Professional Documents
Culture Documents
Electronic Commerce 2018
Electronic Commerce 2018
Definitions of E-Commerce
Electronic Commerce (EC) is where business transactions take place via
telecommunications networks, especially the Internet.
OR
The use of electronic transmission media that engage in the exchange, including buying
and selling of product and services, requiring transportation, either physically or
digitally from location to location.
E-Commerce definition based on different perspective
Communications
EC is the delivery of information, product/services, or payments over telephone
lines, computer n/w or any other electronic means.
Business process
EC is the application of technology toward the automation of business transactions.
Service
EC is a tool that addresses the desire of firms, consumers, and management to cut
service costs while improving the quality of goods and increasing the speed of
service delivery.
Online
EC provides the capability of buying and selling products and information on the
internet and other online services
Definition of E-Business
According to IBM “The transformation of key business processes through the use of
internet technologies”
Business processes are the ways in which organizations coordinate and organize work
activities, information, and knowledge to produce their valuable products or services.
Business processes for the manufacturing and production area include product assembling,
quality checking, and producing bills of materials. For the sales and marketing area,
business processes include identifying customers, making customers aware of the product,
and selling the product. For finance and accounting, business processes includes paying
creditors, creating financial statements, and managing cash accounts. For human
resources, business processes include hiring employees, evaluating job performance of
employees, and enrolling employees in benefits plans.
Buyer/Seller Transactions
Elements on Buyer’s Side
• Identify specific need
• Search for products or services that will satisfy the specific need
• Select a vendor
• Negotiate a purchase transaction
• Make payment and Perform regular maintenance and make warranty claims
Elements on Seller’s Side
• Conduct market research to identify customer needs
• Create product or service that will meet customers’ needs
• Advertise and promote product or service
• Negotiate a sale transaction
• Ship goods and invoice to customer
• Receive and process customer payments
• Provide after-sale support, maintenance, and warranty services
The Benefits of EC
Benefits to Organizations
1) It expands the marketplace to national and international markets
2) Decreases the cost of creating, processing, distributing, storing and retrieving
paper-based information
3) Allowing customization of products and services which provides competitive advantage
to its implementers
4) Reduces the time while distributing documents, information, receipt of products and
services
5) Based on technical infrastructure
6) Lowers telecommunications cost - the Internet is much cheaper than value added
networks (VANs)
Benefits to consumers
1) Enables consumers to shop or do other transactions 24 hours a day, all year round
from almost any location
2) Provides consumers with more choices
3) Provides consumers with less expensive products and services by allowing them to shop
in many places and conduct quick comparisons
4) Allows quick delivery of products especially with digitized products
Benefits to society
1) Enables more individuals to work at home, and to do less traveling for shopping,
resulting in less traffic on the roads, and lower air pollution
2) Allows some merchandise to be sold at lower prices, benefiting less affluent people
3) Enables people in Third World countries and rural areas to enjoy products and
services which otherwise are not available to them
4) Facilitates delivery of public services at a reduced cost, increases effectiveness,
and/or improves quality
The Limitations of EC
Technical limitations
1) There is a lack of universally accepted standards for quality, security, and
reliability
a) Cybersquatting: Registering a domain name that is the trademark of a person or
company and hoping to sell it to that person or company for money
b) Web Defamation: Statement that is false and injures the reputation of another
person or company
c) Masquerading: A fake domain with misguiding information in order to damage
organizational reputation in the market.
d) Privacy issues: Collection and misuse of visitor’s personal information.
2) The telecommunications bandwidth is insufficient
3) Software development tools are still evolving
4) There are difficulties in integrating the Internet and EC software with some existing
(especially legacy) applications and databases.
5) Special Web servers in addition to the network servers are needed (added cost).
