ERS to XML Introduction to ERS syntax in XML format

Slides:



Advertisements
Similar presentations
ISO DSDL ISO – Document Schema Definition Languages (DSDL) Martin Bryan Convenor, JTC1/SC18 WG1.
Advertisements

MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Archive Time-Stamps-Syntax Dr. Ulrich Pordesch
Diameter End-to-End Security: Keyed Message Digests, Digital Signatures, and Encryption draft-korhonen-dime-e2e-security-00 Jouni Korhonen, Hannes Tschofenig.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
IODEF Design principles and IODEF Data Model Overview IODEF Data Model and XML DTD pre-draft Version 0.03 TERENA IODEF WG Yuri Demchenko.
XML Signature Prabath Siriwardena Director, Security Architecture.
1 CIS336 Website design, implementation and management (also Semester 2 of CIS219, CIS221 and IT226) Lecture 6 XSLT (Based on Møller and Schwartzbach,
Dynamic Symmetric Key Provisioning Protocol (DSKPP) Mingliang Pei Salah Machani IETF68 KeyProv WG Prague.
IETF - LTANS, March 2004P. Sylvester, Edelweb & A. Jerman Blazic, SETCCE Introduction The following slides were prepared as a result of analysis and discussion.
Incident Object Description and Exchange Format
Evidence Record Syntax <draft-ietf-ltans-ers-00.txt>
Accessing Data Using XML CHAPTER NINE Matakuliah: T0063 – Pemrograman Visual Tahun: 2009.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
XML Evidence Record Syntax
draft-urien-tls-psk-emv-01
LTANS service and protocol Carl Wallace (on behalf of Peter Sylvester) 6 Aug 2004, 60th IETF, San Diego.
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
LTANS WG: ERS November 7, 2005 Tobias Gondrom. LTANS WG (ltans): ERS Draft straightened up Corrected ERS (feedback from Peter and Carl) Prepared for WG.
Working with XML. Markup Languages Text-based languages based on SGML Text-based languages based on SGML SGML = Standard Generalized Markup Language SGML.
Lecture 23 XQuery 1.0 and XPath 2.0 Data Model. 2 Example 31.7 – User-Defined Function Function to return staff at a given branch. DEFINE FUNCTION staffAtBranch($bNo)
Long-term Archive Service Requirements November 9, 2004.
KeyProv PSKC Specification Philip Hoyer Mingliang Pei Salah Machani 74 nd IETF meeting, San Francisco Nov
Keyprov PSKC spec Philip Hoyer 71-st IETF, Philadelphia.
Portable Symmetric Key Container (PSKC) Mingliang Pei Philip Hoyer Dec. 3, th IETF, Vancouver.
Keyprov PSKC spec Philip Hoyer 71-st IETF, Philadelphia.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
CHAPTER NINE Accessing Data Using XML. McGraw Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved Introduction The eXtensible.
CDNI URI Signing (draft-leung-cdni-uri-signing-01) CDNI Working Group IETF 85 Atlanta, Georgia November 8, 2012 Kent Leung
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
Lecture 1 Data Structures Aamir Zia. Introduction Course outline Rules and regulations Course contents Good Programming Practices Data Types and Data.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
SCVP 18 Tim Polk. Mea Culpa ● Draft -19 omits some promised changes from the March IETF meeting – Document management problems compounded by ID submission.
Message Authentication Code
OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.
VNF Package CSAR Format Tal Halfon, Amdocs Andrei Kojukhov, PhD, Amdocs Aug 3, 2017.
VNF Package CSAR Format Tal Halfon, Amdocs Andrei Kojukhov, PhD, Amdocs Aug 3, 2017.
Authenticated Identity
VNF Package Integrity and Authenticity – Public key based
The ITU-T X.500 series and X.509 in a changing world
Denis Pinkas. Bull SA. Cryptographic Maintenance Policy IETF LTANS meeting in Paris August, 1rst , 2005 Denis Pinkas. Bull SA.
ALTO Protocol draft-ietf-alto-protocol-14
LTAP protocol presentation
Donald E. Eastlake 3rd TSIG SHA etc. Donald E. Eastlake 3rd March.
Methodology – Physical Database Design for Relational Databases
draft-ietf-geopriv-lbyr-requirements-02 status update
LTANS WG: ERS Status July 10, 2006 Tobias Gondrom.
RADEXT WG RADIUS Attribute Guidelines draft-weber-radius-attr-guidelines-01.txt Greg Weber November 8th, 2005 v1 IETF-64, Vancouver.
ECET370 Education for Service-- ecet370.com. ECET 370 Entire Course (Devry) For more course tutorials visit ECET 370 Week 1 Lab 1 ECET.
國立臺北科技大學 課程:資料庫系統 fall Chapter 18
Updating GML datasets S-100 WG TSM September 2017
A Unifying View on Instance Selection
Instance Model Structure
XCBF - XML Common Biometric Format
The Secure Sockets Layer (SSL) Protocol
IETF 100 draft-zheng-xrblock-effective-loss-index-02
Using NFFI Web Services on the tactical level: An evaluation of compression techniques 13th ICCRTS: C2 for Complex Endeavors Frank T. Johnsen.
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Frame signaling options for Security.
Lecture 24: Final Review Friday, March 10, 2006.
Assessment of quality of standards
VNF Package CSAR Format Tal Halfon, Amdocs Andrei Kojukhov, PhD, Amdocs Aug 3, 2017.
draft-ietf-dtn-bpsec-06
One-way Hash Function Network Security.
The devil is in the details
Presentation transcript:

