PKI: A Taxing Experience Ed Bristow Technical Manager, PKI Project Australian Taxation Office 5 December 2000 Secure Foundations.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Free data that helps you Australian Business Register.
Welcome To ITDC e-Procurement
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Electronic Filing Case Study NSW Land and Environment Court.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SAFE BioPharma Association CONFIDENTIAL1 SAFE Public Key Infrastructure (PKI) 2005 EDUCAUSE/Dartmouth PKI Deployment Summit.
PKI Implementation in the Real World
WISeWorld2000 WISeKey By Malcolm Hutchinson CEO & Cofounder WISekey.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Public Key Infrastructure Ben Sangster February 23, 2006.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Password?. Project CLASP: Common Login and Access rights across Services Plan
25 June 2001EB IMW Belfast PKI: The View from Down Under Presentation to 2001 Institutional Web Management Workshop Queen’s University Belfast Monday 25.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
Fusion5 Empower-HR – SuperStream Sandy Duncan – HCM Development Manager Christine Hudson – HCM Customer Centre Manager.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
OASIS TAX XML Technical Committee JANUARY 2004BUSINESS SEGMENTAUDIENCEDATE ATO INTERFACE STANDARDS PROJECT Christine Beasley Project Manager Australian.
MIPS, ECI and Portal bulk lodgements Transition to preferred channels UNCLASSIFIED – MIPS, ECI and Portal bulk lodgements 1.
UPDATE ON THE NATIONAL ELECTRONIC CONVEYANCING SYSTEM Simon Libbis Executive Director.
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
BUSINESS SEGMENTAUDIENCEDATE AUSTRALIAN TAXATION OFFICE - UPDATE Australian Taxation Office Update OASIS TaxXML Technical Committee September.
Internet Security for Small & Medium Business Week 6
Jaeki Song ISQS6337 JAVA Lecture 16 Other Issues in Java.
Review of HACC Service Group 2 Sub Group. Commonwealth Home Support Advisory Group Review of HACC Service Group 2 Sub Group Aged Care Gateway Presenter:
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
INFSO-RI D SOFT's exploitation plan Budapest, 23 June 2009.
Copyright  2004 McGraw-Hill Australia Pty Ltd PPTs t/a Accounting for Business – A non-accountant’s guide 2/e by Jopling, Lucas and Norton Slides prepared.
Designing an E-Government Solution Jon Colombo In collaboration with Client or Partner logo.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Aged Care Changes in 2015 Current as at 1 July 2015 Details Subject to Change 1.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
National Enrolment Service (NES) Overview October 2015 – June 2016.
© Nano Time Limited – October 2008 Source Planning What –Analytical process that for creating procurement and supply strategies for key categories Wh y.
Using Public Key Cryptography Key management and public key infrastructures.
Digital Signatures and Digital Certificates Monil Adhikari.
NSDI Strategic Plan Update National Geospatial Advisory Committee Meeting December 11, 2013.
Transforming Procurement E- GP Planning and change management Action Plan for E- GP implementation in Kenya Jerome Ochieng Public Procurement Oversight.
Presented by Australian Taxation Office Future of the ATO’s digital services Daniel Bamford Assistant Commissioner 9 September 2015 UNCLASSIFIED – Future.
TAG Presentation 18th May 2004 Paul Butler
ESign Aashutosh.
Technology Strategy Update
Road Manager Module National Heavy Vehicle Regulator
© National Core Accounting Publications
Advanced Income Tax Law
© National Core Accounting Publications
TAG Presentation 18th May 2004 Paul Butler
Tweaking the Certificate Lifecycle for the UK eScience CA
Public Key Infrastructure (PKI)
Public Key Infrastructure from the Most Trusted Name in e-Security
Road Manager Module National Heavy Vehicle Regulator
e-Invoicing – e-Ordering 20/11/2008
R&D Tax Incentive ATY Advisory.
Presentation transcript:

PKI: A Taxing Experience Ed Bristow Technical Manager, PKI Project Australian Taxation Office 5 December 2000 Secure Foundations

. Canberra Canberra

What we did Why we did it Where are we now? How did it happen Learnings Where to from here? Conclusion Presentation Outline

Business Drivers Tax Reform –Australian Business Number (ABN) –The New Tax System –GST –Business Activity Statement (BAS) Investing for Growth –Must offer services online by end 2001 –ATO keen to add to existing eServices Electronic Lodgment Service (ELS) e-tax (self-lodged returns via Internet) Australia undertook a major change to its taxation system during The Federal Government has announced strategies for increasing government transactions available online.