6) Internet accessibility is still expensive and/or inconvenient
Chapter 2: Technology Infrastructure: The internet and the world wide web
The World Wide Web (www)
The terms Internet and World Wide Web are often used in every-day speech without much
distinction. However, the Internet and the World Wide Web are not one and the same. The
Internet is a global system of interconnected computer networks. In contrast, the Web is
one of the services that run on the Internet. It is a collection of interconnected
documents and other resources, linked by hyperlinks and URLs. In short, the Web is an
application running on the Internet.
Viewing a web page on the World Wide Web normally begins either by typing the URL of the
page into a web browser, or by following a hyperlink to that page or resource. The web
browser then initiates a series of communication messages, behind the scenes, in order
to fetch and display it.
The World-Wide Web was developed to be a pool of human knowledge, and human culture,
which would allow collaborators in remote sites to share their ideas and all aspects of
our life.
It’s software which allows us to view multimedia documents on the web. That is text,
videos, audio, animations, images etc. it’s a standard developed by Tim Berners Lee in
1990, which has two main parts means use HTML to design websites and use web browser to
view all the websites on the web.
Web Site
A web site is a collection of web pages or related web pages which are interlinked Web
Pages. Example www.Yahoo.com, where hundreds of web pages are interlinked together.
Web Page
The basic unit of information displayed over the net is a web page. Various web pages
are prepared independently and in the end they are linked in the required sequence.
Link for a web page is basically URL(Uniform Resource Locater)
Home page
It is the front end of the web site. First user access point to the user of the web
site. Welcoming the reader who has logged on the site. Home page provides labeled
links to the main web pages Home page can have access to online forms for ordering
items, online product catalogs, have a chat page where the customer can chat with
supplier.
What is an Intranet?
When internet technology is used to create a private network within a company. It Uses
Internet tools, such as Websites, Web browsers, and Internet protocols. Employee
within organization may use web pages in order to share information among each other.
Example: Kabul Bank might have a network design using internet technology within their
building and each employee share information by having their login web page, messenger
etc.
What is an Extranet?
A network that uses the Internet to link multiple intranets. Extranets allow selected
customers and suppliers to have access to a company’s intranet. For example EDI
(Electronic Data Exchange) which is a standard format to exchange data. Example: Kabul
Bank connect each of their intranets which are in different provinces through internet
and allowing their selected customers who is having Credit card and are able to access
their account and can withdraw money from any part of the country.
Types of website
As we know, on the internet million of websites are hosted. Some are special purpose
websites and some are general purpose websites. There are two types of websites,
Commercial website and Non-commercial website
– Commercial websites
Any website that offers products or services for sale. An example of commercial
website is www.amazon.com, www.yahoo.com. Both are specifically designed for the
purpose of business.
– Non-commercial website
Any website that offers products or services not for sale. These websites are not
designed for business. An example for non-commercial websites are Academic
institution (www.kardan.edu.af), NGO, Religious organization, Social Organization,
Gov agencies
Some 40 times faster than 56k modems. With the internet, there will be no need
to log on and off, download times will be lightning fast and fears over the cost
of the call will be removed.
DSL is dedicated line and is remain the same as in peak or off time. Two reasons
makes the DSL speed slows down, one is the quality of phone line is not good and
second when DSL office is far.
Types of DSL
Asymmetric DSL
Sending data upstream (3-9 Mbps) slower than receiving downstream (16-55
Mbps)
Symmetric DSL
Same upstream and downstream (upto 3 Mbps)
2. Broadband
It is the name given to systems designed for high-speed transmission of huge
amounts of electronic data.
Broadband benefits
24-hour internet connection
Video on demand
Fast interactive digital television
Fast interactive home shopping
Video e-mail
Video conferencing
Fast downloading of games, music and software
High-bandwidth always connected no need to dial. Can handle voice, data and
video information
3. Cable modem
Translates digital signals for transmission over television cables. Bandwidth
shared among many users. Downstream up to 1.5 Mbps, upstream of 128 Kbps
4. ISDN
Speed up to 128 Kbps. Bandwidth divided into three channels
• Basic Rate Interface (BRI)
• Two bearer (B) channels
Revenue Model
Describes how the firm will earn revenue, generate profits, and produce a superior
return from invested money. Revenue model is one of business model components where
Business Model can defined as
“An Activities which planed and designed to produce the profits in market space.
