Reducing the computational cost of the authentication process in SET protocol
SET es un protocolo seguro de pago, con tarjeta de crédito, que proporciona un modelo robusto de seguridad para entregar información personal y financiera a través de Internet, basado en la integridad de los datos, su confidencialidad y la autenticación mutua. Sin embargo, las partes involucradas en...
- Autores:
-
Martínez Peláez, Rafael
Rico-Novella, Francisco
Forne, Jordi
Satizábal, Cristina
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2010
- Institución:
- Universidad Autónoma de Occidente
- Repositorio:
- RED: Repositorio Educativo Digital UAO
- Idioma:
- eng
- OAI Identifier:
- oai:red.uao.edu.co:10614/14236
- Acceso en línea:
- https://hdl.handle.net/10614/14236
https://red.uao.edu.co/
- Palabra clave:
- Cifrado de datos (Computadores)
Data encryption (Computer science)
Bluetooth technology
Certification path validation
Computational cost
Mobile payment
SET protocol
Coste computacional
Pago móvil
Protocolo SET
Tecnología bluetooth
Validación de caminos de certificación
- Rights
- openAccess
- License
- Derechos reservados - Universidad del Norte, 2010
id |
REPOUAO2_2014d943776ed3d6b1d11ffe550c08db |
---|---|
oai_identifier_str |
oai:red.uao.edu.co:10614/14236 |
network_acronym_str |
REPOUAO2 |
network_name_str |
RED: Repositorio Educativo Digital UAO |
repository_id_str |
|
dc.title.eng.fl_str_mv |
Reducing the computational cost of the authentication process in SET protocol |
dc.title.alternative.none.fl_str_mv |
Reducción del coste computacional del proceso de autenticación en el protocolo SET |
title |
Reducing the computational cost of the authentication process in SET protocol |
spellingShingle |
Reducing the computational cost of the authentication process in SET protocol Cifrado de datos (Computadores) Data encryption (Computer science) Bluetooth technology Certification path validation Computational cost Mobile payment SET protocol Coste computacional Pago móvil Protocolo SET Tecnología bluetooth Validación de caminos de certificación |
title_short |
Reducing the computational cost of the authentication process in SET protocol |
title_full |
Reducing the computational cost of the authentication process in SET protocol |
title_fullStr |
Reducing the computational cost of the authentication process in SET protocol |
title_full_unstemmed |
Reducing the computational cost of the authentication process in SET protocol |
title_sort |
Reducing the computational cost of the authentication process in SET protocol |
dc.creator.fl_str_mv |
Martínez Peláez, Rafael Rico-Novella, Francisco Forne, Jordi Satizábal, Cristina |
dc.contributor.author.none.fl_str_mv |
Martínez Peláez, Rafael Rico-Novella, Francisco Forne, Jordi Satizábal, Cristina |
dc.subject.armarc.spa.fl_str_mv |
Cifrado de datos (Computadores) |
topic |
Cifrado de datos (Computadores) Data encryption (Computer science) Bluetooth technology Certification path validation Computational cost Mobile payment SET protocol Coste computacional Pago móvil Protocolo SET Tecnología bluetooth Validación de caminos de certificación |
dc.subject.armarc.eng.fl_str_mv |
Data encryption (Computer science) |
dc.subject.proposal.eng.fl_str_mv |
Bluetooth technology Certification path validation Computational cost Mobile payment SET protocol |
dc.subject.proposal.spa.fl_str_mv |
Coste computacional Pago móvil Protocolo SET Tecnología bluetooth Validación de caminos de certificación |
description |
SET es un protocolo seguro de pago, con tarjeta de crédito, que proporciona un modelo robusto de seguridad para entregar información personal y financiera a través de Internet, basado en la integridad de los datos, su confidencialidad y la autenticación mutua. Sin embargo, las partes involucradas en una transacción deben llevar a cabo diversas operaciones criptográficas, lo que puede ser un problema cuando se usan dispositivos móviles con baja capacidad de almacenamiento y procesamiento. Este artículo muestra como se puede reducir el coste computacional de SET, mediante el uso de otro protocolo llamado TRUTHC en conjunto con una Infraestructura de Clave Pública (PKI). Los resultados muestran que, usando TRUTHC, el tiempo total de ejecución puede ser reducido un 3% desde el punto de vista del cliente. Esta reducción se mantiene aunque aumente la longitud del camino de certificación |
