Modernizing Payment Security: Ready, SET, Go

Imagine you’re making an online purchase. Your cart is full, your items are ready, and you click “Checkout.” A prompt appears that reads:

“Please provide all the information we need to withdraw money from your bank account and make payments on your behalf whenever we want. You can trust us.”

Most of us would hesitate—and rightly so.

Now imagine a second, more familiar prompt:

  • Credit Card Number

  • Account Holder Name

  • Expiration Date

  • CVV

  • Billing Address

Most people would enter this information without a second thought. But functionally, these two prompts are almost identical. In both cases, you’re giving the merchant everything they need to charge you whenever they want, and you’re trusting them to handle that information responsibly.

From a security perspective, this is far from ideal.

In-Person Payments vs. Online Payments

Payments completed in person may have the benefit of leveraging cryptographic chips built into the payment card to enhance security (at least for modern cards). This is often referred to as EMV or Chip-and-PIN

It’s important to note that the Chip-and-PIN method isn’t widely used in all places. Some countries, such as the United States, seem to prefer Chip-and-Signature. The Garantir team has its own opinions on the reduced security offered by Chip-and-Signature rather than Chip-and-PIN, the value of hand signatures in general, and other related topics, but we will save those for another post. In this post, we will focus on online payments, sometimes referred to as Card Not Present (CNP) transactions, as they make up a large portion of the total amount of payments made today.

While there have been attempts to make Chip-and-PIN available for CNP transactions— mainly by making chip readers available on end-user’s devices— these attempts have failed to garner widespread adoption. As a result, users have been left entering their financial information into websites and mobile applications. Due to the cost of getting a chip reader into every device, it is likely that Chip-and-PIN will not be a viable solution for CNP transactions for quite some time, if ever.

Preventative & Detective Security Controls

Financial institutions use several layers of security to protect CNP transactions:

Preventative Controls

Stop fraudulent transactions before they occur.
Examples include:

  • CVV checks

  • 3-D Secure

  • Behavioral or risk scoring

Detective Controls

Identify fraud after the transaction.
Examples include:

  • Post-transaction monitoring

  • Dispute and chargeback processes

Preventative controls are obviously better, but they must balance security with the fast checkout experience customers expect.

Understanding Online Payment Flow

Here’s a simplified version of how online payments work:

  1. Customer enters financial information

  2. Merchant forwards financial data and payment amount to the processor

  3. Processor validates financial information

  4. Processor verifies available funds

  5. Processor performs threat and fraud analysis

  6. Processor notifies merchant of the result

  7. Merchant finalizes the transaction

Key observations:

  • Financial data is static and can be reused for fraudulent charges

  • The merchant handles sensitive data before the processor reviews it

  • The merchant must securely store, transmit, and protect this information—creating risk

  • Even with advanced controls like 3-D Secure or push-approval, merchants still have unnecessary access to sensitive data

This model creates multiple opportunities for fraud and misuse.

SET: A Better Way To Process Payments

Imagine a system where:

  • Sensitive financial data is never shared with the merchant

  • Merchants cannot modify the transaction amount

  • Transactions cannot be replayed

  • Anyone can verify a valid transaction

  • Invalid transactions are easily detectable

  • Verification happens in sub-second time

  • The system is compatible with existing payment infrastructure

This isn’t theoretical.
The solution already exists: Secure Electronic Transaction (SET).

SET was designed around digital signatures, which provide:

  • Transaction-specific signatures

  • Public verifiability

  • Strong resistance to forgery

  • Fast creation and verification

  • Automatic invalidation when any data changes

A key innovation of SET is the dual signature, which keeps order details and payment information separate—providing privacy while still cryptographically linking them to prevent disputes or tampering.

 

Why SET Never Took Off

SET was introduced in 1996—well before smartphones, modern browsers, and widespread cryptographic support.

Challenges included:

  • Browsers of the time lacked the cryptographic capabilities required

  • Implementing the required crypto was expensive

  • Rumors circulated about potential per-transaction fees from vendors

  • The ecosystem wasn’t technically ready

But today, with modern devices, secure enclaves, widespread TLS, and powerful browsers, these barriers no longer exist.

 

A Modern, Compatible Approach

SET can be modernized by encrypting current payment details (credit card number, CVV, etc.) and embedding them in the consumer’s certificate. Once the digital signature is verified:

  • The encrypted payment data can be extracted

  • Only the issuing bank can decrypt it

  • The transaction is processed exactly like it is today

This allows organizations to gain the security and privacy benefits of SET without replacing existing financial infrastructure.

Conclusion

Conclusion

Digital signatures have powerful applications far beyond payments. They are essential for:

  • Code signing

  • Document signing

  • SSH

  • TLS

  • S/MIME

  • And more

If you’re exploring how to strengthen digital signatures across your organization, the Garantir team can help.

GaraTrust, our flagship cryptographic platform, keeps private keys protected inside Hardware Security Modules while providing fast, proxy-based access and seamless client integrations—ensuring maximum security without slowing down operations.

Get in touch with the Garantir team to schedule a demo.

Share this post with your network.

LinkedIn
Reddit
Email