Secure Electronic Transaction (SET) was a cryptographic protocol developed in the 1990s as a standard for secure online payment transactions. SET aimed to provide a secure and standardized method for conducting electronic commerce over the internet, ensuring the confidentiality, integrity, and authentication of payment data. While SET is not widely used today, it introduced several concepts and security mechanisms that have influenced modern payment security standards. Here are key aspects of SET:
- Encryption: SET utilized encryption algorithms to protect the confidentiality of sensitive payment information, such as credit card details, during transmission. It employed symmetric and asymmetric encryption techniques to ensure secure communication between the buyer, the merchant, and the payment gateway.
- Digital Certificates: SET relied on digital certificates to authenticate the identities of participating entities involved in the payment transaction. Digital certificates were issued by trusted Certificate Authorities (CAs) and used public-key cryptography to verify the authenticity of the certificate holder.
- Dual-Key Cryptography: SET employed dual-key cryptography, also known as public-key cryptography, to provide secure communication between parties. This allowed encryption and decryption operations to be performed using separate public and private key pairs, enhancing security during data exchange.
- Payment Gateway: SET introduced the concept of a payment gateway, which acted as an intermediary between the merchant and the buyer’s bank. The payment gateway facilitated secure payment authorization, processing, and settlement of the transaction, ensuring that sensitive payment data was not directly exposed to the merchant.
- Digital Signatures: SET utilized digital signatures to provide non-repudiation, ensuring that a buyer or merchant could not deny their involvement in a transaction. Digital signatures were created using the private key of the sender and verified using the corresponding public key, establishing the integrity and authenticity of the transaction data.
- Trusted Third Parties (TTP): SET involved trusted third parties, such as Certificate Authorities and payment processors, to provide security and authentication services. These entities played a crucial role in verifying the authenticity of digital certificates and facilitating secure transactions between buyers, merchants, and banks.
While SET was designed to enhance the security of online payment transactions, it faced challenges in terms of complexity, implementation costs, and compatibility with existing payment infrastructure. As a result, the adoption of SET was limited, and it has been largely replaced by other more streamlined and widely accepted payment security standards, such as the Payment Card Industry Data Security Standard (PCI DSS) and the Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols for securing online transactions.
What is Secure Electronic Transaction (SET)?
Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet. E-commerce websites implemented this early protocol to secure electronic payments made via debit and credit cards.
SET blocks out all personal details on the card, preventing hackers and data thieves from accessing or stealing the cardholder’s information. The merchant also cannot see these personal details, which are transferred directly to the credit card company for user authentication and verification.
SET is not a payment system or gateway, but a set of security protocols. It uses some aspects of a Public Key Infrastructure (PKI) to address concerns around privacy, authenticity and security in e-commerce applications.
The primary goal of SET is to protect credit/debit card transactions as they take place online. It provides a secure and confidential transaction environment for everyone involved in the e-commerce transaction, including the customer and merchant. It also authenticates users with the help of digital certificates.
The development of SET can be traced to the emergence of e-commerce in the mid-1990s. SET was jointly designed by card companies Visa and Mastercard, with the aim of securing web browsers for card transactions. In its early days of development, SET was also supported by other organizations, including:
- technology firms like Microsoft and IBM;
- network infrastructure and internet services companies like Verisign; and
- web services company Netscape.
Microsoft provided the Secure Transaction Technology (STT) for SET, while Netscape provided the Secure Sockets Layer (SSL) technology.
Secure Electronic Transaction and cryptography
SET was designed to fulfill the requirements for e-commerce security that were not being fulfilled by SSL and Transport Layer Security (TLS). To secure card transactions and protect purchasing information, SET uses both symmetric (Data Encryption Standard or DES) and asymmetric (PKI) cryptography.
For key management, it uses PKI to reliably distribute public keys between participants.
SET uses 56-bit session keys which are transmitted asymmetrically. The remainder of the card transaction uses symmetric DES encryption. SET uses long keys for both kinds of encryption.
Secure Electronic Transaction and digital signatures
In SET, authentication and nonrepudiation are achieved through digital signatures so the parties in the transaction cannot deny that the transaction occurred. Every time a customer initiates an electronic purchase, an encrypted digital certificate is generated for the transaction’s participants. This includes the customer, merchant and financial institution.
Matching digital keys are also generated, so participants can confirm the certificates of the other party and verify the transaction.
Using a hashing algorithm, SET signs electronic transactions using the sender’s private key. This produces a series of values (message digest) that “sign” a message. The transaction’s authenticity can be verified by comparing the transaction message and message digest with the sender’s public key.
The algorithms used in SET ensure that only the party with the corresponding digital key can confirm the transaction, no one else.

Security architecture of Secure Electronic Transaction
The SET architecture (designed to support PKI) comprises:
Digital certificates
Digital signatures authenticate the merchant’s and customer’s identities to mitigate the risk of a malicious third party manipulating transaction information. The Certificate Authority (CA) issues digital certificates to the issuing bank. The card issuer and acquirer, which may be a bank or other financial institution, both play an important role in issuing digital certificates.
Dual signatures
In the SET scheme, the customer’s order information and payment information are encrypted with separate public keys. The order information is encrypted with the merchant’s public keys, and the payment information is encrypted with the acquiring bank’s public keys.
This system ensures that the encrypted PI can only be decrypted by the acquiring bank, and the encrypted OI can only be decrypted by the merchant.

Digital wallet
SET enforces customer self-authentication by entering a password that activates their digital wallet. This happens before they initiate a payment transaction. Following the authentication, the customer’s device (PC, phone, etc.) sends their order and payment information to the merchant. When the cardholder is authenticated, the issuing bank provides payment authorization to the acquiring bank, which then informs the merchant.
Secure Electronic Transaction participants
A number of participants are involved in the SET process:
- Cardholder/customer: The authorized holder of the payment card (Visa or Mastercard)
- E-commerce merchant: The seller
- Card issuer: A financial organization (e.g., bank) that issues the payment card
- Acquirer: A financial organization that processes payment authorization and facilitates electronic funds transfer to the merchant’s account
- Payment gateway: Interface between card payment networks and secure electronic transactions
- Certificate Authority: Trusted organization that provides public key digital certificates
The drawbacks of Secure Electronic Transaction
When SET was first introduced in 1996 by the SET consortium (Visa, Mastercard, Microsoft, Verisign, etc.), it was expected to be widely adopted within the next few years. Industry experts also predicted that it would quickly become the key enabler of global ecommerce. However, this didn’t quite happen due to some serious shortcomings in the protocol.
The security properties of SET are superior to SSL and the newer TLS, particularly in their ability to prevent e-commerce fraud. However, the biggest drawback of SET is its complexity. SET requires both customers and merchants to install special software — card readers and digital wallets — meaning that transaction participants had to complete more tasks to implement SET. This complexity also slowed down the speed of e-commerce transactions. SSL and TLS do not have such problems.
The overhead involved in PKI and the initialization and registration processes also stalled the widespread adoption of SET. Interoperability among SET products — e.g., certificate translations and interpretations among trusted third parties with different certificate policies — was also a significant problem with SET, which also was challenged by poor usability and the vulnerability of PKI.
The decline of Secure Electronic Transaction
Despite enthusiastic support for SET in the early days, support for the protocol has waned over time. Other security standards have emerged for online debit and credit card transactions for e-commerce.
Visa and other card providers including Mastercard and American Express eventually adopted the 3-D Secure framework for securing customers’ digital payments. This XML-based protocol is designed to provide additional security for online credit/debit card transactions.