publishDate |
2010 |
dc.date.issued.none.fl_str_mv |
2010-01 |
dc.date.accessioned.none.fl_str_mv |
2022-08-30T15:05:17Z |
dc.date.available.none.fl_str_mv |
2022-08-30T15:05:17Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.eng.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.content.eng.fl_str_mv |
Text |
dc.type.driver.eng.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.eng.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.version.eng.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.issn.spa.fl_str_mv |
1223461 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/10614/14236 |
dc.identifier.instname.spa.fl_str_mv |
Universidad Autónoma de Occidente |
dc.identifier.reponame.spa.fl_str_mv |
Repositorio Educativo Digital |
dc.identifier.repourl.spa.fl_str_mv |
https://red.uao.edu.co/ |
identifier_str_mv |
1223461 Universidad Autónoma de Occidente Repositorio Educativo Digital |
url |
https://hdl.handle.net/10614/14236 https://red.uao.edu.co/ |
dc.language.iso.eng.fl_str_mv |
eng |
language |
eng |
dc.relation.citationendpage.spa.fl_str_mv |
24 |
dc.relation.citationissue.spa.fl_str_mv |
27 |
dc.relation.citationstartpage.spa.fl_str_mv |
1 |
dc.relation.cites.spa.fl_str_mv |
Satizábal, C., Martínez Peláez, R., Rico Novella, F. J., Forné J. (2010). Reducing the computational cost of the authentication process in SET protocol. Ingeniería & Desarrollo, 27, 1-24. https://rcientificas.uninorte.edu.co/index.php/ingenieria/article/view/829/476 |
dc.relation.ispartofjournal.spa.fl_str_mv |
Ingeniería & Desarrollo |
dc.relation.references.none.fl_str_mv |
[1] C. Satizábal, R. Páez, and J. Forné, “PKI trust relationship using hash chains”, presented at International Conference on Advances in the Internet, Processing, Systems and Interdisciplinary Research (IPSI’05), France, 2005. [2] C. Satizabal, R. Martínez-Peláez, J. Forné, and F. Rico-Novella, “Reducing the computational cost of certification path validation in mobile payment”, Lecture Notes in Computer Science, vol. 4582, pp. 280-296, 2007. [3] J. Gao, K. Edunuru, J. Cai, and S. Shim, “P2P-Paid: A peer-to-peer wireless payment system”, presented at Second IEEE International Workshop on Mobile Commerce and Services (WMCS’05), Germany, 2005. [4] S. Nambiar, C.-T. Lu, and L.-R. Liang, “Analysis of payment transaction security in mobile commerce”, presented at IEEE International Conference on Information Reuse and Integration (IRI’04), USA, 2004. [5] H. v. d. Heijden, “Factors affecting the successful introduction of mobile payment system”, presented at 15th Bled Electronic Commerce Conference eReality: Constructing the eEconomy, Slovenia, 2002. [6] R. Bruno, M. Conti, and E. Gregori, “Bluetooth: Architecture, protocols and scheduling algorithms”, Cluster Computing, vol. 5, pp. 117-131, 2002. [7] E. Ferro and F. Potorti, “Bluetooth and Wi-Fi wireless protocols: a survey and a comparison”, IEEE Wireless Communications, vol. 12, pp. 12-26, 2005. [8] Mastercard and VISA, “SET Secure Electronic Transaction specification”, Business Description 1.0, 1997. [9] Wireless Application Protocol Forum WAPForum, “Wireless Application Protocol Public Key Infrastructure Specification”, Open Mobile Alliance WAP-210-WAPArch-20010712-a, 2001. [10] International Telecommunication Union ITU-T, “Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory : Authentication Framework (Technical Corrigendum)”, 2000. [11] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC 2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, IETF Network Working Group, 1999. [12] Wireless Application Protocol Forum WAPForum, “Wireless Identity Module Part: Security”, Specification WAP-260-WIM-20010712-a, 2001. [13] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, IETF Network Working Group, April, 2002. [14] W. T. Polk and N. E. Hastings, “Bridge Certification Authorities: Connecting B2B Public Key Infrastructures”, NIST, 2000. [15] L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, vol. 24, pp. 770-772, 1981. [16] N. Johansson, M. Kihl, and U. Körner, “TCP/IP Over the Bluetooth Wireless Ad-hoc Network”, presented at IFIP-TC6 / European Commission International Conference on Broadband Communications, High Performance Networking, and Performance of Communication Networks, 2000. |
dc.rights.spa.fl_str_mv |
Derechos reservados - Universidad del Norte, 2010 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.uri.eng.fl_str_mv |