ERS to XML Introduction to ERS syntax in XML format 68th IETF meeting, Prague, March 2007

Introduction ERS syntax ASN.1 vs XML format XML processing rules Next steps Other March 2007 68th IETF Meeting,Prague

ERS ASN.1 Syntax Overview Syntax information – container for Long term demonstration of Data integrity Data time existence Based on Time stamp / Time stamp chains Hash trees ERS ASN.1 general overview Version Digest Algorithms Algorithm Identifier, Cryptographic Information Encryption Information Archive Time Stamp Sequence → Archive Time Chain → Archive Time Stamp March 2007 68th IETF Meeting,Prague

ERS ASN.1 Syntax Overview Archive Time Stamp Digest Algorithm Attributes Reduced Hash Tree Partial Hash Tree Sequence of (ordered) octet strings Archive Time Stamp Sequence Sequence of Archive Time Stamp Chain Sequence of Archive Time Stamp March 2007 68th IETF Meeting,Prague

ERS ASN.1 Syntax overview Encryption Information Sequence of Encryption Information Type and Encryption Information Value March 2007 68th IETF Meeting,Prague

ERS in XML format Structure Version Archive Time Stamp (+Order) Digest Method used for hash / hash trees Hash Tree (optional) Content Time Stamp Complementary Data (optional) March 2007 68th IETF Meeting,Prague

ERS in XML format Digest Method → reference to digest method algorithm URI Time Stamp structure → any (RFC3161 or Entrust XML Time Stamp Schema) Complementary Data → replaces cryptographic information (in ASN.1) Hash Trees → collection of significant values of protected objects (input objects and generated evidence within archival period) March 2007 68th IETF Meeting,Prague

ERS in XML Differences Hash values (of e.g. hash trees) Pros Cons Calculated only for the objects (not of ERS XML structures which hold those objects) When needed to bind many objects with single significant value → hash values of objects are sorted, concatenated and hashed Pros Hashes of protected items do not depend on specific ERS-XML structures, used to hold them Cons Not in the line with ERS-ASN.1 draft, where for the purpose of renewal hashes are calculated from the specifically formatted objects (order etc.) March 2007 68th IETF Meeting,Prague

ERS in XML Differences Simplified structure Pros Cons No structure for Sequences and Chains → only ordered sequence of Archive Time-stamps (ATS) Pros Simplified processing rules for generation and verification Cons Not in the line with ERS-ASN1 draft, where a first ATS in a chain holds ATS, created by the complex renewal process and others created by simple renewal process; March 2007 68th IETF Meeting,Prague

ERS in XML format Next steps Confirm general structure and procedures New version ready as of May 2007 Implementations and cross evaluation March 2007 68th IETF Meeting,Prague

General information Prepared by Aleksej Jerman Blazic Svetlana Saljic Tobias Gordon March 2007 68th IETF Meeting,Prague