Banner Swapping
Creates direct link between one’s sites to the other site. In Banner Swapping,
Websites holder barters Ad space. you can either trade banners with another
webmaster, or you can use a banner swap service. Trading banners is simple. You
post a webmasters banner to your site, and he will post yours. Usually, there are
no traffic minimums, and as long as you continue to send some traffic to the other
site, they will send some to you. Obviously, if you site is receiving 100 hits a
day through the banner, and you are only sending 2-3 visitors to their site, the
webmaster may cancel the swap.
Compile by Irfan Khan
Page 12 | 30
If you advertise on sites for specific audiences, you will pay $35 - $85 CPM. For
example if you are a Travel Company you might consider advertising on
www.amazon.com (a successful online book store) on their Travel Books pages.
2) Article Marketing. This method has long term results since your articles stay in
the articles directories for years. When you write an article about something that
relates to your business you can put a link to your website in the resource box at
the end. Use keywords in the title and throughout the article, submit it to article
directories and you create a back link to your business website.
3) Blogging. Creating a blog is one of the easiest things to do with free services that
you can use. Sign up, pick a template and write. If you have a business, write about
things that are relevant to that business. Use keywords so your posts will be found
in the search engines. Add fresh content to your blog at least once a week,
preferably more, especially in the beginning.
4) SEO-Search Engine Optimization. This method of advertising, or rather, marketing
is subtle but powerful. Choose less competitive keywords and place them in the title
of your website. Include them in the h1 and h2 tags and also the meta tags. Sprinkle
them throughout your website content and at the beginning and end of your website.
This will help you site rank higher in the search engines and be found easier with
those keywords you chose. Optimizing your website is one of the first things you need
to do when it is used for promoting your business.
[
5) Link Building. Creating quality links back to your website will help improve your
ranking in the search engines and raise your Google page rank. This advertising
method includes placing your link on as many highly ranked sites as possible. This
can include article directories, link directories and other people’s blog. Linking
all your sites to one another helps too. Get your link out there to as many places as
you can to help your site move up the search engine ranks.
7) Splash Screen
Capture the user’s attention. Used by especially large applications to notify the user
that the program is in the process of loading. Disappears when the application's main
window appears. Visually appealing, and may also have animations, graphics and sound.
Pay-per-click
Rewards an affiliate for each click-through that is generated from a banner ad
hosted by the affiliate and is taken to the merchant site
Pay-per-sale
Also known as the commission-based model. Merchant pays affiliate a fee or
commission on a sale that results from a click-through. Example www.express.com
provides such services.
Pay-per-lead
Merchant pays affiliate a set fee for each click-through that results in action
Like make a purchase, Complete a form or take a survey
CPM (cost-per-thousand)
Requires the merchant to pay the affiliate a fee for every 1000 visitors that simply
view the merchant’s banner on the affiliate site. Its now Not used as often as the
other models because merchants prefer to pay for actions.
Affiliate Programs
Affiliate Program? (Affiliate marketing program or associate Program)
A form of partnership in which a company pays affiliates (other companies or
individuals) for pre-specified actions taken by visitors who click-through from an
affiliate site to a merchant site.
The Merchant is the company that advertises on another company’s site. Merchant or
advertiser operates the program. It is a very good marketing tool for merchant.
