Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Equational approach to formal verification of SET
Ogata K., Futatsugi K.  Quality software (Proceedings of the Fourth International Conference on Quality Software (QSIC’04), Sep 8-10, 2004)50-59.2004.Type:Proceedings
Date Reviewed: May 11 2005

The secure electronic transaction (SET) standard specifies a sophisticated protocol, aimed at securing e-commerce transactions. It improves on secure sockets layer (SSL), which merely focuses on preventing eavesdropping, by focusing on possible untrustworthy agents in a transaction: merchants who might misuse or not properly guard credit card information, and customers who may not be who they say they are. The difficulty with the SET protocol is its size and complexity: documentation requiring over 1,000 pages, many levels of encryption, numerous messages during a transaction, and multiple alternative protocol paths. As with any complex system, the question is simply: Will it work as advertised?

Like Bella et al. [1], the authors of this work focus on the formal verification of a reasonably simplified version of the SET payment protocol (just one part of the larger overall protocol). The approach is to use observational transition system (OTS)/CafeOBJ, the latter of which is an algebraic specification language in which an OTS can be specified as a collection of rewriting rules. The authors prove that the simplified protocol is secure against attack by intruders, and appropriately hides information from both customers and merchants. The paper provides enough detail for the reader to get a good sense of the approach, but a complete discussion would go far beyond what is possible in a brief paper.

A limitation of the paper is that, unlike Bella et al. [1], the authors give readers little in the way of background about SET, and plunge into detail without sufficient general discussion. Still, all in all, this work is an important application of formal methods to protocol verification.

Reviewer:  Myles F. McNally III Review #: CR131263 (0604-0439)
1) Bella, G.; Massacci, F.; Paulson, L.C. The verification of an industrial payment protocol: the SET purchase phase. In Proc. of the 10th ACM Conference on Computer and Communications Security ACM, 2002, 12–20.
Bookmark and Share
  Featured Reviewer  
 
Payment Schemes (K.4.4 ... )
 
 
Answer/ Reason Extraction (I.2.3 ... )
 
 
Security (K.4.4 ... )
 
 
Deduction And Theorem Proving (I.2.3 )
 
 
Electronic Commerce (K.4.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Payment Schemes": Date
Electronic payment systems for E-Commerce
O’Mahony D., Peirce M., Tewari H., Artech House, Inc., Norwood, MA, 2001.  345, Type: Book (9781580532686)
Mar 1 2002
Implementing electronic card payment systems
Radu C., Artech House, Inc., Norwood, MA, 2002.  484, Type: Book (9781580533058)
Jun 9 2003
Insights and analyses of online auctions
 Communications of the ACM 44(11): 42-50, 2001. Type: Article
May 24 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy