6.4. SET Performance

The performance of servers that implement the SET protocol is largely determined by the number of cryptographic operations used to implement the message flow described in the previous subsection.

Table 6.1 shows a summary of the number of basic cryptographic operations, i.e., public and private RSA, SHA-1, and DES operations, needed to execute the encryption operations used by SET. The number 4 in the verify certificate line comes from the number of certificates to be verified in the four-level CA hierarchy.

Table 6.2 shows the number of SET cryptographic operations executed by the e-wallet, the merchant's POS software, and the payment gateway to execute the flow of messages for payment authorization described in Section ...

Get Scaling for E-Business now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.