#SummitNow Introducing CounterSign Nathan McMinn Technical Consultant - Alfresco.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Civil Registry Agency of the Ministry of Justice, Georgia Digital Signature Services in Georgia Mikheil Kapanadze.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Nathan McMinn, Technical Consultant with Alfresco
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Cryptography, Authentication and Digital Signatures
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
Meganet Corporation VME Sign Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Digital Signatures, Message Digest and Authentication Week-9.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
Cryptography: Digital Signatures Message Digests Authentication
DIGITAL SIGNATURE.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
Digital Signatures and Digital Certificates Monil Adhikari.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lifecycle Metadata for Digital Objects October 9, 2002 Transfer / Authenticity Metadata.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Digital Disruption, Alfresco, and Digital Signatures Brian LaPointe VP Sales, Americas CoSign by ARX.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Unit 3 Section 6.4: Internet Security
Introducing CounterSign
Cryptographic Hash Function
Chapter 5: The Art of Ensuring Integrity
Instructor Materials Chapter 5: The Art of Ensuring Integrity
NET 311 Information Security
Technical Approach Chris Louden Enspier
Pre-image Resistance: Given a, hard to find b such that ____
Digital Signatures…!.
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

#SummitNow Introducing CounterSign Nathan McMinn Technical Consultant - Alfresco

#SummitNow What are Digital Signatures? “A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document” ure

#SummitNow 3 Criteria for Digital Signatures Authenticity: Guarantees that a signer is who they say that they are Conveys intent, that the document was intentionally signed for the stated reason

#SummitNow 3 Criteria for Digital Signatures Non-repudiation: Ensures that a signer cannot make a claim that their key is secure while simultaneously claiming that they did not sign a document Requires hard to forge signing artifacts

#SummitNow 3 Criteria for Digital Signatures Integrity: Verification that a document or message has not been altered since it was signed

#SummitNow How do Digital Signatures Work? 1.Create a hash of the document 2.Sign the hash with a private key 3.(Optionally) embed the signed hash in the document Digital signatures rely on asymmetric encryption to allow signing and verification

#SummitNow Signatures: Digital vs. Electronic Digital Signatures – Cryptographic signatures Electronic Signatures – A signature image, like a “wet ink” signature on a paper document

#SummitNow PDF vs. Everything Else PDF documents have separate areas for storing content and signatures. This enables a PDF document to have multiple embedded signatures that do not alter the content, and thus, the hash of the content remains consistent across signings.

#SummitNow PDF vs. Everything Else, part 2 Any type of document can be signed, but the signature is (generally) a separate artifact With a combination of the document, the signature and the public key of the purported signer, the signature can be verified

#SummitNow Project Origin and Direction

#SummitNow The Old Way The Alfresco PDF toolkit can apply signatures, but the interface is not very user friendly!

#SummitNow CounterSign Design Goals 1.Simple for non-technical users 2.Self-service (where possible) 3.Simple to administer 4.Self Contained - External PKI integration possible, but not required 5.Regulatory / Standards compliance

#SummitNow CounterSign Design Goals, API 1.Java Service API – currently sparse, but growing 2.JavaScript API 3.Signature provider interface for external PKI integration 4.Custom Actions for applying signatures, creating form fields and more

#SummitNow A Word on Standards Current CounterSign release (1.0) cannot achieve CAdES / PAdES compliance for PDF documents due to a dependency in Alfresco. Working on it!

#SummitNow Demo

#SummitNow Roadmap 4.2 compatibility CAdES / PAdES compliance Regulatory targets (FDA, etc) Refactor out iText and relicense Enhanced workflow, signing task enhancements

#SummitNow Required Reading Bruno Lowagie’s whitepaper on PDF Signatures: pdf

#SummitNow Project and Contact Info Nathan McMinn – Technical Consultant nathanmcminn.com CounterSign: