Page 87 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 87
E-Commerce and E-Business
Establishing a Secure Communication for a Leading Stock Exchange
Company
Caselet
This case study is of a leading stock exchange that covers major cities and towns across India. The stock
exchange has an automated online trading system within national reach. This stock exchange has
reformed the Indian securities market to establish a better microstructure, trading volumes, and market
practices.
The challenge is the exchange of data between the stock exchange and a member stock broking
company. The stock exchange communicates its business information to other member companies and
receives information from them. The stock exchange requires this communication to be authenticated,
automated, and secure. To achieve this, the stock exchange must use a secured e-commerce system that
will:
1. Get the PDF documents digitally signed by multiple authorities at the server end.
2. Get the HTML forms digitally signed at the client end and verify the signed data at the server
end, after filling the data.
The stock exchange’s challenge was taken up by E-Lock Solutions and they designed a SuperSigner
SDK (Java version) which satisfied the requirement. The system was able to authenticate the
transmitted information between the two entities. It reduced the overheads caused due to the use of
paper communication and established a faster and reliable exchange of information.
Source: http://www.elock.com/nse-casestudy.html
6.4 Summary
• An efficient e-commerce system should guarantee confidentiality, integrity, availability,
authenticity, non-repudiability, and auditability of information.
• SQL injection, price manipulation, buffer overflow, cross-site scripting, and remote command
execution are some of the vulnerabilities found in e-commerce systems.
• To ensure secured communication cryptosystems are used. They involve encryption and
decryption methods to ensure confidentiality, and integrity of information.
• Cryptosystems are classified into symmetric and asymmetric cryptosystems. Symmetric
cryptosystems make use of a single key to establish communication between two users. They
operate in block cipher mode and stream cipher mode. Asymmetric cryptosystems use private and
public keys for establishing a secure communication between two users.
• RSA algorithm uses public key for achieving confidentiality and authenticity of the information.
• Digital signatures prevent a receiver from using the sender’s digital signature to ‘sign’ information
on behalf of the sender.
• Public Key Cryptography Standards (PKCS) defines a standard format to transmit information
over the network using public key cryptography technique.
• Privacy Enhanced Mail (PEM), MIME Object Security Services (MOSS), Secure Multipurpose
Internet Extensions (S/MIME), and Pretty Good Privacy (PGP) are the protocols used for
establishing secured communication.
• Public key Certificates define a standard certificate format for establishing secured communication
using private and public key.
• Electronic cash over Internet allows a consumer to use e-cash to do online shopping and transfer
money.
80 LOVELY PROFESSIONAL UNIVERSITY