O'Reilly logo

Scaling for E-Business by Virgilio A. F. Almeida, Daniel A. Menascé

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

6.4. SET Performance

The performance of servers that implement the SET protocol is largely determined by the number of cryptographic operations used to implement the message flow described in the previous subsection.

Table 6.1 shows a summary of the number of basic cryptographic operations, i.e., public and private RSA, SHA-1, and DES operations, needed to execute the encryption operations used by SET. The number 4 in the verify certificate line comes from the number of certificates to be verified in the four-level CA hierarchy.

Table 6.2 shows the number of SET cryptographic operations executed by the e-wallet, the merchant's POS software, and the payment gateway to execute the flow of messages for payment authorization described in Section ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required