THE INTERNET: WEBOLUTIONARY TECHNOLOGY
July-September 1997
TI Technical Journal

EDI and the Internet

Brett Batson

Abstract: A project with Avex Electronics demonstrates that cost savings of several orders of magnitude can be realized when using EDI over the Internet, compared to yearly VAN costs. The EDI Internet program needs several trading partners before the cost of the Templar™ SX software/maintenance is effective. However, cost is not necessarily the prime factor for using the Internet, according to Thomas St. Peter, TI’s worldwide EDI program manager. Rather, use of the Internet allows TI to broaden its markets both vertically and horizontally.

The Templar SX product uses existing standards such as RSA cryptography, X509 key certificates, ISO 9735 EDI standards and MIME/EDI (RFC 1767) to address these issues. What follows is an example of the process involved in a trading partner sending an EDI order interchange to TI over the Internet and an acknowledgment returned by TI to the trading partner.


Electronic data interchange (EDI) offers exchange of business data directly between the computers of one or more trading companies. TI has been a leading light in the EDI industry since its inception for internal use more than 20 years ago. EDI is a “paperless” method of transferring such data as orders, forecasts, invoices and order responses. Some advantages are the elimination of data reentry with the consequent risks of copying errors; process speed also is improved. So, cost reductions can be realized.

EDI’s success relies on the use of standardized formats that are recognized by the trading partners in an EDI relationship. Until mid-1996 the data was sent to and received by mainly third-party or value-added networks (VANs) for handling communications and mailboxes (Figure 1). The VANs use a traditional-store-and-forward concept of handling data. Rental fees are charged for use of an electronic mailbox to hold the data. Additional costs are levied for every message sent and retrieved from that mailbox, measured on a volume basis (i.e., the more data you deal with the more you pay).

As the Internet matures as an alternative communications method, things are beginning to change. VAN connections for many trading partners are much slower than their Internet connections. One partner recently reported taking nearly two days to download approximately 3.5 MB of price catalogue data!

Imagine tripling your EDI volume, increasing your transmission speed 150 times, sending EDI documents over the same high speed digital network as your e-mail or binary files, having universal access to millions of potential customers and trading partners—and paying a fraction of your current costs for transmission.”

If you read the previous paragraph you might be forgiven for taking those claims with a pinch of salt. The quotation comes from the Premenos web page regarding its Templar™ Secure Exchange (Templar SX) product for doing EDI over the Internet. The Templar SX product matches TI’s strategy to pursue an Internet solution, so TI obtained a license and tested the claims. This came to fruition in mid-1996 when a pilot system with Avex Electronics in the United States went live. Apart from minor teething problems and an issue with transfer of data between TI’s mainframe, (where the applications and EDI translation software reside) and the Templar SX product on a UNIX™ platform, the project has been very successful. Indeed, no errors in the process have been reported between September 1996 and the time of writing this article (April 1997) and this is with a flow of some 1300 documents a month. Based on this, U.S. EDI Operations has targeted six more trading partners to join the program this year.

European EDI Operations based in Sunbury in the U.K. has obtained the “buy-in” of two large corporations and have had discussions with several others. Interest is very high. Because of U.S. government restrictions on levels of encryption, TI has purchased a second copy of the Templar SX license for international use outside the United States.


Figure 1. Electronic data interchange

The project with Avex has demonstrated that cost savings of several orders of magnitude can be realized when compared to yearly VAN costs. The EDI Internet program needs several trading partners before the cost of the Templar SX software/maintenance is offset. However, cost is not necessarily the prime factor for using the Internet, according to Thomas St. Peter, TI’s World Wide EDI program manager. Rather, use of the Internet allows TI to broaden its markets both vertically and horizontally.

TI can broaden its markets horizontally because of the potential to reach small-and medium-sized enterprises that do not have nor want complex EDI/VAN, but who have Internet connections, experience and a level of comfort in using it. TI can broaden its markets vertically because once the Internet connection is established there is a base to extend TI’s presence. Design engineers, for example, would have the potential to exchange technical drawings. The impressive response times to date become crucial when one considers the businesses that are looking to “just-in-time” manufacturing concepts. For many semiconductor devices one is now seeing six-month product life cycles where only five years ago it was closer to two years. The ease and speed of setup of a communication link with a trading partner lends support to this move.

