Link to home
Start Free TrialLog in
Avatar of texastwostep
texastwostep

asked on

follow-up to secure data encryption / identity theft question

If my e-commerce site is hosted on Crystal Tech, or another service, in a shared environment, where or how can data be stolen and make us liable if we are using SSL from our website to the host to transmit personal information.  How can this e-commerce site be liable if SSL is used?  Some of this personal data will be transmitted from CT to our server via email.

I am only asking so I can give the client answers--I've already gotten the approval to use Authorize.net--still trying to figure out the 'pros' and 'cons' of using Authorize.net, if our website is not even on an in-house server?

Thanks.
twostep
Avatar of bigjimbo813
bigjimbo813
Flag of United States of America image

well email sent un-ecrypted is your weak point. Use PGP or another form of email encryption for the transfer of that sensitive data.
Avatar of jhance
jhance

Remember that SSL only protects the sensitive information while it's being communicated between the client web browser and the web server.  As soon as the data reaches the web server it is decrypted and vulnerable.  To be useful, you must store or re-transmit this data again.  That's usually the weak link in security.  If you store it, the store can be hacked and the data disclosed.  If you transmit it, the transmission can be sniffed or intercepted and again the data is disclosed.

In my opinion the best scenario is to immediately re-encrypt the data upon recept by the web server before you store or re-transmit it.  Many encryption schemes are possible but I prefer to use a public/private key scheme so that the de-cryption key is NOT anywhere to be found on the web server.  The data can then only be decrypted when it reaches the point of processing the data.  These days there are two main public key encryption schemes, Diffie-Helman and RSA.  Both are now publicly available since the patents have long since expired.  Both, assuming you use a long enough encryption key an avoid the use of a "weak" or easily-guessable key are cryptographically strong in today's world.  The biggest disadvantage to either of these schemes is the compute intensive encryption/decryption process.  This can make the processing of information slow and is one reason why PGP was developed.

The scheme used in PGP is a combination of RSA to encrypt the key and a symmetric algorithm (like DES or another) to encrypt the data itself.  This give the best of both worlds since as long as the key is safe, a symmetric algorithm (of which there are several to choose from) is strong.

For e-commerce you typically only have a small amount of data to encrypt (account numbers, name, address, etc.) and so the processing burden of RSA is not usually a big deal and so it's simpler to use it alone without having to to the whole PGP thing.

RSA and Diffie-Helman are both available on Windows platforms through the CryptoAPI.  PGP is not so you need to use a 3rd party library.  You can license it from PGP Corp. but it's quite expensive.  There are open-source implementations of PGP or PGP-like schemes out there.  The one I'm most familiar with is the GNU GPG.  See:

http://www.gnupg.org/
ASKER CERTIFIED SOLUTION
Avatar of kevinf40
kevinf40

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial