1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation 23-25 May 2012, Kish Island, I.R.IRAN.

Slides:



Advertisements
Similar presentations
PKI Strategy PKI Requirements Standard –Based on e-MARC or other Certificate Policy Statements –Specify key aspects that must be met by CA Cert format.
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
3SKey 3SKey.
Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Electronic Filing Case Study NSW Land and Environment Court.
1 © Cooley Godward 2001 PKI A SSESSMENT The process of evaluating, verifying, and certifying your PKI Presented by: Randy V. Sabett Vanguard Enterprise.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Report on Attribute Certificates By Ganesh Godavari.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
WISeWorld2000 WISeKey By Malcolm Hutchinson CEO & Cofounder WISekey.
Jaroslav Pinkava May 2001 Certification Authority in Praxis. Security Aspects. Conference Security and Protection of Information Ing. Jaroslav Pinkava,
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
Public Key Infrastructure (X509 PKI)
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Page 1 Issues in and perspectives on electronic authentication of health professionals Pascal POITEVIN Marketing and Communication manager GIP-CPS e-Health.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Assuring e-Trust always 1 Guaranteeing Electronic Trust at all times.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Facilitating Cross Border Trade and Commerce through Mutual Recognition of Digital Signatures/Certifying Authorities Controller of Certifying Authorities(CCA)
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
1 PKI Update September 2002 CSG Meeting Jim Jokl
Active Directory ® Certificate Services Infrastructure Planning and Design Published: June 2010 Updated: November 2011.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
WebTrust SM/TM Principles and Criteria for Certification Authorities CA Trust Jeff
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
1 June Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
TAG Presentation 18th May 2004 Paul Butler
TAG Presentation 18th May 2004 Paul Butler
SWIM Common PKI and policies & procedures for establishing a Trust Framework                           Kick-off meeting Patrick MANA Project lead 29 November.
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Security in ebXML Messaging
PKI (Public Key Infrastructure)
Presentation transcript:

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Part I: Introduction Part II: Public key infrastructure Part III:Part III: PKI status in IRANPKI status in IRANOutline 2

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Introduction

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade FacilitationE-CommerceIntranetExtranetInternet CustomerMerchant Merchant and Customer perform a transaction on digital world Security?!Security?! Confidence?!Confidence?! Trust?!Trust?! 4

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation E-Trust …?! Paper report Digital report Trust? 5

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Solution...? Digital Signature Ensuring Authenticity and Report Integrity in Electronic Transactions 6

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Digital Certificate There is still a problem linked to the “Real Identity” of the Signer. Why should I trust what the Sender claims to be? Moving towards PKI … Digital Certificate 7

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation CERTIFICATE Issuer Subject Issuer Digital Signature Subject Public Key 8

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Digital Certificate How are Digital Certificates Issued? How are Digital Certificates Issued? Who is issuing them? Who is issuing them? Why should I Trust the Certificate Issuer? Why should I Trust the Certificate Issuer? How can I check if a Certificate is valid? How can I check if a Certificate is valid? How can I revoke a Certificate? How can I revoke a Certificate? Who is revoking Certificates? Who is revoking Certificates? Challenges: Moving towards PKI … Public key Infrastructure 9

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Public Key Infrastructure (PKI)

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation PKI is an Infrastructure to support and manage Digital Certificates P K I 11

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation PKI – Technical View Basic Components: Certificate Authority (CA) Certificate Authority (CA) Registration Authority (RA) Registration Authority (RA) Certificate Distribution System Certificate Distribution System PKI enabled applications PKI enabled applications “Consumer” Side “Provider” Side 12

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation PKI – Simple Model CA RA CertificationEntity Directory Application / Relying party End EndEntity Certs,CRLs Cert. Request Signed Certificate Certificate chain and status Certificate chain and status query 13

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation PKI Status In IRAN

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation IRAN Related Regulations E-Commerce Law Certificate Policy Article 32 of e-commerce executive regulation 15

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Certificate Usages in IRAN Organization Stamp Code Signing Server (SSL/TLS/DC) Authentication (Login) Sign (i.e. Document Signing) Certificate Usages CA operations (i.e. CA,RA, OCSP,TSA,…) (S/MIME) 17

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation IRAN PKI Architecture 18

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation IRAN Root CA Certificate Policies Platinum Gold Silver Bronze 19

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation IRAN PKI Standards

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation PKI Laboratories of IRAN HSM Laboratory: for testing and evaluation of Hardware Security ModulesHSM Laboratory: for testing and evaluation of Hardware Security Modules Smart Card USB Token HSM (internal/External) CA Laboratory: for testing and evaluation of digital certificates issuing and managing productsCA Laboratory: for testing and evaluation of digital certificates issuing and managing products CA, RA, OCSP, TSA, … PKE Laboratory: for testing and evaluation of PK-enabled applicationsPKE Laboratory: for testing and evaluation of PK-enabled applications Web based Applications Stand alone Applications Cryptology Laboratory: for testing and evaluation of Cryptographic AlgorithmsCryptology Laboratory: for testing and evaluation of Cryptographic Algorithms cryptographic algorithms (Symmetric, Asymmetric, …) 21

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation General Intermediate CA Certificate Issuance statistics 22

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation General Intermediate CA Certificate Issuance statistics PKI Interoperability Experiences 23

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Necessity of PKI Interoperation Usability of legal digital signature in different PKI domains ensuring that the certificates meet assurance requirements and have legal effect as required activate global e-commerce exchanging PKI related information between the different domains 24

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation 26 Recommended Accreditation Scheme Model

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation 25 IRAN Root CA Scheme for PKI Interoperation Cross Recognition + CTL 32

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Recommended PKI Mutual Recognition Evaluate CPS and operations Against Certificate Policy Applicant CA Certificate Practices Statement (CPS) Confirm CA’s Operation Is In accordance With CPS and List of Accredited CA’s (CTL) Evaluation Report ECO Policy Authority Evaluator Competent Authority Advisory Commitee Advisory Commitee can work on behalf of Evaluator and give advice to Competent Authority CTL will publish only after approval by ECO Policy Authority 27

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Advisory Committee Tasks Consulting services for Design and establishing of Interoperation Scheme in ECO PKI Domains Provide advice and services to establishing PKI domain for ECO members Consulting services for integrating of PKI Domains Provide Auditing and Evaluation services to Competent Authority Act as an evaluator if there is no auditor in a country Give advice to Competent Authority for policy compliance Auditing, evaluation guidance, criteria and standards. According to I.R.IRAN Root CA recent efforts, it can opraete as Advisory Committee to facilitate Cross-Recognition procedure between ECO countries. 28

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation IRAN Root CA Related Measures Established of Hierarchical PKI Domain with four levels policy Established of PKI Laboratories for Auditing purposes Providing of Internal PKI Standards in order to create of Interoperation Design an optimal scheme for interoperability in PKI Preparation of CP Guidelines in order to providing of a template and guidance for ECO Certificate Policy Edition Preparation of CR Policy in order to propose the Architecture and mechanisms of cross-recognition 29

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation Thanks for your attention