Inevitably with the use of relatively new EDI technology problems and issues have arisen and are being addressed. These center around the following areas:

Confidentiality How can we ensure that only the sender and the intended recipient can read the message?
Authentication How can the recipient know that the data is from the originator?
Integrity How can the recipient know that the contents of the data have not been changed.
Nonrepudiation
of origin
The sender cannot deny having sent the data and the content of that data.
Nonrepudiation
of receipt
The recipient cannot deny having received the data or the content of that data.

The Templar SX product makes use of existing standards such as RSA cryptography, X.509 key certificates, ISO 9735 EDI standards and MIME/EDI (RFC 1767) to address these issues. What follows is an example of the process involved in a trading partner sending an EDI ORDERS interchange to TI over the Internet and an acknowledgment returned by TI to the trading partner.

EDI over the Internet model (Figure 2)

Trading partner steps
  1. The EDI translation software translates the input from the application to generate a standard ANSI or EDIFACT message. This is passed to the Templar SX software.
  2. Templar SX performs a mathematical computation to produce a “message digest” (MD5). This message digest is a mathematical summary of the data used in its calculation and is a fixed-length, 128-byte, character string that is almost impossible to derive, given only the digest.
  3. Templar SX encrypts the message digest from step 2 with the trading partners private RSA key. This is known as the trading partner’s digital signature.
  4. Templar SX encloses the encrypted EDI interchange, message digest and the digital signature in a PKCS#7 envelope and sends the data as a MIME message. Part of the MIME standard involves chopping up the data if necessary into packet-sized pieces that can be sent as e-mail. Packets are reassembled at the receiving end.


Figure 2. Internet EDI advantage

Texas Instruments steps (Figure 3)

  1. Templar SX decrypts the MIME message with TI’s private key and then computes its own message digest.
  2. Templar SX uses the trading partner’s public key to decrypt the digital signature contained within the PKCS#7 envelope.
  3. Templar SX compares the values of the message digest revealed from step 2 with the one it computed in step 1. If they are identical then TI is sure that the data has not been tampered with or altered and that the data came from the originator.
  4. Templar SX now generates a secure authentication and acknowledgment message (AUTACK) containing several pieces of information such as the message digest of the interchange, the interchange control number, several time stamps and TI’s digital signature.
  5. The AUTACK is then sent to the trading partner as a MIME message.
  6. The data at TI is then sent via bulk data transfer from the UNIX platform where Templar SX resides to the mainframe, for EDI translation and then passed to the relevant application.


Figure 3. Internet EDI advantage

Trading partner steps

  1. Templar SX deciphers the digital signature within the AUTACK using TI’s RSA public key then looks to match the interchange control number, also within the AUTACK, to an interchange that has been sent.
  2. Now that the right interchange has been found, Templar SX compares the tracking information contained in the AUTACK and the message digest with the original tracking information. If they match then:
    • The EDI interchange is known to both the trading partner and TI.
    • The authenticity and integrity of the data is assured.
    • TI as the intended recipient actually received the EDI interchange.

Templar Secure Exchange applications

The Templar SX software is divided into four applications: Trading partner profiles, Trading partner agree-ments, Key management and Tracking.

Trading partner profiles. This application is used to create and maintain profiles and to bind a key to a profile. The profile contains several pieces of information to allow Templar SX to identify a trading partner and to process an EDI interchange. Also, the public key of a particular trading partner is linked or bound to that partner’s profile, allowing encryption, authentication and nonrepudiation security features to be used.

Trading partner agreements. This application is used to create, view and maintain agreements. Those set up at TI and on the trading partner’s Templar SX must match. The agreement includes the send and receive policies where a number of parameters can be set. For instance, retransmission options can be set if an acknowledgment of data sent is not received within a given period. This could be automatic retransmission or simply e-mail notification to an operations group. Security features also can be set, including those to apply to outgoing data and those to expect on incoming data. For outgoing data there also are several transport options that can be selected. These include e-mail (the method chosen by TI), TCP direct to a trading partner’s Templar SX system, via a web interface to send data to a trading partner’s Internet web server, or via a file interface where data is saved to a file and sent to the trading partner by an agreed route.