The Affiliate the company hosting the advertising in return for a reward based on
predetermined terms. Affiliate or publisher participates in the program
Affiliates act as an extended sales force and it is a revenue source for affiliate
Online Auction
The online auction business model is one in which participants bid for products and
services over the Internet
OR
A market mechanism in which an object, service, or set of objects, is exchanged on
the basis of bids submitted by participants. Auctions provide a specific set of rules
that will govern the sale or purchase of an object to the submitter of the most
favorable bid
Origins of Auctions
In an auction the Seller offers an item for sale, but does not establish price
Bidders:
o The Potential buyers who participate in auction
Bids:
o The Prices bidders are willing to pay for an item
Shill bidders:
o A shill is a person who is paid to help another person or organization to
sell goods or services
o It is the act of bidding on your own auction against other bidders in
order to raise the price at which your item will eventually sell
Multiple Unit
More than one of an item is offered for sale, Out of the whole similar items, you can
bid on individual item. For example: A seller is auctioning five identical coffee
mugs
Bid Bidder Time Quantity
$3 Mr. Ali 8:30 AM 4
$5 Mr. Asad 9:45 AM 1
$10 Mrs. Sahil 9:59 AM 3
$12 Mr. Wasim 10:30 AM 1 winner & pay $12
$14 Mr. Ali 11:59 AM 4 winner & pay $14
Types of Auction:
1) English Auctions
Usually an item is offered for sale. Bidding starts with a low price, and is raised
incrementally as progressively higher bids are solicited, until either the auction is
closed or no higher bids are received. Usually an Open auction because all Bids are
publicly announced. The price at which an auction begins is term as Minimum bid and
Minimum acceptable price is called Reserve price.
2) Yankee auctions
An English auction of multiple identical items in which the winning bidders pay the
prices that they have bid. This means more than one of an item is offered for sale.
Yankee auction example
Write same example as above (See Multiple Unit Example)
3) Dutch Auctions
Also called descending-price auctions. Form of open auction in which bidding starts
at a high price and drops until bidder accepts price. A seller offers up an item for
bid at a very high price. The initial price is much higher than the item's value
usually and no seller expects to get that price for the item
Often better for the seller. Good for moving large numbers of commodity items quickly
Example of Dutch auction
If a business is auctioning off a used company car, the bidding may start at
$15,000. The bidders will wait as the price is lowered to $14,000 to $13,000 to
$12,000 to $11,000 and to $10,000. When the bidding reaches $10,000, Bidder A
decided to accept that price and because he is the first bidder to do so, he is
considered the winner and has to pay $10,000 for the automobile.
4) Sealed-bid auctions
All bidders submit their sealed (secret) bids. When the bidding period is over, all
the bids are opened. The high bidder wins and pays what he bid. Example
Bid Bidder Time
$3 Mr. Ali 8:30 AM
$5 Mr. Asad 9:45 AM
$10 Mrs. Sahil 11:59 AM (winner and pay $10)
Note: in case of multiple unit, each winners all pay the highest losing bid or lowest
winning bid
6) Double auction
Buyers and sellers each submit combined price-quantity bids to an auctioneer.
A double auction is a process of buying and selling goods when potential buyers
submit their bids and potential sellers simultaneously submit their ask prices to an
auctioneer, and then an auctioneer chooses some price p that clears the market: all
c) Business-to-business auctions
Reverse bid where Buyer can accept lowest offer or the offer that best matches
buyer’s criteria. This refers to a one-buyer, many-seller auction. For example
www.Priceline.com
Virtual Communities
Gathering place for people and businesses that does not have physical existence
Exist on the Internet in various forms like Usenet newsgroups, Chat rooms (Yahoo),
Web sites (facebook, myspace). Offer people a way to connect with each other and
discuss common issues and interests.
Web Portal
A web portal or links page is a web site that functions as a point of access to
information in the World Wide Web. Can offer services such as e-mail, news, stock
prices, information, databases and entertainment.
Advertising supported Revenue Model is mostly used in web portals; High visitor
counts can yield high advertising rates. They also add sticky features such as chat
rooms, e-mail, and calendar functions.
Packet Switching
Each host computer Communicate by sending packets of data across network. Packets are
small chucks (pieces) of data having the following information
7) Source IP address
8) Destination IP address
9) Sequencing information
10) Error-control information
11) Data
Router
Moves packets across Internet, Packets not sent directly could pass through many
routers. If one part of Internet fails, rest can still function
2. Hardware
– Server
– Communications Media
Server
A powerful computer that provide services to all the computers on the network.
