Reducing the computational cost of the authentication process in SET protocol

SET es un protocolo seguro de pago, con tarjeta de crédito, que proporciona un modelo robusto de seguridad para entregar información personal y financiera a través de Internet, basado en la integridad de los datos, su confidencialidad y la autenticación mutua. Sin embargo, las partes involucradas en...

Full description

Autores:
Martínez Peláez, Rafael
Rico-Novella, Francisco
Forne, Jordi
Satizábal, Cristina
Tipo de recurso:
Article of journal
Fecha de publicación:
2010
Institución:
Universidad Autónoma de Occidente
Repositorio:
RED: Repositorio Educativo Digital UAO
Idioma:
eng
OAI Identifier:
oai:red.uao.edu.co:10614/14236
Acceso en línea:
https://hdl.handle.net/10614/14236
https://red.uao.edu.co/
Palabra clave:
Cifrado de datos (Computadores)
Data encryption (Computer science)
Bluetooth technology
Certification path validation
Computational cost
Mobile payment
SET protocol
Coste computacional
Pago móvil
Protocolo SET
Tecnología bluetooth
Validación de caminos de certificación
Rights
openAccess
License
Derechos reservados - Universidad del Norte, 2010
id REPOUAO2_2014d943776ed3d6b1d11ffe550c08db
oai_identifier_str oai:red.uao.edu.co:10614/14236
network_acronym_str REPOUAO2
network_name_str RED: Repositorio Educativo Digital UAO
repository_id_str
dc.title.eng.fl_str_mv Reducing the computational cost of the authentication process in SET protocol
dc.title.alternative.none.fl_str_mv Reducción del coste computacional del proceso de autenticación en el protocolo SET
title Reducing the computational cost of the authentication process in SET protocol
spellingShingle Reducing the computational cost of the authentication process in SET protocol
Cifrado de datos (Computadores)
Data encryption (Computer science)
Bluetooth technology
Certification path validation
Computational cost
Mobile payment
SET protocol
Coste computacional
Pago móvil
Protocolo SET
Tecnología bluetooth
Validación de caminos de certificación
title_short Reducing the computational cost of the authentication process in SET protocol
title_full Reducing the computational cost of the authentication process in SET protocol
title_fullStr Reducing the computational cost of the authentication process in SET protocol
title_full_unstemmed Reducing the computational cost of the authentication process in SET protocol
title_sort Reducing the computational cost of the authentication process in SET protocol
dc.creator.fl_str_mv Martínez Peláez, Rafael
Rico-Novella, Francisco
Forne, Jordi
Satizábal, Cristina
dc.contributor.author.none.fl_str_mv Martínez Peláez, Rafael
Rico-Novella, Francisco
Forne, Jordi
Satizábal, Cristina
dc.subject.armarc.spa.fl_str_mv Cifrado de datos (Computadores)
topic Cifrado de datos (Computadores)
Data encryption (Computer science)
Bluetooth technology
Certification path validation
Computational cost
Mobile payment
SET protocol
Coste computacional
Pago móvil
Protocolo SET
Tecnología bluetooth
Validación de caminos de certificación
dc.subject.armarc.eng.fl_str_mv Data encryption (Computer science)
dc.subject.proposal.eng.fl_str_mv Bluetooth technology
Certification path validation
Computational cost
Mobile payment
SET protocol
dc.subject.proposal.spa.fl_str_mv Coste computacional
Pago móvil
Protocolo SET
Tecnología bluetooth
Validación de caminos de certificación
description SET es un protocolo seguro de pago, con tarjeta de crédito, que proporciona un modelo robusto de seguridad para entregar información personal y financiera a través de Internet, basado en la integridad de los datos, su confidencialidad y la autenticación mutua. Sin embargo, las partes involucradas en una transacción deben llevar a cabo diversas operaciones criptográficas, lo que puede ser un problema cuando se usan dispositivos móviles con baja capacidad de almacenamiento y procesamiento. Este artículo muestra como se puede reducir el coste computacional de SET, mediante el uso de otro protocolo llamado TRUTHC en conjunto con una Infraestructura de Clave Pública (PKI). Los resultados muestran que, usando TRUTHC, el tiempo total de ejecución puede ser reducido un 3% desde el punto de vista del cliente. Esta reducción se mantiene aunque aumente la longitud del camino de certificación
