation protocol Sandbox model, 309, 377 SASL See Simple authentication and security layer SATMP See Security attribute token mapping protocol S-box, 1819 SC See Smart cards Scheme name, 25758 Screening router, 15758 Scrip, 11516 SDML See Signed document markup language SDU See Service data unit Secret key, 1516, 169, 179, 281 See also Symmetric encryption mechanisms Secret splitting (sharing), 104, 346 Secure channel, 151, 269 Secure electronic payment protocol, 92 Secure electronic transaction, 76, 9395 Secure hash standard one, 14, 209, 343 Secure hypertext transfer protocol, 6, 143, 27071 Secure/multipurpose Internet mail extension, 62, 143, 26970 Secure session, 151 Secure sockets layer, 6, 23, 51, 72, 128, 153, 225, 269, 274, 277, 285, 287 Secure sockets layer tunneling, 26768 Secure sockets layer version 3.0, 225 Secure transaction technology, 92 Security agent, 165 Security association payload, 238 Security associations, 165, 19799, 235 attributes, 235236 ISAKMP, 238, 240 transport mode, 197 tunnel mode, 19798 Security attribute modulation protocol, 247 406 Security Fundamentals for E-Commerce Security attribute token mapping protocol, 247 Security audit, Security audit trail, 89 Security domain, 366 Security Dynamics card, 178 Security-enhanced application, 251 Security kernel, 246 Security label, 8, 43 Security level, 279 Security manager, 309 Security mechanisms, Security message exchange, 169 Security parameter index, 197, 203, 236 Security policy, Security recovery, Security services, 56 Security testing, 25152 Security zone, 316 Segment, transport control protocol, 140 Selective field confidentiality service, Selector, security association, 19899 Semantic transparency, 263 Sendmail, 148 Sensitivity class, 43 Sensitivity, security level, 246 SEPP See Secure electronic payment protocol Sequence number prediction, 194 Serial line Internet protocol, 136, 139, 173 Serpent cipher, 24 Server-side certificate, 285 Service data unit, 168 Service ticket, 12021 Servlet, 276 Session, 137, 287 Session key, 267 Session layer, 137, 151 SET See Secure Electronic Transactions SGML See Standard generalized markup language SHA-1 See Secure hash standard one Shadow password file, 149 Shared cache, 259 Shell escapes, 27475 Short message service, 35556 S-HTTP See Secure hypertext transfer protocol Signature block, 12627, 129, 130 Signature method, biometrics, 382 Signature payload, 241 Signed document markup language, 323 Signed script policy, 317 Simple authentication and security layer, 22122, 23235 Simple mail transfer protocol, 18890 SIM toolkit See Subscriber identity module toolkit Single-hop mobile agent, 334, 348 SKEME, 199 SLIP See Serial line Internet protocol Smart cards, 71 application security, 37476 biometrics, 37782 hardware security, 37173 introduction to, 36971 Java Card, 37677 operating system security, 37374 protocol runs, 44 subscriber identity module card, 377 uses, 7576 vulnerabilities, 155 S/MIME See Secure/multipurpose Internet mail extension SMS See Short message service SMTP See Simple mail transfer protocol Social engineering, 155 SOCKS version 4, 223 SOCKS version 5, 221, 22325 Software fault isolation, 3001 Software implementation, 155 Source routing, 156 Spam filtering, 297 Specific security mechanisms, 67 Speech recognition, 382 SPI See Security parameter index SPIN operating system, 300 Spoofing attack, 192, 210, 28687, 317 SQL See Structured query language SSH Communications Security, 222 SSL See Secure sockets layer Stack inspection, 31012 Standard 47, 173 Index Standard generalized markup language, 258, 323 Start line See Request line State appraisal, 338 State-based access control, 374 Stateful inspection, 245 Stateless protocol, 258 Static document, 274 Static redundancy, 84 Static signature, 382 Static testing, 252 Static type checking, 3056 Stationary agent, 333 Statistical intrusion detection, 21314, 25051 Status code, 261 Status line, 261 Stealing coins, 11116 Steganography, 28081 Stream cipher, 2223, 231 Strong forward integrity, 342 Strong mobility, 334, 337 Structured query language, 280, 332 STT See Secure transaction technology Subliminal channel, 39 Subscriber identity authentication, 35960 Subscriber identity confidentiality, 359 Subscriber identity module card, 360, 377 Subscriber identity module toolkit, 356, 36465 Substitution, 1819 Superuser permission, 246 Switching technologies, 14142 Symmetric encryption mechanisms advanced encryption standard, 2324 crowds routing, 291 data encryption standard, 1722 description of, 1516 IDEA, 2223 one-time pad, 1617 Rivest Cipher, 23 Symmetric key, 37576 Synchronization, data transfer, 19192 SYNDefender, 19394, 223 SYN flooding attack, 19294 System, defined, System resource access control, 3001 407 System resource consumption control, 301 TACACS, 245 TADMIN See Trusted administration Taint mode, 275 Tampering, control information, 15051 Tamper-proof (tamper-resistant) device, 105, 109, 345 TANs See Transaction number TAPPS See Trusted application TCP/IP See Transport control protocol/Internet protocol TDM See Time division multiplexing TDMA See Time division multiple access Telescript, 299 TELNET, 138, 143, 157, 188, 235 Temporary mobile subscriber identity, 359, 360 Text line coding, 281 TGS See Ticket granting service Threads, 307, 310 Threats, security, 3, 15053 3KP payment protocol, 9698 Three-way handshake, 16566, 169, 17476, 192 Threshold intrusion detection, 21314, 250 Threshold scheme, 34648 TIA/EIA-136, 35455 Ticket granting service, 12022 Time-constrained resource, 301 Time division multiple access, 354 Time division multiple access ANSI136, 354 Time division multiplexing, 14243 Time-limited obfuscation, 