A server fulfills all the requests of client computers. A server can be dedicated server
or General purpose server.
Types of Servers
Web servers (A server that are hosting websites), e-mail servers (A server
use for sending and receiving electronic mails), database servers (A server that
store related data of an organization in a very organized form) and file servers
A general purpose server are those servers that resides many types of servers in
one computer that is the same machine can be a Web Server, Database Server, Email
Server etc. While a dedicated server is normally dedicated to a special task like
database server that is only responsible for database.
Bandwidth
Measure of how much data a communication media can be transferred per unit time.
The more the bandwidth the more data can be transferred. Bandwidth is normally
measured in bits per second (bps), kilobits per second (Kbps) or megabits per
second (Mbps)
Copper wire
Widely used, widely available, reliable and easy to install. Not suitable for high
speed data transmission. Copper wire normally need Modem, A device that convert
Digital Signals to Analog Signals (Modulation) and convert Analog Signals to
Digitals Signals (Demodulation).
Fiber-optic cable
Thinner and lighter than copper and higher bandwidth. Quite expensive and are
difficult to install. The data that are transmitting in Fiber-Optic Cables are in
the form of light and thus need Optical Modem for Converting Light in to Digital
Signals and Digital Signal back to Light. Optical Modem comes up with Opto-Chip
which now have to capability to use the smallest particle of light that is Photon
in order to increase bandwidth.
Signal strength
Normally decreases over distance. In order to stable the signal strength a special
hardware called repeater is used.
Repeaters
Retransmit signals across copper wire or fiber-optic cable when they become
weak
3. Software
– Application service providers (ASPs)
– Operating systems
– Databases
Operating system
Software use to operate the computer or hardware. Also called system software and
are normally developed by the manufacturer of computer hardware.
Different types of operating systems are available in the market which includes
Multi-user (capable of managing multiple users at the same time like Email server
Compile by Irfan Khan
Page 21 | 30
of Yahoo are normally access by millions of users at the same time), multi-
processing (capable of managing multiple processers installed at the same time),
multi-tasking (capable of managing multiple tasks at the same time like listening
to a song while preparing E-Commerce presentation).
Major Operating systems are Unix, Linux, Macintosh and Windows. Linux is very
popular for Web hosting and is Open source that is the Source code is readily
available
Database
Database is an organized collection of logically related data. Organized collection
of data helps the users to perform various operations like insertion, deletion,
update easily. Related data means all the data stored must be related to one
organization.
A database need Database management system (DBMS) which can be define as “ A
software that can manage the data, use for the creation of the database, storing
the data in the database, performing operations on the database, taking backups,
restoration, assigning user rights etc. ”
Well known DBMS includes MySQL, MS SQL Server, Oracle, MS Access.
4. Domain names
Domain Names are the real estate of the Internet like http://www.kardan.edu.af which
points to a disk space on the web server.
A typical Domain has three parts (www.yahoo.com)
1. Host name – usually “www”
2. Domain name – name of company or key word or phrase “Yahoo”
3. Top-level domain (TLD) – describes type of organization that owns the domain
name, com and org are widely used examples
4. An optional Country code TLD (CCTLD) can also be added with the domain name
in order to make it country specific like www.mof.gov.af
First, get a domain name then you are free to assign sub names Example:
www.weather.yahoo.com belongs to www.yahoo.com.
Domain Names are regulated by global non-profit bodies that is Internet Corporation
for Assigned Names and Numbers (ICANN) which Regulates domain names and IP
addresses. www.nwtworksolutions.com and register.com allow domain name registration
Characteristics of Cash
12) Real time payment
Also called Instant time payment
13) Authentication
Authenticated by third party and people just trust on third party
14) Anonymity
No identity on the cash, No name but on check you have your name
15) Transferability
Can easily be transferred to another person
16) Diversability
It can be used for anything, that is you can buy any kind of things
17) Independence
Can be divided into independent unit and all units can be used independently
Limitation in traditional payment system
18) Not adequate for real time payment interaction.
