Posted: February 03, 2023 | Updated:
The SET or Secure electronic transaction protocol is a security measure implemented on eCommerce platforms to protect electronic payment data over a specific network.
eCommerce refers to buying and selling goods and services over the Internet, and the SET protocol is crucial for ensuring a safe and secure online transaction environment for all parties involved.
But what is a secure electronic transaction protocol exactly? The following section explains the SET protocol’s function in protecting electronic payment data.
SET is a protocol that ensures the security and integrity of online transactions. Initially adopted by e-commerce websites, SET was designed to secure electronic payments surrounding debit and credit cards.
Furthermore, merchants cannot view personal details transferred to your credit company for verification and authentication. SET isn’t a gateway or payment system. Still, it is a set of protocols that utilize Public Key Infrastructure (PKI) elements to address privacy, authenticity, and security concerns in e-commerce.
Its primary goal is to protect online debit or credit card transactions, offering a secure and confidential environment for all parties involved, including customers and merchants.
SET also authenticates users through digital certificates. The rise of e-commerce sparked its development and was jointly designed by Visa and Mastercard to secure browsers for transactions.
The protocol was later supported by various organizations, including technology firms such as Microsoft and IBM and companies such as Verisign, specializing in internet services and network infrastructure.
Additionally, web services firm Netscape played a role in SET’s development, with Microsoft providing the STT and Netscape contributing to the SSL technology.

Secure Electronic Transaction (SET) protocols are designed to provide secure electronic access to funds from a bank account or credit line. Each time an electronic purchase is made, an encrypted certificate is made for the merchant, financial institution, or customer.
This certificate comes with matching digital keys used to verify the transaction and confirm the certificate’s authenticity.
SET algorithms ensure that only authorized participants with the key can confirm the transaction, providing an additional layer of security to protect customers’ card details from potentially malicious online actors.
This added security measure helps to prevent unauthorized access to sensitive information and ultimately protects the privacy and financial information of the customers.
SET is a system developed to provide secure and confidential transactions for all parties involved in the e-commerce transaction, including the customer and merchant.
The emergence of e-commerce in the mid-1990s, particularly consumer-driven online purchases, led to the development of secure electronic transaction protocols.
As conducting business on the Internet was a relatively new concept, the security measures used to protect transactions were still evolving and had varying levels of effectiveness.
The protocols established by SET standards enabled payment systems to be utilized by financial institutions and retailers, as they had the necessary software to process and decrypt digital transactions securely.
In 1996, a group comprising VISA and Mastercard, IBM, GTE, Microsoft, Netscape, RSA, Terisa Systems, and VeriSign aimed to merge incompatible protocols into one standard.
Subsequently, other security protocols for online credit and debit card transactions emerged. As an early advocate of SET, Visa eventually adopted a new protocol called 3-D Secure for secure digital payments and commerce of its customers.
Based on extensible markup language (XML), this protocol is designed to provide a security layer for online debit and credit card transactions.
The SET protocol was created to address the security gaps in SSL and Transport Layer Security (TLS) in protecting sensitive consumer data.
It achieves this by utilizing 56-bit session long keys, which are transmitted asymmetrically, as well as symmetric Data Encryption Standard (DES) encryption and Public Key Infrastructure (PKI) for key management.
When a customer enters a password to activate their digital wallet, SET initiates self-authentication before the payment.
After self-authentication, the customer’s device (mobile phone, tablet, or computer) sends the purchase and payment details to the merchant. Once the customer is authenticated and the merchant is notified, the issuer communicates payment authorization to the acquirer.
SET employs digital signatures to achieve card authentication. Each time a customer initiates an electronic transaction, an encrypted digital signature is generated for the merchant, customer, and associated financial institutions.
By manipulating transactional information, digital certificates authenticate the customer and merchant’s identities to reduce the risk of fraud.
Typically, the Certificate Authority (CA) assigns digital certificates to the card issuer or other associated financial institution, meaning both the acquirer and the issuer implement digital certificates.
The Secure Electronic Transactions (SET) Protocol offers a framework designed to ensure secure and reliable transactions, which is particularly beneficial in online shopping and payments. Here are some of the key benefits of adopting the SET Protocol:
Secure Electronic Transactions Protocol provides a comprehensive solution to secure online payments. A secured online payment system increases trust and confidence among consumers and merchants while mitigating risks associated with online transactions.

Secure Electronic Transactions (SET) protocol is designed to secure electronic debit and credit card payments made on e-commerce websites.
Developed in the mid-1990s in response to the rise of e-commerce, SET uses digital certificates, encryption, and Public Key Infrastructure (PKI) to provide a secure and confidential environment for all parties involved, including customers and merchants.
SET’s main objective is to protect credit/debit card transactions as they occur online, preventing unauthorized access to sensitive information and ultimately protecting customers’ privacy and financial information.
The SET protocol filled the gap left by SSL and Transport Layer Security (TLS) regarding the security of sensitive consumer data. SET’s digital wallet, dual signatures, and digital certificates all work together to achieve card authentication and reduce the risk of fraud. E-commerce websites initially adopted SET, but other security protocols later emerged.