34445 Time service, Time stamp, 7, 9899, 249 Timing attack, 279, 294, 307, 37273 Timing channel, 279 TLS See Transport layer security TMSI See Temporary mobile subscriber identity TNFS See Trusted network file system TPO block See Trading protocol options block Trace method, 261 408 Security Fundamentals for E-Commerce Tunnel mode security association, 19798, 2056, 2089, 221 T wallet, 105 TWINKLE, 3031 Twofish cipher, 24 Two-way handshake, 165, 169, 17374 Type checking, 3057 Type soundness, 3067 UDP See User datagram protocol UIM card See User identity module card UMTS See Universal mobile telecommunications system UNI See User network interface Unicode, 61 United Nations, 322 Universal mobile telecommunications system, 355 Universal payment preamble, 324 Universal resource identifier, 25758, 270, 287, 288 Universal resource locator, 286, 308, 316 Universal resource locator rewriting, 295 Universal subscriber identity module, 377 Universal Wireless Communications Consortium, 35455 UNIX, 147, 14849, 22223 Unstructured supplementary services data, 356, 365 UPP See Universal payment preamble URI See Universal resource identifier URL See Universal resource locator URN See Universal resource name Usage control, 281 User anonymity, 8081, 8588 User datagram protocol, 140, 181, 189, 22123, 235 User identity module card, 377 User key, 281 User network interface, 169 User-oriented keying, 235 User plane, 164 User profile, 288 USIM See Universal subscriber identity module USSD See Unstructured supplementary services data UTMS, 355, 377 TE AM FL Y Tracker attack, 280 Trading block, 12627, 129 Trading exchange, 126 Trading protocols options block, 128, 130 Trading roles, 12526 Traffic analysis, 4, 7, 15052, 206, 207 Traffic flow confidentiality, Traffic padding, 7, 4546 Trailer, 140 Transaction identifier, 127 Transaction number, 46 Transaction reference block, 12628 Transactions, Internet open trading protocol, 126 Transfer encoding, 62 Transform payload, 240 Transition-based intrusion detection, 213 Transport control protocol, 140, 191 sequence number prediction, 194 SYN flooding attack, 19294 Transport control protocol header, 189 Transport control protocol/Internet protocol, 138, 154, 185 Transport control wrapper, 22123 Transport layer, 137, 140, 145 Transport layer security, 128, 151, 153, 277 description of, 22122, 22526 handshake protocol, 22732 record protocol, 22627 Transport mode security association, 197, 205, 208, 209 Trapdoor, 147 Tripwire software, 248 Trojan horse, 144, 147, 302, 375 Trusted administration, 248 Trusted application, 248 Trusted functionality, Trusted network file system, 248 Trusted processing environment, 345 Trusted Solaris, 24647 Trusted Systems Information eXchange, 24748 Trust model vulnerabilities, 155 TSIX See Trusted Systems Information eXchange Tunneling, 151, 26768, 259, 260 Team-Fly® Index Value size field, 175 VC See Virtual circuit VCC See Virtual channel connection VCI See Virtual channel identifier VINO, 301 Virtual channel connection, 163, 168 Virtual channel identifier, 16364 Virtual circuit, 141, 16465, 167, 170 Virtual credit card, 71 Virtual path connection, 163 Virtual path identifier, 16364 VirtualPIN, 8890 Virtual private network, 145, 15859 asynchronous transfer mode, 16970 security association, 19798 Virus, 147 Virus wall, 244 Visa Open Platform, 377 Visitor location register, 35860 VLR See Visitor location register VMView, 252 Voice over Internet protocol, 136 VPC See Virtual path connection VPI See Virtual path identifier VPIN See VirtualPIN VPN See Virtual private network WAE See Wireless application environment WAN See Wide area network WAP See Wireless application protocol Watermark detection, 280 Watermark extraction, 280 Watermarking, digital, 28082 WDP See Wireless datagram protocol Weak forward integrity, 342 Weak mobility, 334 Web anonymizer, 295 White-box testing, 25152 Wide area network, 141 WIM See Wireless application protocol identity module 409 WinNuke filter, 21516 Wireless application environment, 362 Wireless application protocol, 355, 36163 Wireless Application Protocol Forum, 356 Wireless application protocol identity module, 364 Wireless datagram protocol, 362 Wireless e-commerce See Mobile commerce Wireless markup language, 36164 Wireless session protocol, 362 Wireless transaction protocol, 362 Wireless transport layer security, 361, 363 Wireless transport security layer, 362 WML See Wireless markup language WMLScript, 36162 Word, 14 Word space coding, 281 World Wide Web access control, 273 copyright protection, 28082 description of, 255, 25758 publishing issues, 27374, 277 transaction security, 26871 World Wide Web client security, 285 anonymizing techniques, 28897 privacy violations, 28788 spoofing, 28687, 317 Wrapper, 27576 Wrapping mechanism, 270 Write-down, 246 WSP See Wireless session protocol WTLS See Wireless transport layer security WTP See Wireless transaction protocol X.25 standard, 141 X.500 standard, 5859, 233 X.509 certificate, 5461, 230 X9.62 standard, 36 XML See Extensible markup language Zero-knowledge protocol, 4345 ... Hassler, Vesna Security fundamentals for e- commerce (Artech House computer security series) Business enterprisesComputer networks Security measures Electronic commerce Security measures Broadband... seven-layer reference model Some services may be provided at more than one layer if the effect on security is different (Table 1.2 [4]) 8 Security Fundamentals for E- Commerce Table 1.2 Placement of Security. .. like e- commerce, Internet, Web, or security. E- commerce (electronic commerce) is a result of moving the economy to a new medium, namely the computer network For the most part, interconnected