https://creativecommons.org/licenses/by-nc/4.0/ |
dc.rights.accessrights.eng.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.creativecommons.spa.fl_str_mv |
Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) |
rights_invalid_str_mv |
Derechos reservados - Universidad del Norte, 2010 https://creativecommons.org/licenses/by-nc/4.0/ Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.extent.spa.fl_str_mv |
24 páginas |
dc.format.mimetype.eng.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad del Norte |
dc.publisher.place.spa.fl_str_mv |
Barranquilla |
institution |
Universidad Autónoma de Occidente |
bitstream.url.fl_str_mv |
https://dspace7-uao.metacatalogo.com/bitstreams/3af1f575-ede2-4ddb-ae75-11f22331a889/download https://dspace7-uao.metacatalogo.com/bitstreams/6214aa3d-e7a1-4d3e-918e-74561c290399/download https://dspace7-uao.metacatalogo.com/bitstreams/5ae715aa-2032-4412-b1a2-69d8a5ead1b0/download https://dspace7-uao.metacatalogo.com/bitstreams/5ff3dc30-b859-4e8e-a58b-38898955abb2/download |
bitstream.checksum.fl_str_mv |
bbb65b1658b520f2c29f87e3451ce753 20b5ba22b1117f71589c7318baa2c560 5a43e051fb41cc16fafebcd46a683fb1 36aa01cefad202f21e9adadddc5db23a |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio UAO |
repository.mail.fl_str_mv |
repositorio@uao.edu.co |
_version_ |
1814260054504767488 |
spelling |
Martínez Peláez, Rafael6ec2fd8d7dc62fd40ad10417e12bc6c6Rico-Novella, Francisco6eb191a79da28f135c81a624895ae470Forne, Jordi94616f93f93ebaa854a7901ddfe2c6c8Satizábal, Cristina6eae5a2d0535f4ec5d38758b9821478c2022-08-30T15:05:17Z2022-08-30T15:05:17Z2010-011223461https://hdl.handle.net/10614/14236Universidad Autónoma de OccidenteRepositorio Educativo Digitalhttps://red.uao.edu.co/SET es un protocolo seguro de pago, con tarjeta de crédito, que proporciona un modelo robusto de seguridad para entregar información personal y financiera a través de Internet, basado en la integridad de los datos, su confidencialidad y la autenticación mutua. Sin embargo, las partes involucradas en una transacción deben llevar a cabo diversas operaciones criptográficas, lo que puede ser un problema cuando se usan dispositivos móviles con baja capacidad de almacenamiento y procesamiento. Este artículo muestra como se puede reducir el coste computacional de SET, mediante el uso de otro protocolo llamado TRUTHC en conjunto con una Infraestructura de Clave Pública (PKI). Los resultados muestran que, usando TRUTHC, el tiempo total de ejecución puede ser reducido un 3% desde el punto de vista del cliente. Esta reducción se mantiene aunque aumente la longitud del camino de certificaciónSET is a secure credit card payment protocol that provides a robust security model based on data integrity, data confidentiality and mutual authen-tication to deliver personal and financial information through Internet. However, the parties involved in the transaction must carry out a lot of cryptographic operations which can be a problem when these parties use mobile devices with low processing and storage capacities. This paper shows how the computational cost of the SET protocol can be reduced when another protocol called TRUTHC is used in conjunction with the Public Key Infrastructure (PKI). Results show that the total execution time can be reduced about 3% using TRUTHC from the customer point of view. This reduction is still the same in spite of the increase of path length24 páginasapplication/pdfengUniversidad del NorteBarranquillaDerechos reservados - Universidad del Norte, 2010https://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccessAtribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)http://purl.org/coar/access_right/c_abf2Reducing the computational cost of the authentication process in SET protocolReducción del coste computacional del proceso de autenticación en el protocolo SETArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a85Cifrado de datos (Computadores)Data encryption (Computer science)Bluetooth technologyCertification path validationComputational costMobile paymentSET protocolCoste computacionalPago móvilProtocolo SETTecnología bluetoothValidación de caminos de certificación24271Satizábal, C., Martínez Peláez, R., Rico Novella, F. J., Forné J. (2010). Reducing the computational cost of the authentication process in SET protocol. Ingeniería & Desarrollo, 27, 1-24. https://rcientificas.uninorte.edu.co/index.php/ingenieria/article/view/829/476Ingeniería & Desarrollo[1] C. Satizábal, R. Páez, and J. Forné, “PKI trust relationship using hash chains”, presented at International Conference on Advances in the Internet, Processing, Systems and Interdisciplinary Research (IPSI’05), France, 2005.