Context & Starting Points Gatekeeper –Sets outs standards and processes for evaluating: POI Security Technology Operations –Aims to ensure Trust Interoperability –Assist with Development of e- commerce Gatekeeper establishes a framework for PKI in Federal Govt

The ATO PKI Today Roll-out started 16 June ,871 sets of keys & certificates generated so far –Total includes those revoked (12%) and those requested by businesses unable to use them 75,587 have been collected from the PKI web server 53,000 businesses are now ‘Ready to Deal’ electronically The ATO PKI has been in production since June 2000 Australian Businesses are using a PKI enabled application to exchange information with the ATO

Key Features of the ATO PKI ATO CA operated for ATO by Certificates Australia Pty Ltd CA uses UniCERT technology RA function interfaces with ABR Keys & Certificates distributed via Internet Certificates valid for 2 years End-users get two certificates and key pairs - authentication and confidentiality End-entity keys are 1024 bit RSA, CA keys are 2048 bit RSA Predominantly NT4 platform Baltimore & ATO custom components

The ATO PKI in Action Securing and authenticating eBAS lodgments –Businesses with turnover > $20M are obliged to lodge electronically Superfund administrators lodging Surcharge and other reports –Up to 100,000 records in a file –Assessments returned to superfunds by ATO The ATO PKI is being used for the electronic commerce Interface (ECI)

Electronic Commerce Interface Fat client Interacts with server component in ATO Written in Java Swing Win 95, 98, NT Netscape 4 & IE 4 Macintosh version also available Encrypts using confidentiality key and signs using authentication key ECI and PKI Keys work together Browser required but not used for interface HTTP traffic only - firewall friendly

The PKI Project Very tight timeframe Key objectives: –Establish PKI to support Tax Reform –Get Gatekeeper accreditation by 16 June 2000 Small core team, but over 300 people involved in some way Testing and integration the main technical challenges Documentation and and accreditation the most time consuming aspects

Project Milestones PKI Project starts1 June 1999 Conceptual Design finalised21 Sept 1999 Baltimore Delivers Phase 130 Sept 1999 Phase 2 starts19 Sept 1999 ABN Registration Process begins1 Nov 1999 Baltimore Delivers Phase 24 Apr 2000 ATO CA Certificate signed25 May 2000 ATO OCA certificate signed5 June 2000 Testing Completed15 June 2000

Project Milestones Gatekeeper Accreditation16 June 2000 Start of Certificate issue16 June 2000 ECI CD mailout started22 June 2000 First download28 June 2000 First ‘Ready to Deal’ set3 July 2000 First eBAS ready for collection15 July 2000 First eBas returned to ATO27 July 2000

Success Factors Ability to use ABN registration process –Businesses already being registered –Avoided need for face to face POI Strong level of commitment from senior management Exceptionally hard work by all concerned Immovable deadline What needs to go right in order to compress an 18 month project into 9 months?

Achievements CA Signing (25 May 2000) CA Signing 25 May 2000 CA and OCA operated for the ATO by Certificates Australia Pty Ltd

Full Gatekeeper Accreditation (16 June 2000) Certificate Generation commenced (16 June 2000) Achievements CA Signing 25 May 2000 Full Gatekeeper Accreditation 16 June 2000 Certificate generation commenced 16 June 2000

ABN Registrations3.4m (Target 2.5m) Keys & certificates to mid July145K (Target 137K) to 5 December K ‘Active’ keys & certificates270K Reissues23K Revocations14K Total Downloads 76K ‘Ready To Deal’ 53K (Businesses) Proportion downloaded 84% in use Achievements CA Signing 25 May 2000 Full Gatekeeper Accreditation 16 June 2000 Certificate generation commenced 16 June 2000 Media Release 27June m ABNs and 307,0000 sets of Certificates by 5 Dec 2000

Achievements UniCERT UniCERT ITSEC E3 certification formally awarded on 4 Sept 2000 The Australian Taxation Office congratulates Baltimore Technologies on achieving ITSEC E3 certification for

Large scale registration is likely to be hardest and most expensive component of establishing a PKI. Beware of tightly coupling PKI and business applications Increased security is likely to mean less ease of use Gatekeeper accreditation is a non-trivial undertaking - ATO produced 64 different documents Learnings

Set up a call centre and be prepared for up to 3 * 5 minute calls from each customer Would the outcome have been even better if there had been an opportunity for a pilot? Get good partners involved and use their expertise Hide complexity wherever possible Do not over-estimate computing abilities of end- users, or their willingness to read instructions Learnings

Of Help Desk Calls –15 % are related to the ECI and BAS –85% are related to PKI 15% are due to clients not following instructions 50% of PKI calls relate to passwords, PIC or Certificate download issues 10% are requests to change Certificate Holder name 10% are general enquiries

Where to from here? Increase take-up rate Introduce additional PKI-enabled applications such as: –Australian Business Register Phase 2 Businesses able to update their own records on-line Extend ATO-CA to be the trust point for ATO specific purposes, such as: –Mobile computing –Authenticated single login –e-tax The ATO has established a secure foundation for electronic commerce. There are a number of strategies being developed to take advantage of the PKI deployment to Australian Businesses

Whole Of Government Issues ATO certificates are for ATO use only –Initial minimalist position to deal with liability issues NOIE is developing ABN-DSC –Common profile –A number of commercial providers –Federal Govt agencies must accept ABN-DSC from any provider ATO’s systems will accept ABN DSC’s Many federal government agencies want to roll out PKI enabled applications NOIE trying to establish common standards Private sector seen as having key role

To be successful with a complex project you need an environment where: there are clearly defined business objectives; there is a well understood time line; and all participants are 100% committed to achieving a quality business outcome on time. The introduction of Australia’s Goods and Services Tax provided such an environment Conclusion

Australian Taxation Office Certificates Australia P/L Office of Government Online Defence Signals Directorate Australian Government Solicitor The overwhelming success of the ATO PKI project was due to the efforts of over 300 talented people from: Baltimore Technologies Admiral Computing Aspect Computing EDS Australia

Conclusion Thank you References:

ABNABN