publishDate 2010
dc.date.issued.none.fl_str_mv 2010-01
dc.date.accessioned.none.fl_str_mv 2022-08-30T15:05:17Z
dc.date.available.none.fl_str_mv 2022-08-30T15:05:17Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.eng.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.content.eng.fl_str_mv Text
dc.type.driver.eng.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.eng.fl_str_mv http://purl.org/redcol/resource_type/ART
dc.type.version.eng.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.issn.spa.fl_str_mv 1223461
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/10614/14236
dc.identifier.instname.spa.fl_str_mv Universidad Autónoma de Occidente
dc.identifier.reponame.spa.fl_str_mv Repositorio Educativo Digital
dc.identifier.repourl.spa.fl_str_mv https://red.uao.edu.co/
identifier_str_mv 1223461
Universidad Autónoma de Occidente
Repositorio Educativo Digital
url https://hdl.handle.net/10614/14236
https://red.uao.edu.co/
dc.language.iso.eng.fl_str_mv eng
language eng
dc.relation.citationendpage.spa.fl_str_mv 24
dc.relation.citationissue.spa.fl_str_mv 27
dc.relation.citationstartpage.spa.fl_str_mv 1
dc.relation.cites.spa.fl_str_mv Satizábal, C., Martínez Peláez, R., Rico Novella, F. J., Forné J. (2010). Reducing the computational cost of the authentication process in SET protocol. Ingeniería & Desarrollo, 27, 1-24. https://rcientificas.uninorte.edu.co/index.php/ingenieria/article/view/829/476
dc.relation.ispartofjournal.spa.fl_str_mv Ingeniería & Desarrollo
dc.relation.references.none.fl_str_mv [1] C. Satizábal, R. Páez, and J. Forné, “PKI trust relationship using hash chains”, presented at International Conference on Advances in the Internet, Processing, Systems and Interdisciplinary Research (IPSI’05), France, 2005.
[2] C. Satizabal, R. Martínez-Peláez, J. Forné, and F. Rico-Novella, “Reducing the computational cost of certification path validation in mobile payment”, Lecture Notes in Computer Science, vol. 4582, pp. 280-296, 2007.
[3] J. Gao, K. Edunuru, J. Cai, and S. Shim, “P2P-Paid: A peer-to-peer wireless payment system”, presented at Second IEEE International Workshop on Mobile Commerce and Services (WMCS’05), Germany, 2005.
[4] S. Nambiar, C.-T. Lu, and L.-R. Liang, “Analysis of payment transaction security in mobile commerce”, presented at IEEE International Conference on Information Reuse and Integration (IRI’04), USA, 2004.
[5] H. v. d. Heijden, “Factors affecting the successful introduction of mobile payment system”, presented at 15th Bled Electronic Commerce Conference eReality: Constructing the eEconomy, Slovenia, 2002.
[6] R. Bruno, M. Conti, and E. Gregori, “Bluetooth: Architecture, protocols and scheduling algorithms”, Cluster Computing, vol. 5, pp. 117-131, 2002.
[7] E. Ferro and F. Potorti, “Bluetooth and Wi-Fi wireless protocols: a survey and a comparison”, IEEE Wireless Communications, vol. 12, pp. 12-26, 2005.
[8] Mastercard and VISA, “SET Secure Electronic Transaction specification”, Business Description 1.0, 1997.
[9] Wireless Application Protocol Forum WAPForum, “Wireless Application Protocol Public Key Infrastructure Specification”, Open Mobile Alliance WAP-210-WAPArch-20010712-a, 2001.
[10] International Telecommunication Union ITU-T, “Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory : Authentication Framework (Technical Corrigendum)”, 2000.
[11] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC 2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, IETF Network Working Group, 1999.
[12] Wireless Application Protocol Forum WAPForum, “Wireless Identity Module Part: Security”, Specification WAP-260-WIM-20010712-a, 2001.
[13] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, IETF Network Working Group, April, 2002.
[14] W. T. Polk and N. E. Hastings, “Bridge Certification Authorities: Connecting B2B Public Key Infrastructures”, NIST, 2000.
[15] L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, vol. 24, pp. 770-772, 1981.