Key management. This application is used to create local keys, accept remote keys and maintain existing keys. TI and each trading partner need a key pair (public and private) to use Templar SX’s security features. An option within this application is to allow the public keys to be sent via e-mail to the various trading partners.

Tracking. This application is used to track the status of both inbound and outbound events. This can be on two levels. The first is high-level information about the transmission and whether more than one EDI interchange has been sent or received. The second can show details of each EDI interchange, including whether the transmission was successful, date and volume information, e-mail addresses and security information. Within this application, transmissions can be set up for reprocessing and retransmitting after errors have been found.

Summary

The use of Templar SX has allowed TI to be one of the first companies to explore the potential of batch EDI over the Internet. Security, authentication and nonrepudiation issues have been addressed and the use by Templar SX of standards, where these currently exist, will allow for compatibility with new products as they come onto the market. Savings in terms of speed and cost have been achieved, which helps bring about benefits to TI and its trading partners. Reliability and robustness also have been seen. A question sometimes raised over using the Internet in Europe for electronic trading is that it is less mature and reliable compared with North America. Only time will tell if this is still a valid argument as pilot programs begin with TI’s European trading partners.

The move to use the Internet to carry out trade electronically using EDI is exciting. The Internet links also will be used to send other types of data such as technical drawings. FTP can be used to push data to clients, especially bulk data such as customized product price catalogues for distributors and product inventory reports. As issues such as security and authenticity become more understood and the software providing the necessary facilities to overcome these concerns becomes more prevalent, then we will see even greater use of the Internet and TI will continue to be at the forefront.

Glossary

Single-key cryptography—also known as symmetric-key cryptography. This is where both trading partners possess a single key to encrypt and decrypt the data.

Public /private key cryptography—also known as asymmetric-key cryptography. This is where each trading partner generates a pair of keys, one of which is public and the other private. Both partners exchange their public keys. Data is encrypted by the sender using the receiver’s public key. Once received the receiver then uses his private key to decrypt the data.

DES—this is a single-key system for fast encryption of large volumes of data. The U.S. government regulates this, which means this is only for use within the United States. For international trade outside the U.S., RC2 and RC4 are used.

RC2 and RC4—these are single-key systems that can be used instead of DES when one or both trading partners operate outside the U.S. Again because of U.S. government regulations, the key sizes used for the encryption and decryption differ for use within or outside the United States.

RSA—this is a public/private key system. Templar SX uses this to add a further level of encryption/decryption and to provide digital signatures. Key sizes that may be used are again different for use within and outside the United States.

MIME—multipurpose Internet mail extensions is a standard for formatting messages.

PKCS#7—This is the public-key cryptography standard and supports DES, RC2, RC4, RSA algorithms for encryption, decryption and authentication. It also supports message digest (MD5) algorithms for data integrity and the ANSI X.509 standard format for digital certificates.

Useful addresses

Premenos Corporation—http://www.premenos.com

Templar SX Demo— http://www.templar.net/cgi-bin/demo.tcl

TI Semiconductor EDI— http://www.ti.com/sc/docs/schome.htm

Internet Engineering Task Force Internet EDI Draft— http://www.imc.org/draft-ietf-ediint-req

EDIFICE—http://www.edifice.org

Trade Facilitation Information Exchange— http://www.unece.org/trade/facil/tf_home.htm

Trademarks
Templar SX is a trademark of the Premenos Corporation.

Brett Batson
Brett Batson works as part of the European EDI Support Group based in Sunbury in the United Kingdom. One of his main assignments is to establish the “EDI Over the Internet” program with TI’s semiconductor trading partners in Europe. He also represents TI within the EEMA (European Electronic Messaging Association). Prior to joining TI in November 1995 Brett worked for 10 years for a major drinks manufacturer in the United Kingdom involved with MVS mainframe systems programming and technical support. He has a joint honors degree from London University.