Documente Academic
Documente Profesional
Documente Cultură
Trading System
Afifah Astafannisa
(20214390)
Dewi Setio Asih
(22214890)
Dini Aryanti (23214178)
Yasi Mardika (2C214361)
Definition
Classification
Interne
t
Trading
System
Additional Terms
Comparison
Efforts to Resolve the Legal
Dispute
Definition of
nternet Trading
System
A collection of
elements, rules,
terms, ordinances,
which form a unified
whole in trading on
the Internet
Confidentiality
In General,
Trading
Transaction
s Can
Guarantee
Integrity
Authenticity
Person who
making a
transaction
Data of
transaction
Classification,
Readiness
of Payment
Debit System
Credit System
Prepaid
System
based on :
Traceability
of
Transactions
The Legal
Status
Trader Traceable
Consument
Identified
System
Peer-to-Peer
Transaction
Anonymous
System
Validity Time
How the Trust
Transaction
Confirmation
Given
Transaction
E-Payment Online
Systems
E-Payment Offline
Systems
Cryptography
Additional
Terms for
Internet
TradingSys
tem
Attack Type
Symmetric Key
Asymmetric Key
One-way Hash
Function
Dual-Signature
Digital Signature
Cryptography
Study of how to make a message that sent
by the sender can be delivered safely to the
recipient.
Standardization of writing on cryptography
can be written in mathematical language.
The functions that are fundamental in
cryptography is encryption and
decryption.
Next
Encryption
Decryption
C=E(M)
M = D (C)
Explanation :
C = Chiper text
E = Encryption Process
M = Plain text
Explanation :
M = Plain text
D = Decryption Process
C = Chiper text
Attack Type
Several type of attack toward the encrypted
message:
Ciphertext only attack
Attackers only get the message that has
been encrypted only.
Known plaintext attack
Not only get the encrypted message, the
attackers can get the original message too.
Can be called as a clear-text attack.
Choosen plaintext attack
Same with known plaintext attack, but the
attackers could choose which one of the
original message that will be encrypted.
Next
Based on how to and someone position can get messages from
communication channel, attack can be categorized as:
Sniffing
The sniffer can record the conversation that occured.
Replay attack
Someone who could record the handshake messages, he/she
maybe can replay the recorded messages to deceive
someone.
Spoofing
The attacker tried to convince others that there is nothing
wrong with the communication that is done, but actually the
communication was done with the attacker.
Man-in-the-middle
If spoofing sometimes only deceive one people/party,
but a Man-in-the-middle could deceive many people/party.
Symmetric Key
The most common
type of cryptography
used.
A key to open the
encrypted message
same with a key to
unlock the encrypted
messages.
Asymmetric Key
Pair of keys cryptography which one
was used for encryption process
and the other one was used for
decryption process.
All people who gets the public key
can use it for encrypting a
message, meanwhile only one
person who have a private key for
doing a disclosure toward the
encryption.
Digital Signature
Characteristic of Digital Signature :
The signature is authentic, and cant be
imitated by other people.
The signature valid only for the document or
message
The signature could be examine easily
The signature could be examined by people
who never met before with the signer
The signature valid for the copy of the
same document too
Digital Signature take an advantage of Oneway Hash Function to guarantee the signature
valid only for the relevant document.
Dual-Signature
Someone who make a deal of buy
and sell with the others.
For payment problem, the buyer
instructs the bank the seller a sum
of money with the contract of buy
and sell, but the buyer dont want
the bank know what is the contents
of the buy and sell agreement .
Protocol of Bilyet
Digital Check
Comparison
of Internet
Trading
System
Contract Legality
Digital Signature
Next
The aim with the Bilyet Digital Checks is :
The existence of a system of transactions on
the Internet, which is based on transaction
flow bilyet checks.
Transactions that use this check must be
safe.
Utilizing as much as possible cryptographic
devices that already exist in the Secure
Electric Transaction (SET) protocol, to the
draft protocol digital bilyet check this.
Digital bilyet Checks is a development of the
type of check calculations set in KUHD. The
existence of the digital bilyet checks, prove that
the checks are more developed.
Contract Legality
Agreement in e-commerce occurs between
two parties in which one party promises the
other party to do something
This is in accordance with Article 1313 of
the Civil Code (KUHPerdata), which
stated:
An agreement is an act in which one or more
persons bind himself to one person or more
Next
Validity of agreements terms under Article 1320 of the
Civil Code :
They agree to bound themselves
Element of agreement in E-Commerce measured by
buyers
who access and approve the deals through
internet
Proficiency / Ability to make an agreement
Elements proficiency in E-Commerce is difficult to
measure, because everyone (without being limited to a
certain age) can carry out electronic transactions in
accordance with Article 2 of Law No. 11 of 2008 about
Information and Electronic Transactions ("EIT Law").
One particular thing
Goods that can be traded and can be specified by the
type.
A cause that kosher (halal)
Not contrary to law, morals, and general interest.
Digital
Signature
From law perspective, digital
signature is a safeguard from
data digital that was made with
private signature key, which is
the using depend of the public
key that become a pair with
private signature key.
Efforts to
Resolve the
Legal
Dispute
Thank You