TY - JOUR
T1 - Verifying the SET purchase protocols
AU - Bella, G.
AU - Massacci, F.
AU - Paulson, L.C.
PY - 2006/1
Y1 - 2006/1
N2 - SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure e-commerce transactions. The Purchase part of the suite is intended to guarantee the integrity and authenticity of the payment transaction while keeping the Cardholder's account details secret from the Merchant and his choice of goods secret from the Bank. This paper details the first verification results for the complete Purchase protocols of SET. Using Isabelle and the inductive method, we show that their primary goal is indeed met. However, a lack of explicitness in the dual signature makes some agreement properties fail: it is impossible to prove that the Cardholder meant to send his credit card details to the very payment gateway that receives them. A major effort in the verification went into digesting the SET documentation to produce a realistic model. The protocol's complexity and size make verification difficult, compared with other protocols. However, our effort has yielded significant insights. © Springer Science+Business Media, Inc. 2006.
AB - SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure e-commerce transactions. The Purchase part of the suite is intended to guarantee the integrity and authenticity of the payment transaction while keeping the Cardholder's account details secret from the Merchant and his choice of goods secret from the Bank. This paper details the first verification results for the complete Purchase protocols of SET. Using Isabelle and the inductive method, we show that their primary goal is indeed met. However, a lack of explicitness in the dual signature makes some agreement properties fail: it is impossible to prove that the Cardholder meant to send his credit card details to the very payment gateway that receives them. A major effort in the verification went into digesting the SET documentation to produce a realistic model. The protocol's complexity and size make verification difficult, compared with other protocols. However, our effort has yielded significant insights. © Springer Science+Business Media, Inc. 2006.
UR - https://www.scopus.com/pages/publications/33750247207
UR - https://www.scopus.com/inward/citedby.url?scp=33750247207&partnerID=8YFLogxK
U2 - 10.1007/s10817-005-9018-6
DO - 10.1007/s10817-005-9018-6
M3 - Article
SN - 0168-7433
VL - 36
SP - 5
EP - 37
JO - Journal of Automated Reasoning
JF - Journal of Automated Reasoning
IS - 1-2
ER -