Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

As the play unfolds, the diner is coming to an end:

DINER: L’addition, s’il vous plait!

WAITER: May I have your credit card?

The diner cardholder presents her card to the waiter who has the point-of-sale terminal in hand. The waiter inserts the card into the terminal. The terminal authenticates the identity of the chip card and the chip card authenticates the identity of the terminal as well. After all, “Don’t talk to strangers” holds for cards and terminals just as it does for people. So, once the two devices have established a sufficient level of trust to continue, they do. In the course of the authentication operations, the credit card and terminal may have agreed upon the necessary keys to establish a private, trusted channel between the two, because even though the credit card is inserted into the terminal, it’s still possible that someone is eavesdropping on the conversation. Hence, this constitutes one of the threats (plot twists) in this story. So, assuming that the communication channel is private, the terminal now asks for the account number of the cardholder that is stored on the card. This account number is then validated by the point-of-sale terminal. An amount to be charged to this number is displayed on the screen of the point-of-sale terminal.

WAITER: Would you mind entering your personal identification number in the terminal?

Now, the cardholder is asked to enter her Personal Identification Number (PIN) into the terminal. A point-of-sale terminal is certified, by the vendor that provides it, to guarantee secure personal identification number entry. If the correct personal identification number is entered, then an authorization operation is conveyed from the card to the terminal indicating that the cardholder allows the amount indicated on the point-of-sale terminal screen to be charged to the indicated account number. Because of the certification processes that the credit card and the terminal went through before being commissioned, the cardholder cannot repudiate the transaction, which means that it bears legal and fiduciary value. Once this is done, a receipt is printed by the terminal that can be given to the cardholder for confirmation of the transaction.

WAITER: Here is your receipt, and here is your card.

DINER: Thank you.

So, all in all this comprises a rather standard script. It is followed by a myriad of terminals acting on behalf of a plethora of restaurants around the world dealing with a multitude of diners using credit cards with embedded secure cores. So, what are some of the twists to the plot, the threats that the card and terminal are wary of?

Well, within the context of a script like this, the most common threats are the fraudulent expression of identity on the part of the terminal, the card or the cardholder. Depending on which of these identities is actually counterfeited, the end result can be a problem for any of the parties involved. For that reason, several layers of security measures are present, each presenting an answer to a possible attack. For example, the card will refuse to divulge information to the terminal before it has obtained from it proper credentials of the kind we discussed earlier when we presented private and public key infrastructures. Reciprocally, a terminal will refuse to communicate with a card that itself does not present proper credentials. Therefore, any threat that the card is not an accredited card, or that the terminal is fraudulent, is eliminated as far as transmission of information between the two is concerned. As this information is needed for the bank to provide credit, the threat of an improper financial transaction is covered. However, the next level of threat is if the credit card and the restaurant terminal are both genuine, but the credit card doesn’t actually belong to the diner. The mechanism to guard against that is the personal identification number, working on the assumption that if the card has been found or stolen, it is unlikely that the fraudster also obtained the access personal identification number. Therefore, the terminal asks for the personal identification number of the card before effectuating the transaction

 

11 Revelation

395

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)