Sunteți pe pagina 1din 25

Internet

Trading System
Afifah Astafannisa
(20214390)
Dewi Setio Asih
(22214890)
Dini Aryanti (23214178)
Yasi Mardika (2C214361)

Definition

Classification

Interne
t
Trading
System

Additional Terms

Comparison
Efforts to Resolve the Legal
Dispute

Definition of
nternet Trading
System
A collection of
elements, rules,
terms, ordinances,
which form a unified
whole in trading on
the Internet

Confidentiality

In General,
Trading
Transaction
s Can
Guarantee

Integrity

Authenticity

Person who
making a
transaction

Data of
transaction

Classification,
Readiness
of Payment
Debit System
Credit System
Prepaid
System

based on :

Traceability
of
Transactions

The Legal
Status

Trader Traceable
Consument
Identified
System
Peer-to-Peer
Transaction
Anonymous
System
Validity Time
How the Trust
Transaction
Confirmation
Given
Transaction
E-Payment Online
Systems
E-Payment Offline
Systems

Requires High Trust to


the other party
Doesnt Require a
High Trust to the other
party

Cryptography

Additional
Terms for
Internet
TradingSys
tem

Attack Type

Symmetric Key

Asymmetric Key

One-way Hash
Function

Dual-Signature

Digital Signature

Cryptography
Study of how to make a message that sent
by the sender can be delivered safely to the
recipient.
Standardization of writing on cryptography
can be written in mathematical language.
The functions that are fundamental in
cryptography is encryption and
decryption.

Next
Encryption

Decryption

Is the process of changing the


original message (plaintext)
into the message in code
language (ciphertext).

Is the process of changing the


messages in a code language
back to the original message.

C=E(M)

M = D (C)

Explanation :
C = Chiper text
E = Encryption Process
M = Plain text

Explanation :
M = Plain text
D = Decryption Process
C = Chiper text

Attack Type
Several type of attack toward the encrypted
message:
Ciphertext only attack
Attackers only get the message that has
been encrypted only.
Known plaintext attack
Not only get the encrypted message, the
attackers can get the original message too.
Can be called as a clear-text attack.
Choosen plaintext attack
Same with known plaintext attack, but the
attackers could choose which one of the
original message that will be encrypted.

Next
Based on how to and someone position can get messages from
communication channel, attack can be categorized as:
Sniffing
The sniffer can record the conversation that occured.
Replay attack
Someone who could record the handshake messages, he/she
maybe can replay the recorded messages to deceive
someone.
Spoofing
The attacker tried to convince others that there is nothing
wrong with the communication that is done, but actually the
communication was done with the attacker.
Man-in-the-middle
If spoofing sometimes only deceive one people/party,
but a Man-in-the-middle could deceive many people/party.

Symmetric Key
The most common
type of cryptography
used.
A key to open the
encrypted message
same with a key to
unlock the encrypted
messages.

Asymmetric Key
Pair of keys cryptography which one
was used for encryption process
and the other one was used for
decryption process.
All people who gets the public key
can use it for encrypting a
message, meanwhile only one
person who have a private key for
doing a disclosure toward the
encryption.

One-way Hash Function


Can be called as fingerprint , hash,
message integrity
check,ormanipulation detection
code.
Function of hash for making a
fingerprint that can be known by
others, so anyone can check the
totality of the document or the
message.

Digital Signature
Characteristic of Digital Signature :
The signature is authentic, and cant be
imitated by other people.
The signature valid only for the document or
message
The signature could be examine easily
The signature could be examined by people
who never met before with the signer
The signature valid for the copy of the
same document too
Digital Signature take an advantage of Oneway Hash Function to guarantee the signature
valid only for the relevant document.

Dual-Signature
Someone who make a deal of buy
and sell with the others.
For payment problem, the buyer
instructs the bank the seller a sum
of money with the contract of buy
and sell, but the buyer dont want
the bank know what is the contents
of the buy and sell agreement .

Protocol of Bilyet
Digital Check

Comparison
of Internet
Trading
System

Law Protection for


Customer

Contract Legality
Digital Signature

Protocol Digital Bilyet


Checks
Checks are one of the legal payment tool and can be
used for transactions in the business world aside the note.
If seen from the intensity of their use, a check is more
often used by people. (Imam Prayogo Suryohadibroto and
Djoko Prakoso, 1991: 172)
The factors that cause the check is preferred by people:
Check is an instrument for cash payment, so the
payments more easy and fast
The period of circulation check faster than draft
Issuance of checks is more flexible and can be adjusted
to the financial situation of the issuer (publisher)
Easier to transfer the check
Check have also been developed more faster

Next
The aim with the Bilyet Digital Checks is :
The existence of a system of transactions on
the Internet, which is based on transaction
flow bilyet checks.
Transactions that use this check must be
safe.
Utilizing as much as possible cryptographic
devices that already exist in the Secure
Electric Transaction (SET) protocol, to the
draft protocol digital bilyet check this.
Digital bilyet Checks is a development of the
type of check calculations set in KUHD. The
existence of the digital bilyet checks, prove that
the checks are more developed.

Law Protection for Customer


Based on Law No. 8 of 1999 about
Consumer Protection article 1 no. 2
defines a consumer as
Everyone who using the goods and / or
services available in the community, for
the benefit of themselves, their families,
other people, and other living beings and
not for sale.

Contract Legality
Agreement in e-commerce occurs between
two parties in which one party promises the
other party to do something
This is in accordance with Article 1313 of
the Civil Code (KUHPerdata), which
stated:
An agreement is an act in which one or more
persons bind himself to one person or more

Next
Validity of agreements terms under Article 1320 of the
Civil Code :
They agree to bound themselves
Element of agreement in E-Commerce measured by
buyers
who access and approve the deals through
internet
Proficiency / Ability to make an agreement
Elements proficiency in E-Commerce is difficult to
measure, because everyone (without being limited to a
certain age) can carry out electronic transactions in
accordance with Article 2 of Law No. 11 of 2008 about
Information and Electronic Transactions ("EIT Law").
One particular thing
Goods that can be traded and can be specified by the
type.
A cause that kosher (halal)
Not contrary to law, morals, and general interest.

Digital
Signature
From law perspective, digital
signature is a safeguard from
data digital that was made with
private signature key, which is
the using depend of the public
key that become a pair with
private signature key.

Efforts to
Resolve the
Legal
Dispute

Legal institutions in Indonesia that can be used


to resolve disputes in the internet payment
transactions through the institution of
Alternative Dispute Resolution (ADR).


Thank You

S-ar putea să vă placă și