“Implementation of Fair Exchange Protocol”

 In an e-commerce environment. This problem has motivated researchers to propose fair-exchange protocols based on using an on-line trusted third party. ii. We have implemented a fair exchange protocol which ensures:  i. the merchant and the customer are unlikely to trust each other. Not requiring manual dispute resolution in case of unfair behavior by any party . Fair exchange.

   The customer The merchant & The Trusted Third Party (Administrator) Customer Merchant Administrator .

. Every party involved in the transaction has to generate their keysPublic Key Private Key    Keys will be generated using the tools that can be downloaded from the web-site.

.  Then he uploads the image to the site and also provides the encrypted product key to the admin.  The merchant hides the encrypted product in an image.  Admin keeps this product key to give it to the customer in case of any dispute. The Merchant encrypts his product with the Advanced Encryption Standard(AES) Encryption tool provided by the site.

 After verification of the product the admin makes the product available for downloading. Uploads product Merchant Makes available for downloading Administrator Website Verifies product . The administrator then verifies the product.

 Downloads product Customer Website .  A series of messages are exchanged between the customer and the merchant. After downloading he gets a Transaction Number.The fair exchange protocol begins when the customer downloads the product.

PO the public key of C Transaction number Customer {Purchase order Public Key & Transaction No.} Merchant .    Customer (C) initiates the e-commerce transaction by sending Merchant(M) three things: a purchase order.

Encrypted a/c info & his public key Merchant Customer . If M is not satisfied. M sends abort msg Else M sends.  M after receiving Message 1 checks if the purchase order is to his satisfaction. If not satisfied. If M is happy with the purchase order and wants to continue with the protocol he sends the following things to C:   Encrypted account information & Merchant’s public key. he sends an abort message to C and aborts the transaction.

   After receiving Message 2 from M. C aborts the transaction. Merchant . If C has received the encrypted account information then he prepares a payment token for the specified account number and send it to merchant. C aborts the transaction. If it is an abort. Customer Prepares & sends payment token for specified a/c no. C checks to see if it is an abort message or the encrypted account information. If it is an abort.

Sends product key Else sends abort message Merchant Customer . If merchant’s account is successfully credited he sends the product key else he sends an abort message.

 The only possible fraud is from the merchant’s side & that is. The customer cannot cheat as he wont be getting the product key until the merchant’s account gets credited successfully. he gets the payment from the customer and he refuses to send him the product key. .

if so then the admin sends the product key to the customer. Now the trusted third party comes into picture.  He then sees the messages that were sent during the transaction and checks whether the customer is been cheated.  The administrator acts as the TTP. .

   . Automation of certain tasks is possible. This protocol can be used in the ecommerce extensively to provide fair transaction. The various possible enhancements of our project areThe number of messages exchanged per transaction can be reduced.

9:70 %0.90/ 18490390.8090790.38..79.0.089.90708039/:73 9097.98.:894207 .42083945.0.943.909490.3/.49097:890/97/5.:894207 8-003.947../23897./23803/890 574/:.890%%! 09038008902088.

943 < < < .020398414:75740.3-070/:..38.3-0:80/3900..94341.8885488-0 %857494.797..42207...30/507 97.0/ :942.< %0.3.9 ./01.38..943.39.74:85488-003.4.079.094574.70 %03:2-07412088.080.0 09038.

Sign up to vote on this title
UsefulNot useful