19) The parties that are involve in the transaction I.e. buyers and sellers must
physically exist.
20) Sufficient delay in the payment process.
21) Lack of security that is providing the card/payment/account details through mail or
telephone is very risky.
22) Lack of coverage I.e. credit card only work with signed up merchant and not
generally support individual to individual.
E-Mint
These are the Companies enable merchants to accept E-payments online. These companies
have established business relationships with financial institutions that will accept
Compile by Irfan Khan
Page 23 | 30
online credit-card payments for merchant clients. CyberCash and iCat, Trintech. E-
Payments like E-Cash, Cyber coin, digit cash, cyber dollar etc are offered by these
companies. E-Mint must be trust worthy and merchant who have the sites must pay them
(Amazon.com)
1. E-Credit Card
In Credit-Card Transactions, a merchant must have a merchant account with a bank.
Transactions are processed by banks or third-party services.
Seek to extend the functionality of existing credit cards for use as online shopping
payment tools
The players
23) The cardholder: a consumer or a corporate purchaser who uses credit cards to pay
merchants.
24) The merchant: the entity that accepts credit cards and offers goods or services in
exchange for payments.
25) The card issuer: a financial institution (usually a bank) that establishes accounts
for cardholders and issues credit cards.
26) The acquirers: a financial institution tat establishes an account for merchants and
acquires the vouchers for authorized sales slips.
27) The card brand: Visa and MasterCard
2. E-cash
Digital cash is like having a virtual savings account where charges are made for ongoing
purchases, particularly micropayments, small payments from $0.01 to $10 that can be used
to pay for access to digital information such as newspaper articles or software, this is
very useful for high risk services such as adult, gaming, software download or any kind
of pay per view or pay per minute type product.
Uses of E-Cash:
1. One-click micro-payments over the Internet:
A visitor to a site clicks on a link to buy access to an article for a nickel; one click
and he gets to read.
Obtaining E-cash
32) The consumer requests his bank to transfer money to E-mint to obtain E-cash.
33) The customer bank transfer money from the customer accounts to E-Mint.
34) The E-mint sends E-cash to the consumer, who saves it on the hard drive.
3. E-Check
Seek to extend the functionality of existing checking accounts for use as online
shopping payment tools
Stored value card is used if only a small monetary amount is involved. It minimizes the
transaction - processing cost by carrying a monetary value directly in the card. It’s
relatively inexpensive because the cost of production is very low upto $0.25 per card
and inexpensive equipments are used to change the contents of magnetic strip. It’s
normally very hard for a customer to control utility expenses using stored value card.
5. Smart Card
An electronic card containing an embedded microchip that enables predefined operations
or the addition, deletion, or manipulation of information on the card
Stored value card is used if only a small monetary amount is involved and adding
security, reliability and reusability to a card, A Smart Card is used. It is relatively
expensive because the cost of production ranges 1 to $30 per card and expensive
equipments are used to reprogrammed the contents of the chip. Customer can easily
control utility expenses by using Small program install on the card.
The security is very stronger by using two level of authentication first it check card
holder finger print and then it ask for the pin code as well.
Contact card
A smart card containing a small gold plate on the face that when inserted in a
smart card reader makes contact and passes data to and from the embedded microchip
Contactless card
A smart card with an embedded antenna, by means of which data and applications are
passed to and from a card reader unit or other device without contact between the
card and the card reader
6. Debit card
While credit card is a way to pay later but debit card is a way to pay now. Customer can
also withdraw from their account through ATM. It is often easier to get than a credit
card.
7. Micropayments
Merchant must pay a fee for each credit card transaction, but some time the customer
purchase an inexpensive items like music, picture, video etc I.e. the cost of item is
Customer they buy products receive monthly bills include description of all purchases
made during the month. CyberCash created CyberCoin for micropayments.
