Font Size: a A A

The Research On EC Trade Security Mechanism

Posted on:2006-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:R H XiangFull Text:PDF
GTID:2168360155950641Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Information and Technology, human race is coming into a new era of network and information. Electronic Commerce based on Internet has become a new mode for people to pursue commerce. With more and more people execute their commerce through Internet, the prospect of Electronic Commerce is becoming more and more attracting. But at the same time, the security problem of Electronic Commerce is becoming more and more obvious. The Key-point of establishing a secure and convenient application environment of Electronic Commerce is to assure the security of business activities and make it as safe and credible as tradition mode. Data encryption constitute the foundation of EC security, that is to say, EC security couldn't exist if there is no data encryption techniques.The security of electronic commerce consists of network security and business transaction security. Encryption technology, security system and security protocols are the major supports for present business transaction, while security protocol usually adopts SSL and SET protocol.SSL protocol is a middle layer security protocol which was provided by Netscape Company to be used on Internet with encryption communication. It is lied between TCP/IP layer and application layer, and provided a security channels for network transmission. The channels is transparent for application protocol, and provided trusty services which assured communication security in two computers.SET protocol is an electronic payment system protocol based on credit cards which was proposed by the two great credit card organizations Visa and MasterCard to be used on Internet .The core technology in SET includes data encryption, data signature, electronic envelope and electronic secure certificate etc. SET is designed mainly to solve transactions through credit card payment among the customer and the merchant and the bank, so as to protect the secret of payment information, the integrity of payment process, the legal status of merchants and card-holders, and the operability. SET protocol is complex, its design is strict and its security is high. It is mainly applied to B to C mode to protect the security of payment information.The transaction security problem of researching EC is the focus of the paper. This paper, firstly, introduces EC's background and correlative foundation knowledge, concludes the security problem of currently EC, further, expounds contents and meaning of the research. Secondly, aiming at the security problem, the paper emphasizes its security techniques, including Encryption theory (Secret KeyEncryption , Public Key Encryption , Non-maths Encryption and technology), integrality(message digest and Hash function) , digital signature, etc. In the third part, the paper mainly analyze the security of SSL and SET and theirselves, points out some deficiencies in SSL and SET, and with regard to these deficiencies, the author of this paper puts forward corresponding resolvent. At last, the paper puts forward a reference model of solution project which suits the situation of our country on the foundation of combining the reality application of security technique and analyzing correlative protocol.
Keywords/Search Tags:Electronic Commerce, Certificate, SSL, SET, Encrypt
PDF Full Text Request
Related items