SSL, SET, and PGP are common encryption methods on the Internet (I). They all have a large user base in their respective applications. This article will introduce these three popular encryption methods in detail.
■ SSL (Secure Socket Layer)
The SSL protocol is the first published by Netscape for secure data transmission. Its primary goal is to provide a secure and reliable connection between two communications. The Protocol consists of two layers. The underlying layer is an SSL record layer established on a reliable transmission protocol (for example, TCP) to encapsulate high-level protocols. The SSL handshake protocol allows the server and client to identify each other through a specific encryption algorithm before starting data transmission. SSL is an independent application protocol. other higher-level protocols can be established on the SSL protocol.
Currently, most Web servers and browsers support SSL data encryption protocols. Therefore, you can use this function to set some confidential web pages in an encrypted transmission mode, so that you can avoid eavesdropping when data is transmitted over the network.
SSL uses public key encryption technology (RSA) as the encrypted communication protocol between the client and the host when transmitting confidential data. Currently, SSL technology is widely used in most Web servers and browsers.
For consumers, SSL has solved most of the problems. However, for e-commerce, the problem is not completely solved, because SSL only keeps the information confidential, and the vendor cannot determine who filled the information. Even if this is done, there are also problems with bank liquidation.
■ SET (Secure Electronic Transaction)
SET is a security protocol jointly developed by IBM, the credit card International Organization (VISA/MasterCard), and related vendors for network electronic transactions. It uses RSA Secure public key encryption technology, data confidentiality, data integrity, data source identification, and non-repudiation are used to protect the security of consumers in the Internet card-based payment transactions. SET 1.0 was officially launched in June 1997. Now, SET has become an internationally recognized security standard in Internet electronic commerce transactions.
The SET protocol is used in the Payment System of the secure electronic bank card, and the browser of the client is used in the process from commercial sites to commercial banks. Online Banking uses existing programs and equipment to clear customers' bank accounts by confirming credit cards. The SET protocol hides the credit card number to ensure the security of the entire payment process. Therefore, SET must ensure that the credit card holder can maintain continuous contact with the bank on the existing system and network. The SET protocol creates a complete solution for using credit cards in different systems. Reliable authentication makes SET a good online payment system. It enables each valid participant in a transaction to have a reasonable identity, and the identity verification for the cardholder is performed by the bank. Of course, this includes other services, such as identity authentication and customer service. This is another reliable user connection method. At the same time, it is convenient to conduct arbitration in the event of a dispute.
Both SET and SSL are used to authenticate consumers. That is to say, not only do the global data network shopping sites need to be authenticated by the certification authority, but consumers must also obtain authentication from the certification authority.
SET is composed of Electronic Wallet, Merchant Server, Payment Gateway, and Certification Authority, these constitute credit card-authorized transactions that comply with the SET standards on the Internet.
In general, financial transactions on an open network are dominated by SSL and SET transaction protocols, and SET is considered the safest by the international public. In view of this, VISA/MASTER proposed a network Transaction security specification named SET: Secure Electronic Transaction in June 1997, which basically utilizes the same big value encoding technology as SSL, to guarantee data confidentiality and user authentication.
Currently, the Secure Transaction standard SET for credit cards is still under construction in the early stage. Before the system is fully operational, consumers still have to bear the risk of theft of credit card information when using credit cards for shopping on the Internet.
Sensitive information is eavesdropped during transmission, the transaction information is tampered with during transmission, the identities of both parties are counterfeited, and identical orders are repeatedly sent, these problems are still difficult for the current SET Security Transaction Standards. User Profile, SSL, or CA will be used to provide confidential data to users using WWW, so as to prevent the data from being eavesdropped by others when transmitted over the network.
■ PGP (Pretty Good Privacy)
At present, there is also a very Good way to connect to the network and desktop security, PGP (Pretty Good Privacy ).
PGP is a public key encryption program. Unlike the previous encryption method, the Information encrypted by the PGP Public Key can only be decrypted using the private key. In traditional encryption methods, a key can be both encrypted and decrypted. How can we transmit data through an insecure channel before starting transmission? Using the PGP public key encryption method, you can widely spread the public key while securely saving the private key. Because only you can have a private key, anyone can use your public key to encrypt the information you write, without worrying about the information being eavesdropped.
Another advantage of PGP is that digital signatures can be used in the document. A private key can only be decrypted using a public key. In this way, if people read the file decrypted with your public key, they will be sure that only you can write the file.
Currently, the latest version of PGP 2.6.3 is used in the United States and Canada. PGP 2.6.3i is generally used on the Internet and can be downloaded from www.pgpi.org.
PGP is a software encryption program that users can use to create secure messages and communications on insecure communication links. The PGP Protocol has become a de facto standard for public key encryption technology and global message security. Because everyone can see its source code to find faults and security vulnerabilities, all faults and vulnerabilities are corrected after they are discovered.