Analysis Using Petri Nets for SKP-based SET Protocol

SKP기반 SET프로토콜의 Petri Nets를 이용한 분석

  • Published : 2001.10.01

Abstract

SET is one of the useful protocol for credit payment in the Electronic market. Since, the delivery problem is conformed to delivery cooperation not payment problem, the classic SET protocol didn\`t consider about the certification of delivery. But the environment of electronic market be changed to manage the sold, delivery and payment etc.. In this paper, based on this consider, we propose a new SET protocol which has an function to verify the delivery based on SKP and verify it after analyzed by Petri nets. Specially, we consider SKP between Customer, Merchant, and Acquirer for improve the verify function.

SET은 전자상거래에 있어서 가장 많이 사용되고 있는 결재 시스템 규약 중의 하나이다. 그러나 전자상거래에서 실질적인 배달이나 배달 확인과정에 대해서는 SET은 고려하고 있지 않다. 따라서 본 논문에서는 배달이나 배달 확인에 의한 지불에 대한 보안성을 좀 더 높여주는 SKP(Secure Key Protocol)를 제안한다. 그리고 Petri Nets 모델링 방법을 이용하여, SKP를 적용한 SET 모델의 적합성 여부를 증명한다.

Keywords

References

  1. Daniel C. Lynch, and Leslie Lundquist, Digital Money, John Wiley and Sons, 1996
  2. Peter Wayner, Digital Cash 2nd Edition, AP Professional, 1997
  3. VISA and MasterCard, SET Secure Electronic Transition Specification, Book 1 : Business Description, Version 1.0, May, 1997
  4. VISA and MasterCard, SET Secure Electronic Transaction Specification, Book 2 : Programmer's Guide, Version 1.0, May, 1997
  5. Kim M. H., Lee J. K., 'Schedules of Multi-Robot Interconnection Systems using Time Petri Nets,' Proceedings of ITC-CSCC '97 Okinawa, Japan, pp.1095-1098, July, 1997
  6. J. L. Peterson, 'Petri Net Theory and Modeling of System,' Prentice-Hall, NJ, 1981
  7. Tadao Murata, 'Petri Nets: Properties, Analysis and Applications,' Proceedings of the IEEE, Vol.77, No.4, pp.541-580, April, 1989 https://doi.org/10.1109/5.24143
  8. Alan O.Freier, Philip Kariton, and Paul C. Kocher, 'The SSL protocol: Version 3.0', Tech. Rep., Internet Draft, 1996
  9. ISO/IEC, 'Information Technology open systems interconnection the directory : Authentication framework,' June, 1994
  10. Mihir Bellare, Ran Canetti and Hugo Krawczyk, 'Keying hash functions for message authentication,' in Advances in Cryptology CRYPTO '96, 1996
  11. NIST National Institute of Standards and Technology (Computer Systems Laboratory), 'Secure Hash Standard,' Federal Information Processing Standards Publication FIPS PUB 1801, Apr. 1992
  12. Mihir Bellare, Juan A.Garay, 'Design, Implementation and Deployment of the iKP Secure Electronic Payment System,' IEEE Journal of Selected Areas in Communications, Vol.18, No.4, April 2000 https://doi.org/10.1109/49.839936
  13. N.Asokan, Phil Janson, Michael Steiner, and Michael Waidner, 'State of the art in electronic payment systems,' IEEE Computer, Vol.30, No.9, pp.28-35, Sept. 1997 https://doi.org/10.1109/2.612244
  14. Steen Larsen, Zurich iKP Prototype (ZiP) : iKP Transaction Layer Functional Specification, IBM Zurich Research Laboratory, May. 1996
  15. Shai Halevi and Hugo Krawczyk, 'Public-key cryptography and password protocols,' ACM Transactions on Information and System Security, Vol.2, No.3, pp.25-60, 1999 https://doi.org/10.1145/322510.322514
  16. Visual Object Net++, Visual Object oriented Petri Net based Engineering Tool Evaluation Version 1.44.2, Rainer Drath, http://www.systemtechnik.tu-ilmenau.de/~drath