[16] N. Johansson, M. Kihl, and U. Körner, “TCP/IP Over the Bluetooth Wireless Ad-hoc Network”, presented at IFIP-TC6 / European Commission International Conference on Broadband Communications, High Performance Networking, and Performance of Communication Networks, 2000.
dc.rights.spa.fl_str_mv Derechos reservados - Universidad del Norte, 2010
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.eng.fl_str_mv https://creativecommons.org/licenses/by-nc/4.0/
dc.rights.accessrights.eng.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.creativecommons.spa.fl_str_mv Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
rights_invalid_str_mv Derechos reservados - Universidad del Norte, 2010
https://creativecommons.org/licenses/by-nc/4.0/
Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 24 páginas
dc.format.mimetype.eng.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad del Norte
dc.publisher.place.spa.fl_str_mv Barranquilla
institution Universidad Autónoma de Occidente
bitstream.url.fl_str_mv https://dspace7-uao.metacatalogo.com/bitstreams/3af1f575-ede2-4ddb-ae75-11f22331a889/download
https://dspace7-uao.metacatalogo.com/bitstreams/6214aa3d-e7a1-4d3e-918e-74561c290399/download
https://dspace7-uao.metacatalogo.com/bitstreams/5ae715aa-2032-4412-b1a2-69d8a5ead1b0/download
https://dspace7-uao.metacatalogo.com/bitstreams/5ff3dc30-b859-4e8e-a58b-38898955abb2/download
bitstream.checksum.fl_str_mv bbb65b1658b520f2c29f87e3451ce753
20b5ba22b1117f71589c7318baa2c560
5a43e051fb41cc16fafebcd46a683fb1
36aa01cefad202f21e9adadddc5db23a
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio UAO
repository.mail.fl_str_mv repositorio@uao.edu.co
_version_ 1814260054504767488
spelling Martínez Peláez, Rafael6ec2fd8d7dc62fd40ad10417e12bc6c6Rico-Novella, Francisco6eb191a79da28f135c81a624895ae470Forne, Jordi94616f93f93ebaa854a7901ddfe2c6c8Satizábal, Cristina6eae5a2d0535f4ec5d38758b9821478c2022-08-30T15:05:17Z2022-08-30T15:05:17Z2010-011223461https://hdl.handle.net/10614/14236Universidad Autónoma de OccidenteRepositorio Educativo Digitalhttps://red.uao.edu.co/SET es un protocolo seguro de pago, con tarjeta de crédito, que proporciona un modelo robusto de seguridad para entregar información personal y financiera a través de Internet, basado en la integridad de los datos, su confidencialidad y la autenticación mutua. Sin embargo, las partes involucradas en una transacción deben llevar a cabo diversas operaciones criptográficas, lo que puede ser un problema cuando se usan dispositivos móviles con baja capacidad de almacenamiento y procesamiento. Este artículo muestra como se puede reducir el coste computacional de SET, mediante el uso de otro protocolo llamado TRUTHC en conjunto con una Infraestructura de Clave Pública (PKI). Los resultados muestran que, usando TRUTHC, el tiempo total de ejecución puede ser reducido un 3% desde el punto de vista del cliente. Esta reducción se mantiene aunque aumente la longitud del camino de certificaciónSET is a secure credit card payment protocol that provides a robust security model based on data integrity, data confidentiality and mutual authen-tication to deliver personal and financial information through Internet. However, the parties involved in the transaction must carry out a lot of cryptographic operations which can be a problem when these parties use mobile devices with low processing and storage capacities. This paper shows how the computational cost of the SET protocol can be reduced when another protocol called TRUTHC is used in conjunction with the Public Key Infrastructure (PKI). Results show that the total execution time can be reduced about 3% using TRUTHC from the customer point of view. This reduction is still the same in spite of the increase of path length24 páginasapplication/pdfengUniversidad del NorteBarranquillaDerechos reservados - Universidad del Norte, 2010https://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccessAtribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)http://purl.org/coar/access_right/c_abf2Reducing the computational cost of the authentication process in SET protocolReducción del coste computacional del proceso de autenticación en el protocolo SETArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a85Cifrado de datos (Computadores)Data encryption (Computer science)Bluetooth technologyCertification path validationComputational costMobile paymentSET protocolCoste computacionalPago móvilProtocolo SETTecnología bluetoothValidación de caminos de certificación24271Satizábal, C., Martínez Peláez, R., Rico Novella, F. J., Forné J. (2010). Reducing the computational cost of the authentication process in SET protocol. Ingeniería & Desarrollo, 27, 1-24. https://rcientificas.uninorte.edu.co/index.php/ingenieria/article/view/829/476Ingeniería & Desarrollo[1] C. Satizábal, R. Páez, and J. Forné, “PKI trust relationship using hash chains”, presented at International Conference on Advances in the Internet, Processing, Systems and Interdisciplinary Research (IPSI’05), France, 2005.