Security
      Security is an issue that comes up most every time 
      people discuss commercial transactions on the Internet. This is a serious 
      topic for which VIPsports has taken a serious approach. 
      We have taken into consideration a wide variety of potential areas of 
      concern and implemented the newest and most effective technologies to 
      combat those who would slow the growth of the world’s fastest growing 
      medium of media and commerce. We are confident that, through the use 
      multiple levels of encryption and account verification, the Members of our 
      service will experience seamless, safe Internet communication with our 
      wagering software. 
VIPsports has adopted the following security creed as the basis for 
      system development and account activity management: "Never 
      underestimate the time, expense and effort a hacker will expend to break 
      our code and infiltrate our system." Although VIPsports is confident 
      in the security built into the design of our system, VIPsports will 
      continue as an ongoing activity to evaluate system security as Internet 
      security technologies and, unfortunately, code-breaking or hacking 
      techniques continue to develop. 
VIPsports is aware that security attacks on our Web site are 
      inevitable, and will use the following cryptographic technologies as a 
      means to prevent any breakthroughs: 
 
 
The SSL protocol operates "lower down" between the application level 
      and the transport (TCP/IP) layer. This strategy allows SSL to encrypt the 
      data stream itself, thereby establishing a secure transmission channel for 
      any Internet application, independent of protocol. SSL and S-HTTP are not, 
      however, mutually exclusive. Because they operate on different levels, the 
      protocols could be layered to double-encrypt the data.  
In addition to a secure data pipe, SSL includes provisions to 
      authenticate the identity of each VIPsports server session and the 
      VIPsports member using RSA’s system of digital signatures. SSL also 
      attaches an encrypted ID to each secure session. This ID, which is cached 
      by both parties, allows an VIPsports member and the VIPsports server that 
      previously established an SSL connection to reestablish a secure channel 
      without repeating the entire handshaking process.  
The VIPsports SSL handshake has been designed to make its security 
      services as transparent as possible to VIPsports members. Typically, 
      VIPsports members will click a link or a button on a page that connects to 
      the VIPsports SSL-capable server. The VIPsports SSL Web server will accept 
      SSL connection requests on a different port (port 443 by default) than 
      standard HTTP requests (port 80 by default). When the VIPsports Web 
      browser member connects to this port, it initiates a handshake that 
      establishes the SSL session. After the handshake finishes, communication 
      between the VIPsports SSL-enabled Web server and VIPsports member’s 
      browser is encrypted and message integrity checks are performed until the 
      SSL session expires. The VIPsports SSL handshake creates a session during 
      which the handshake needs to happen only once.  
The following high-level events take place during the VIPsports SSL 
      handshake:  
The VIPsports member’s Web browser and the VIPsports Web server 
        exchange X.509 certificates to prove their identity. This exchange may 
        optionally include an entire certificate chain, up to some root 
        certificate. Certificates are verified by checking validity dates and 
        verifying that the certificate bears the signature of a trusted 
        certificate authority.  
The VIPsports member’s Web browser randomly generates a set of keys 
        that will be used for encryption and calculating MACs. The keys are 
        encrypted using the server’s public key and securely communicated to the 
        server. Separate keys are used for member to server and server to member 
        communications for a total of four keys.  
A message encryption algorithm (for encryption) and hash function 
        (for integrity) are negotiated. In VIPsports’ SSL implementation, the 
        member presents a list of all the algorithms it supports, and the 
        VIPsports server selects the strongest cipher available. VIPsports 
        retains the ability to turn particular ciphers on and off. 
        
SSL is an industry-standard protocol that makes substantial use of 
      public-key technology. SSL is widely deployed over the public 
      Internet in the form of SSL-capable servers and members from the leading 
      vendors including Microsoft, IBM, Spyglass, Netscape and Open Market. All 
      applications used and supported by the VIPsports Web site will incorporate 
      SSL to provide advanced security services. SSL provides three fundamental 
      security services, all of which use public-key techniques:  
Diagram 
| Service | 
Underlying 
            Technology | 
Protection 
          Against |  
| Message privacy | 
Encryption | 
Eavesdroppers |  
| Message integrity | 
Message authentication codes | 
Vandals |  
| Mutual authentication | 
X.509 certificates | 
Impostors |   
   
Microsoft is pursuing an effort to create a single standard for the 
      transfer of secure business and personal communications over insecure 
      phone lines. A central component of this effort is to develop a method of 
      authentication. Encryption and authentication go hand-in-hand in a secure 
      Internet environment. Each, though distinctly different, play an important 
      role in allowing users to pass information that is unreadable except by 
      the intended recipient and in verifying the identify of the sender. 
Authentication in a digital setting is a process whereby the receiver 
      of a digital message can be confident of the identity of the sender and/or 
      the integrity of the message. Authentication protocols are based on 
      public-key cryptosystems from RSA. In 
      public-key systems, authentication uses digital signatures, which are the 
      equivalent of handwritten signatures for printed documents. The signature 
      is an unforgeable piece of data asserting that a named person wrote or 
      otherwise agreed to the document on which the signature appears. The 
      recipient, as well as a third party, can verify both that the document did 
      indeed originate from the person who signed it and that the document has 
      not been altered since it was signed. A secure digital signature system 
      thus consists of two parts:  
- A method of signing a document so that forgery is unfeasible and 
          
 - A method of signature verification. 
   
