Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Confidentiality and Privacy Controls
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
M.Sc. Hrvoje Brzica Boris Herceg, MBA Financial Agency – FINA Ph.D. Hrvoje Stancic, assoc. prof. Faculty of Humanities and Social Sciences Long-term Preservation.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
National Smartcard Project Work Package 8 – Security Issues Report.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
"certification service provider" Electronic Signatures
Selected problems of the e-signature law and of its implementation Doc. RNDr. Daniel Olejár, CSc. Department of computer science Comenius University, Bratislava.
E-Signatures The Community framework on e-signatures (Directive 1999/93/EC) Dr Ioannis Iglezakis Visiting Lecturer University of Thessaloniki, Greece.
IBT- Electronic Commerce The Legal Infrastructure Victor H. Bouganim WCL, American University.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Security Issues in Information Technology
Computer Communication & Networks
TAG Presentation 18th May 2004 Paul Butler
Digital Signature.
Introduction to Cryptography
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008

What ? Understanding the information security Electronic signature and encryption Trusted third party (CSP)

Information security General technical definition information security is a state of affairs where information, information processing and communication is protected against the confidentiality, integrity and availability of information and information processing. In the context of information networks this also covers reliable identification and authentication. information security is a state of affairs where information, information processing and communication is protected against the confidentiality, integrity and availability of information and information processing. In the context of information networks this also covers reliable identification and authentication.

Information security Legal definition the obligation to take adequate measures for the purpose of safeguarding the state of affairs corresponding the required level of security, and notably the protection of rights related to informational assets

Information security Trust The basic elements of information security –Confidentiality –Integrity –Availability

Information security provisions in current law OECD Recommendations E-commerce and E-signature Privacy regulations Telecommunications Electronic administration Public access to information laws Penal law concerning the computer crime and misuse Critical infrastructure protection

Electronic signature Time frame: Jan 19,2000, July , march 15, 2006 Underline principles. Technical neutral Non-discrimination Party-autonomy/contractual freedom No-harmonization of national civil law

Electronic signature Definition: Electronic signature : data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication (Directive 99/93/EC) Advanced electronic signature: any electronic signature which meets the following requirements: uniquely linked, capable of identifying, maintain sole control, change detectable

Electronic signature Form conditions: QC (annex I) CSP (annex II) secure signature creation device (annext III) advance SKE Qualified signature biometrics Digital signatur e Advanced signature E-sign

Electronic signature Legal effects of the e-signature article 5 of the Directive: Art5 (2) non-discrimination : electronic form, not certified, not certified by accredited CSP (certified service provider); not created by secure signature device Art5 (1) qualified advanced e-signature: the validity in transaction as handwritten signature and evidence effect at court

Electronic signature Cryptography basis: The conversion of data into a secret code for transmission over a public network. The conversion of data into a secret code for transmission over a public network. –Encrypt: convent plain text into cipher text –Decrypt: convert cipher text into plain text –Symmetric key encryption (secret key) –Asymmetric key encryption (public key)

Electronic signature

Public key encryption (PKE) in detail problem of PKE: –More computational intensive –Large amounts of encrypted data vulnerable of hacking –Solution = hashing of the data message

Electronic signature Digital signature 1

Electronic signature Digital signature 2

Electronic signature Problem With digital signature –Trustworthy linkage between public key and real world identity of accountable person –Secure distribution of public keys over open networks –Integrity? –Solution= Public key infrastructure (PKI)

Electronic signature PKI Process Flow Step 1. Subscriber applies to Certification Authority for Digital Certificate Step 2. CA verifies identity of Subscriber and issues Digital Certificate. Step 3. CA publishes Certificate to Repository. Step 4. Subscriber digitally signs electronic message with Private Key to ensure Sender Authenticity, Message Integrity and Non-Repudiation and sends to Relying Party. Step 5. Relying Party receives message, verifies Digital Signature with Subscriber's Public Key, and goes to Repository to check status and validity of Subscriber's Certificate. Step 6.Repository returns results of status check on Subscriber's Certificate to Relying Party. p

Electronic signature

agenda –The legality issues –The technical answers –The liability issues -UNCITRAL e-sign ML, EU e-sign Directive

UNICITRAL e-sign ML E-sign ML-liability concept Reasonable allocation of responsibilities in accordance with domains under the specific control of PKI participants CA signatory Relying party

UNICTRAL e-sign ML Approach –Soft law: –Technology neutrality –comprehensive Responsibility of the signatory (art8) Responsibility of the relying party(art11) Responsibility of the CSP(art9,10)

EU e-sign Directive Approach –Hard law –Technology neutrality –Liability rules CA’s liability

EU e-sign Directive Minimum liability for CA (art6) –accuracy –completeness –the signatory identified in the qualified certificate held the private key corresponding to the public key identified in the certificate –the private key and the public key can be used in a complementary manner if the CSP guarantees them both Principle of negligence Reversed burden of proof Excuse and limitation –Proves he has not act negligently –Exceed intended use –Exceed intended value of transaction

Electronic signature Market access: no prior authorization (art 3.1 ) voluntary accreditation (art 3.2)

EU e-sign Directive Other provisions –data protection issues (art8) –International aspects (art7) –Committee (art9. 10) –Notification (art 11) –Review (art 12)

Encryption Export control measures –Wassennar agreement –EU dual use regulation of Dec.1994 Domestic control measures Key escrow and key recovery systems Privacy considerations

Additional links: Commentary_pdf.pdf Commentary_pdf.pdf Thank you for your attention!