Paypal is one of the payment processor offering peer to peer payment and having more
than 140,000,000 accounts and are commonly use as Bookkeeping & accounting system. Allow
online monetary transfers between consumers.
eCash allows the transfer of digital cash via e-mail between two people who have
accounts at eCash-enabled banks
E-wallets
• An electronic wallet serves a function similar to a physical wallet, also:
• Holds credit cards, electronic cash, owner identification, and owner contact
information
• Provides owner contact information at an electronic commerce site’s checkout
counter
• Keep track of your billing and shipping information so that it can be entered
with one click at participating merchants’ sites
• Makes shopping easier and more efficient
• Eliminates need to repeatedly enter identifying information into forms
to purchase
Internet security
Consumers entering highly confidential information, Number of security attacks
increasing because computer systems continually accessible
Security requirements
Authentication
A method to verify the sender and receiver identity
Encryption
A process of making messages unreadable except by those who are authentic
Integrity
Ensuring that information will not be accidentally or maliciously altered or
destroyed during transmission
Privacy
Information not read by third party
Non repudiation
Merchant saying no after payment submitted by customer and Customer saying no about
order submission after receiving product
Basic Terminologies
Compile by Irfan Khan
Page 28 | 30
Cryptography
The art of writing in secrete character, used to secure information
Various organizations have patents and standards for cryptography. They include the
International Organization for Standardization (ISO), the International Electrotechnical
Commission (IEC), the American National Standards Institute (ANSI), the United States
Federal Information Processing Standards (FIPS), and the Internet Engineering Steering
Group (IESG) of the Internet Engineering Task Force (IETF), as well as private
interests. A Dutch company, DigiCash, owns most of the digital cash patents
Cryptanalysis
is the use of mathematics and statistics to crack cryptographic techniques as employed
by a cryptanalyst
Cryptology:
The area of mathematics and statistics that studies cryptography and cryptanalysis.
Ancient Cryptosystems
Substitution (PRESTON------- QSFTUPO)
Every occurrence of a given letter is replaced by a different letter
Transposition (PRESTON------PETN RSO)
Shifts the ordering of letters
Modern cryptosystems
Transform data by using a key. Key is a string of digits that acts as a password.
Digital, based on bits not the alphabet. Key is having a length called key length.
The more the key length the more the secure the system will be.
Plain-text or Original Text
The original message or unencrypted data
Cipher or Encryption
An algorithm that is applied on the plain text to get the cipher text.
Cipher-text or Encrypted Text
A text that is encrypted, converted into a form which is not readable
Decipher or Decryption
An algorithm that is applied on the encrypted text to get the plain text.
Security Schemes
1. Secret key cryptography
Also called Symmetric key cryptography or Private Key cryptography. The same key must
be used for encryption (sender) and for the decryption (Receiver). The same key must be
share among the two parties. Normally used in B2B transactions.
Diagram Required
Problem with secret-key cryptography is the sharing of the key. Key distribution centers
used to reduce these problems who generates session key and sends it to sender and
receiver encrypted with the unique key
Example of Private key Cryptography includes DES, Blowfish, IDEA, LOKI and RC4
Diagram Required
RSA Algorithm
Sender is doing encryption using C=Me mod(n) and receiver is doing decryption using M=Cd
mod(n)
Where d is private key, e is public key, M is the original message, C is cipher text and
n is P*Q
3. Digital signature
Used for authentication of senders by using public key cryptography in reverse
Sender
‾ Run the encrypted message through hashing function to get message digest
‾ Encrypt the message digest using sender private key which creates digital signature
‾ Encrypt the message through receiver public key
‾ Send encrypted message and digital signature and hashing function to the receiver
Receiver
‾ Decrypt the message using receiver private key
‾ Decrypt the message digest using sender public key
‾ Run the hashing function to get the message and compare
Diagram Required
Security Protocol