Main Article Content

Prathamesh Churi


This paper tells about electronic transaction on ecommerce website using Secure Electronic Transaction (SET) protocol. SET is a very comprehensive security protocol, which utilizes cryptography to provide confidentiality of information, ensure payment integrity, and enable identity authentication. It relies on cryptography, digital certificate and authentication by SMS to ensure message confidentiality and security. First the report introduces about ecommerce websites and how to build it. It then explains how SET works and the components involved in it. Then the report gives out a design and implementation of this protocol.


Download data is not yet available.

Article Details



X. Zhang, Q. Huang and P. Peng, "Implementation of a Suggested E-commerce Model Based on SET Protocol," 2010 Eighth ACIS International Conference on Software Engineering Research, Management and Applications, Montreal, QC, Canada, 2010, pp. 67-73.

A. Sun, "Optimization Study for Lightweight Set Protocol," 2012 International Conference on Industrial Control and Electronics Engineering, Xi'an, 2012, pp. 1206-1209.

X. Liu, "The Study on E-commerce Security Based on ECC and SET," 2011 Third International Conference on Communications and Mobile Computing, Qingdao, 2011, pp. 85-87.

X. Fei, A. M. Zhang and W. Liang, "Formalizing and Checking SET Protocol Based on TLA," 2010 International Conference on E-Product E-Service and E-Entertainment, Henan, 2010, pp. 1-3.

S. p. Chen, "Study on a Safe and Efficient Payment Model in E-Commerce," 2008 International Conference on Advanced Computer Theory and Engineering, Phuket, 2008, pp. 860-864.

X. Zhang and L. Wang, "Key Technologies for Security Enhancing of Payment Gateway," 2008 International Symposium on Electronic Commerce and Security, Guangzhou City, 2008, pp. 743-748.

M. C. Ruiz, D. Cazorla, F. Cuartero and J. J. Pardo, "A formal specification and performance evaluation of the purchase phase in the SET protocol," Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05), 2005, pp. 6 pp.-.

Seokwon Yang, S. Y. W. Su and H. Lam, "A non-repudiation message transfer protocol for e-commerce," EEE International Conference on E-Commerce, 2003. CEC 2003., 2003, pp. 320-327.

G. Bella, F. Massacci and L. C. Paulson, "Verifying the SET registration protocols," in IEEE Journal on Selected Areas in Communications, vol. 21, no. 1, pp. 77-87, Jan 2003.

M. Papa, O. Bremer, J. Hale and S. Shenoi, "Formal analysis of e-commerce protocols," Proceedings 5th International Symposium on Autonomous Decentralized Systems, Dallas, TX, 2001, pp. 19-28.

Z. Hu, "The Study of E-Commerce Security Protocol," 2011 International Conference on Intelligence Science and Information Engineering, Wuhan, 2011, pp. 349-352.

Shen zihao and Wang hui, "An improved SET protocol payment system," 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering, Chengdu, 2010, pp. 400-403.

B. Xu and S. Xie, "Research of Session Security Management in E-Commerce System," 2009 International Symposium on Information Engineering and Electronic Commerce, Ternopil, 2009, pp. 796-799.

Z. Zhang, "E-Commerce Based Agents over P2P Network," 2008 International Conference on Management of e-Commerce and e-Government, Jiangxi, 2008, pp. 77-81.

Chin-Ming Hsu and Hui-Mei Chao, "An online fraud-resistant technology for credit card E-transactions," TENCON 2007 - 2007 IEEE Region 10 Conference, Taipei, 2007, pp. 1-4.

P. Venkataram, B. S. Babu, M. K. Naveen and G. H. S. Gungal, "A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce," 2007 IEEE International Performance, Computing, and Communications Conference, New Orleans, LA, 2007, pp. 395-401.

Hyun-Seok Kim, Il-Gon Kim and Jin-Young Choi, "Analyzing the Application of E-Commerce inWireless Network," Second IEEE International Workshop on Mobile Commerce and Services, Munich, 2005, pp. 112-122.