[2] C. Satizabal, R. Martínez-Peláez, J. Forné, and F. Rico-Novella, “Reducing the computational cost of certification path validation in mobile payment”, Lecture Notes in Computer Science, vol. 4582, pp. 280-296, 2007.[3] J. Gao, K. Edunuru, J. Cai, and S. Shim, “P2P-Paid: A peer-to-peer wireless payment system”, presented at Second IEEE International Workshop on Mobile Commerce and Services (WMCS’05), Germany, 2005.[4] S. Nambiar, C.-T. Lu, and L.-R. Liang, “Analysis of payment transaction security in mobile commerce”, presented at IEEE International Conference on Information Reuse and Integration (IRI’04), USA, 2004.[5] H. v. d. Heijden, “Factors affecting the successful introduction of mobile payment system”, presented at 15th Bled Electronic Commerce Conference eReality: Constructing the eEconomy, Slovenia, 2002.[6] R. Bruno, M. Conti, and E. Gregori, “Bluetooth: Architecture, protocols and scheduling algorithms”, Cluster Computing, vol. 5, pp. 117-131, 2002.[7] E. Ferro and F. Potorti, “Bluetooth and Wi-Fi wireless protocols: a survey and a comparison”, IEEE Wireless Communications, vol. 12, pp. 12-26, 2005.[8] Mastercard and VISA, “SET Secure Electronic Transaction specification”, Business Description 1.0, 1997.[9] Wireless Application Protocol Forum WAPForum, “Wireless Application Protocol Public Key Infrastructure Specification”, Open Mobile Alliance WAP-210-WAPArch-20010712-a, 2001.[10] International Telecommunication Union ITU-T, “Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory : Authentication Framework (Technical Corrigendum)”, 2000.[11] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC 2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, IETF Network Working Group, 1999.[12] Wireless Application Protocol Forum WAPForum, “Wireless Identity Module Part: Security”, Specification WAP-260-WIM-20010712-a, 2001.[13] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, IETF Network Working Group, April, 2002.[14] W. T. Polk and N. E. Hastings, “Bridge Certification Authorities: Connecting B2B Public Key Infrastructures”, NIST, 2000.[15] L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, vol. 24, pp. 770-772, 1981.[16] N. Johansson, M. Kihl, and U. Körner, “TCP/IP Over the Bluetooth Wireless Ad-hoc Network”, presented at IFIP-TC6 / European Commission International Conference on Broadband Communications, High Performance Networking, and Performance of Communication Networks, 2000.Comunidad universitaria en generalPublicationORIGINALReducing the computational cost of the authentication process in SET protocol.pdfReducing the computational cost of the authentication process in SET protocol.pdfTexto archivo completo del artículo de revista, PDFapplication/pdf694487https://dspace7-uao.metacatalogo.com/bitstreams/3af1f575-ede2-4ddb-ae75-11f22331a889/downloadbbb65b1658b520f2c29f87e3451ce753MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81665https://dspace7-uao.metacatalogo.com/bitstreams/6214aa3d-e7a1-4d3e-918e-74561c290399/download20b5ba22b1117f71589c7318baa2c560MD52TEXTReducing the computational cost of the authentication process in SET protocol.pdf.txtReducing the computational cost of the authentication process in SET protocol.pdf.txtExtracted texttext/plain38448https://dspace7-uao.metacatalogo.com/bitstreams/5ae715aa-2032-4412-b1a2-69d8a5ead1b0/download5a43e051fb41cc16fafebcd46a683fb1MD53THUMBNAILReducing the computational cost of the authentication process in SET protocol.pdf.jpgReducing the computational cost of the authentication process in SET protocol.pdf.jpgGenerated Thumbnailimage/jpeg9494https://dspace7-uao.metacatalogo.com/bitstreams/5ff3dc30-b859-4e8e-a58b-38898955abb2/download36aa01cefad202f21e9adadddc5db23aMD5410614/14236oai:dspace7-uao.metacatalogo.com:10614/142362024-01-19 16:49:17.265https://creativecommons.org/licenses/by-nc/4.0/Derechos reservados - Universidad del Norte, 2010open.accesshttps://dspace7-uao.metacatalogo.comRepositorio UAOrepositorio@uao.edu.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 |