Furthermore, secure digital signatures cannot be repudiated; that is, 
      the signer of a document cannot later disown it by claiming it was forged, 
      since each digital signature is registered with a so-called Certificate 
      Authority (CA).  
Recently, Microsoft created Transport Layer Security (TLS). This 
      specification starts with Netscape’s SSL version 3.0 and adds features 
      from Microsoft’s PCT version 2.0 based on feedback from cryptographers and 
      implementers. It is intended to provide a simpler and more robust 
      implementation than SSL or PCT, with added scalability, improved security, 
      and the additional functionality needed for wider application of the 
      specification.  
As the TLS protocol is fully developed and integrated into 
      Microsoft’s current Internet product offering, VIPsports will adhere to 
      these newer, more robust standards.  
  
In practice, both symmetric-key and public-key techniques are used in 
      popular security protocols such as SSL because symmetric-key algorithms 
      tend to be much faster than public-key algorithms. To communicate securely 
      and quickly, here is what VIPsports will do:  
- The VIPsports member generates a random number (key) that will be 
          used for actually encrypting the message being sent to VIPsports. 
          
 - The member encrypts the random number (key) with VIPsports’ public 
          key. 
          
 - VIPsports decrypts the random number with its private key. Now 
          VIPsports can encrypt and decrypt messages with a secret shared with 
          only with that particular member. 
          
 - Once a secure session has been established between VIPsports and 
          the VIPsports member, ALL information transferred between the Web 
          browser member and the VIPsports server is encrypted and secure and 
          cannot be ‘listened to’, intercepted, or altered. 
   
In reality, most security protocols are much more complicated than 
      this, but the four-step process above is illustrative of security 
      fundamentals. SSL is an excellent example of a security protocol that uses 
      these techniques to safeguard communications. 
Private-Key cryptography 
Symmetric-key or private-key cryptography uses the same key to encrypt 
      and decrypt messages and their advantage is speed. This is a familiar 
      real-world phenomenon: we use the same key to unlock and lock our car 
      doors, for instance. The problem with symmetric-key cryptography is having 
      the sender and receiver agree on a secret key without anyone else finding 
      out. The current methods for achieving this are using telephone or fax 
      machines, mailing on a floppy disk and using a courier, but all of these 
      are cumbersome, slow and error-prone techniques. In addition, the number 
      of Keys tends to be much larger than the number of nodes; that is, people 
      may have multiple keys they use for different purposes.  
A major disadvantage of private key cryptography, however, is key 
      management, since each pair of individuals who wishes to communicate must 
      have a unique shared key. For example, for VIPsports to use private key 
      encrypted communication, each VIPsports member would need a separate 
      private key to keep account data and transactions secure (using the same 
      private key with all of VIPsports’ member would allow each member to 
      access other member’s account information).  
Public-Key cryptography 
Public-key cryptography was invented to solve the problem inherent in 
      private key cryptography described above. With public-key cryptography, 
      each person gets a pair of keys, a public key and a private key. Each 
      person’s public key is published, while the private key is kept secret. 
      For example, when a member wishes to establish a secure connection to the 
      VIPsports Web site, the member encrypts the connection using VIPsports’ 
      public key. When VIPsports receives the message, VIPsports decrypts it 
      using the VIPsports private key. The member and VIPsports no longer have 
      to share secret information before secure communication is possible.  
In other words, each key actually consists of two parts: an encryption 
      half (the "public key") and a decryption half (the "private key," which 
      unlocks data encrypted with the matching public key). This fail-safe 
      system allows a more convenient key distribution method—members wishing to 
      communicate with VIPsports can use the VIPsports public key. Moreover, 
      intruders can not use an intercepted public key to decrypt files. The 
      downside is that public key cryptosystems are typically slower than 
      private ones. 
Public-key cryptosystems are based on trapdoor one-way functions. A 
      one-way function is a mathematical function that is significantly easier 
      to perform in one direction (the forward direction) than in the inverse 
      direction. One might, for example, compute the function in minutes but 
      only be able to compute the inverse in months or years. A trapdoor one-way 
      function is a one-way function where the inverse direction is easy if you 
      know a certain piece of information (the trapdoor), but is difficult 
      otherwise. The public key gives information about the particular instance 
      of the function; the private key gives information about the trapdoor. 
      Whoever knows the trapdoor can perform the function easily in both 
      directions, but anyone not knowing the trapdoor can perform the function 
      only in the forward direction. The forward direction is used for 
      encryption and signature verification; the inverse direction is used for 
      decryption and signature generation. 
In almost all public-key systems, the larger the key, the greater the 
      difference between the efforts necessary to compute the function in the 
      forward and inverse directions. For a digital signature to be secure for 
      years, for example, it is necessary to use a trapdoor one-way function 
      with inputs great enough that someone without the trapdoor would need many 
      years to compute the inverse function. Despite the improbability of 
      breaking the VIPsports algorithm, the VIPsports cryptosystem has an 
      additional layer of security which mandates that all digital keys expire 
      after one year.  
   
VIPsports utilizes certificate authentication services and Digital IDs 
      from Verisign, the 
      leading provider of digital authentication services and products for 
      electronic commerce and other forms of secure communications.  
A Digital ID binds a person's or company's identity to a digital key 
      which can be used to conduct secure communications or transactions. This 
      binding is accomplished through a strict assurance process conducted by a 
      trusted third party which also electronically signs the Digital ID so that 
      parties accepting it in a transaction have confidence in its origin. The 
      Digital ID can then be attached to electronic transactions and 
      communications as the critical authentication component.  
Verisign will verify the authenticity of each certificate request 
      (making sure requesters are who they claim to be). The approval process 
      helps protect VIPsports Members, VIPsports, and Verisign. Upon approval, 
      Verisign digitally signs the request and returns the unique digitally 
      signed certificate to VIPsports. 
    |