H. Schuldt, A. Popovici and H. J. Schek, "Automatic generation of reliable e-commerce payment processes," Proceedings of the First International Conference on Web Information Systems Engineering, Hong Kong, 2000, pp. 434-441 vol.1.

Ramkrishna Oruganti, Saurabh Shah, Yohan Pavri, Neelansh Prasad, Prathamesh Churi (2017). JSSecure: A Secured Encryption Strategy for Payment Gateways in E-Commerce. Circulation in Computer Science, 2, 5(June 2017), 13-17.

Meadows, Catherine, and Paul Syverson. "A formal specification of requirements for payment transactions in the SET protocol." In International Conference on Financial Cryptography, pp. 122-140. Springer, Berlin, Heidelberg, 1998.

Lu, Shiyong, and Scott A. Smolka. "Model checking the secure electronic transaction (SET) protocol." In Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 1999. Proceedings. 7th International Symposium on, pp. 358-364. IEEE, 1999.

Brlek, Srecko, Sardaouna Hamadou, and John Mullins. "A flaw in the electronic commerce protocol SET." Information Processing Letters 97, no. 3 (2006): 104-108.

Shedid, Sabrina M., and Mohamed Kouta. "Modified SET protocol for mobile payment: an empirical analysis." In Software Technology and Engineering (ICSTE), 2010 2nd International Conference on, vol. 1, pp. V1-350. IEEE, 2010.

Paulson, Lawrence C. "Verifying the SET protocol: Overview." In Formal Aspects of Security, pp. 4-14. Springer, Berlin, Heidelberg, 2003.

Seo, Moonseog, and Kwangjo Kim. "Electronic funds transfer protocol using domain-verifiable signcryption scheme." In ICISC, vol. 99, pp. 269-277. 1999.

Seo, Moonseog, and Kwangjo Kim. "Electronic funds transfer protocol using domain-verifiable signcryption scheme." In ICISC, vol. 99, pp. 269-277. 1999.

Kraft, Theresa A., and Ratika Kakar. "E-commerce security." In Proceedings of the Conference on Information Systems Applied Research, Washington DC, USA. 2009.

Marchany, Randy C., and Joseph G. Tront. "E-commerce security issues." In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, pp. 2500-2508. IEEE, 2002.

Udo, Godwin J. "Privacy and security concerns as major barriers for e-commerce: a survey study." Information Management & Computer Security 9, no. 4 (2001): 165-174.

Marchany, Randy C., and Joseph G. Tront. "E-commerce security issues." In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, pp. 2500-2508. IEEE, 2002.

Kesh, Someswar, Sam Ramanujan, and Sridhar Nerur. "A framework for analyzing e-commerce security." Information Management & Computer Security 10, no. 4 (2002): 149-158.

Laudon, Kenneth C., and Carol Guercio Traver. E-commerce. Pearson, 2013.

Sengupta, A., C. Mazumdar, and M. S. Barik. "e-Commerce security—A life cycle approach." Sadhana 30, no. 2 (2005): 119-140.

Mastercard and Visa. SET Protocol Specifications. http://www.setco.org/set_specifications.html

Romao A. and da Silva M. M., 1998. An Agent-based Secure Internet Payment Systems. Proceedings of TREC’98, LNCS 1402, pp. 80-93.

Wang X. F. et al, 1999, “Secure Agent-Mediated Mobile Payment†Proceedings of PRIMA98, LNAI 1599, pp.162- 173.

Supakorn Kungpisdan , Bala Srinivasan , Phu Dung Le, “A Practical Framework for Mobile SET Payment†In Proceedings of the IADIS International E-Society Conference, Lisbon, Portugal, June 3-6 (2003) , pp 321-328

Chung-Ming Ou, C.R.Ou, “SETNR/A: an agent-based secure payment protocol for mobile commerceâ€, International Journal of Intelligent Information and Database Systems, Vol. 4, No.3, 2010.

Xiaolin Pang, Kian–Lee Tan, Yan Wang, and Jian Ren, “A Secure Agent-Mediated Payment Protocolâ€, In: Fourth International Conference on Information and Communications Security (ICICS2002), volume LNCS 2512, Springer-Verlag, pages 422-433