[2] C. Satizabal, R. Martínez-Peláez, J. Forné, and F. Rico-Novella, “Reducing the computational cost of certification path validation in mobile payment”, Lecture Notes in Computer Science, vol. 4582, pp. 280-296, 2007.[3] J. Gao, K. Edunuru, J. Cai, and S. Shim, “P2P-Paid: A peer-to-peer wireless payment system”, presented at Second IEEE International Workshop on Mobile Commerce and Services (WMCS’05), Germany, 2005.[4] S. Nambiar, C.-T. Lu, and L.-R. Liang, “Analysis of payment transaction security in mobile commerce”, presented at IEEE International Conference on Information Reuse and Integration (IRI’04), USA, 2004.[5] H. v. d. Heijden, “Factors affecting the successful introduction of mobile payment system”, presented at 15th Bled Electronic Commerce Conference eReality: Constructing the eEconomy, Slovenia, 2002.[6] R. Bruno, M. Conti, and E. Gregori, “Bluetooth: Architecture, protocols and scheduling algorithms”, Cluster Computing, vol. 5, pp. 117-131, 2002.[7] E. Ferro and F. Potorti, “Bluetooth and Wi-Fi wireless protocols: a survey and a comparison”, IEEE Wireless Communications, vol. 12, pp. 12-26, 2005.[8] Mastercard and VISA, “SET Secure Electronic Transaction specification”, Business Description 1.0, 1997.[9] Wireless Application Protocol Forum WAPForum, “Wireless Application Protocol Public Key Infrastructure Specification”, Open Mobile Alliance WAP-210-WAPArch-20010712-a, 2001.[10] International Telecommunication Union ITU-T, “Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory : Authentication Framework (Technical Corrigendum)”, 2000.[11] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC 2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, IETF Network Working Group, 1999.[12] Wireless Application Protocol Forum WAPForum, “Wireless Identity Module Part: Security”, Specification WAP-260-WIM-20010712-a, 2001.[13] R. Housley, W. Polk, W. Ford, and D. Solo, “RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, IETF Network Working Group, April, 2002.[14] W. T. Polk and N. E. Hastings, “Bridge Certification Authorities: Connecting B2B Public Key Infrastructures”, NIST, 2000.[15] L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, vol. 24, pp. 770-772, 1981.[16] N. Johansson, M. Kihl, and U. Körner, “TCP/IP Over the Bluetooth Wireless Ad-hoc Network”, presented at IFIP-TC6 / European Commission International Conference on Broadband Communications, High Performance Networking, and Performance of Communication Networks, 2000.Comunidad universitaria en generalPublicationORIGINALReducing the computational cost of the authentication process in SET protocol.pdfReducing the computational cost of the authentication process in SET protocol.pdfTexto archivo completo del artículo de revista, PDFapplication/pdf694487https://dspace7-uao.metacatalogo.com/bitstreams/3af1f575-ede2-4ddb-ae75-11f22331a889/downloadbbb65b1658b520f2c29f87e3451ce753MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81665https://dspace7-uao.metacatalogo.com/bitstreams/6214aa3d-e7a1-4d3e-918e-74561c290399/download20b5ba22b1117f71589c7318baa2c560MD52TEXTReducing the computational cost of the authentication process in SET protocol.pdf.txtReducing the computational cost of the authentication process in SET protocol.pdf.txtExtracted texttext/plain38448https://dspace7-uao.metacatalogo.com/bitstreams/5ae715aa-2032-4412-b1a2-69d8a5ead1b0/download5a43e051fb41cc16fafebcd46a683fb1MD53THUMBNAILReducing the computational cost of the authentication process in SET protocol.pdf.jpgReducing the computational cost of the authentication process in SET protocol.pdf.jpgGenerated Thumbnailimage/jpeg9494https://dspace7-uao.metacatalogo.com/bitstreams/5ff3dc30-b859-4e8e-a58b-38898955abb2/download36aa01cefad202f21e9adadddc5db23aMD5410614/14236oai:dspace7-uao.metacatalogo.com:10614/142362024-01-19 16:49:17.265https://creativecommons.org/licenses/by-nc/4.0/Derechos reservados - Universidad del Norte, 2010open.accesshttps://dspace7-uao.metacatalogo.comRepositorio UAOrepositorio@uao.edu.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