Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Cryptography and Network Security Chapter 14
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Digital Signatures Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Digital.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
National Smartcard Project Work Package 8 – Security Issues Report.
Chapter 31 Network Security
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Cryptography and Network Security Chapter 14
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
TAG Presentation 18th May 2004 Paul Butler
Information Security message M one-way hash fingerprint f = H(M)
TAG Presentation 18th May 2004 Paul Butler
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Pooja programmer,cse department
Information Security message M one-way hash fingerprint f = H(M)
CS 465 Certificates Last Updated: Oct 14, 2017.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
PKI (Public Key Infrastructure)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University

Yee Fen Lim 2 Outline Introduction Handwritten signatures Requirements of electronic signatures Digital Signatures Public Key Cryptography Public Key Infrastructure Digital Certificates Allocation of Liability

Yee Fen Lim 3 Introduction Signature issues in the digital environment Importance –Commercial: e-commerce (all sectors) –Non-commercial

Yee Fen Lim 4 Handwritten Signatures Signature v. autograph –Intention of the signer Signature is any mark that has been affixed by the signer with the intent to be bound by the contents of the document Once affixed, the signature and the document becomes one composite thing Integrity

Yee Fen Lim 5 Proof of Handwritten Signatures If a handwritten signature is disputed, then call on the following: –witness to the signature –a person with intimate knowledge of the person’s signature –handwriting expert Authentication and Non-repudiation

Yee Fen Lim 6 Requirements of Electronic Signatures – “legal status” Integrity –“I love you” does not become “I love you not” Non-repudiation –“Not me!” Authentication –Did Superman really write the message? Confidentiality –Superman wants to keep his messages private

Yee Fen Lim 7 Types of Electronic Signatures Biometric signatures –eg iris scans, finger-prints, voice (none totally perfect yet). Non-biometric signatures –eg digital signatures

Yee Fen Lim 8 Digital Signatures Insecure – eg initials at the end of s Secure –Uses encryption to code and decode –Ensures confidentiality –but what about integrity, authentication, non-repudiation?

Yee Fen Lim 9 Public Key Cryptography 2 key pairs: 1 private key and an associated public key Private key kept secret by owner Public key published widely Golden rule: anything encrypted with a public key can only be decoded with the private key, and vice versa

Yee Fen Lim 10 Public Key Cryptography: Superman example Superman writes: “I love you” Superman encrypts message with his private key Anyone with Superman’s public key can decode the message Authenticity

Yee Fen Lim 11 Public Key Cryptography: Superman example How does Superman ensure only Lois Lane can read his message? Superman encrypts his already encrypted message with Lois Lane’s public key Only Lois Lane can decode the message as she is the one with the private key Confidentiality

Yee Fen Lim 12 Public Key Cryptography: Superman example What about integrity? Include a pre-agreed one-way hash function with the original message eg “I love you” –Use a=1 b=2 c=3 ….z=26 –i=9 l=12 o=15 v=22 e=5 y=25 o=15 u=21 –Use sum: =124 –Hash is 124

Yee Fen Lim 13 Public Key Cryptography: Superman example Include the hash of 124 in the message that is double encrypted. When Lois Lane receives the message, she can run the message through the pre-agreed hash function If she gets 124 as the result, then integrity is ensured. If not, then the message may have been tampered with.

Yee Fen Lim 14 Public Key Cryptography: Superman example To save on processing, rather than encrypt the full message with the private key, most systems just encrypt the hash with the private key, and this becomes the digital signature ie different every time The private-key-encrypted hash plus the message is then encrypted with the recipient’s public key to ensure only the recipient can read the message.

Yee Fen Lim 15 Public Key Cryptography: Superman example What about non-repudiation? Who is the signer? Was it really Superman? Related to authentication Public key infrastructure (PKI)

Yee Fen Lim 16 Public Key Infrastructure (PKI) System for distribution of public keys –Reliability eg a web page simply listing the public keys of persons is not reliable as to source “Web of trust” Trusted third party to verify that the public key really does belong to whom it is said to belong

Yee Fen Lim 17 Public Key Infrastructure (PKI) Trusted third party is Certification Authority (CA) CA issues digital certificate verifying the owner of the public key A CA may use a third-party, a Registration Authority (RA), to perform the necessary checks on the person or entity requesting the certificate

Yee Fen Lim 18 Public Key Infrastructure (PKI) Can we trust the CA? Higher CA, Root CA (self-authenticates) Cross-verification creating certificate chain - web of trust

Yee Fen Lim 19 Public Key Infrastructure (PKI): Digital Certificates Serial number - unique number from CA Key length Signature algorithm – identity of algorithm Hashing algorithm Issuer name Validity period Subscriber – details of owner of public key Subject public key - actual key certified Signature of CA

Yee Fen Lim 20 Public Key Infrastructure (PKI): Digital Certificates Digital Certificates should: provide strong and substantial evidence of the identity of the owner of public key (signer) Be used during operational period of valid digital certificate Have the rebuttable presumption that the digital signature on the digital certificate is that of the subscriber listed

Yee Fen Lim 21 PKI: Rebutting the presumption Was the CA in the wrong? Was it an imposter’s public key that the CA has registered? Did someone else use Superman’s public/private key without permission? Did Superman safeguard his private key properly?

Yee Fen Lim 22 PKI: Revocation of Digital Certificates Credit card analogy: If Superman’s private key has been compromised, he should notify the CA CA can revoke Superman’s digital certificate CA then posts the certificate on the certificate revocation list (CRL) Limitations upon the right of a recipient of a digital certificate to rely upon them Unreliable Digital Signatures; Reasonable of Reliance

Yee Fen Lim 23 PKI: Allocation of Liability Hardest Legal Issues involve the allocation of liability among Subscriber (key owner), CA and Relying Party –eg1 Liability of CA to a Relying Party for binding the wrong public key to the identity of the subscriber named in the certificate. –eg2 Liability of the Subscriber to the Relying Party upon unauthorised use of Subscriber’s private key following compromise of the private key

Yee Fen Lim 24 PKI: Allocation of Liability For a Relying Party, the allocation of liability is paramount If a Relying Party does not know whether the CA can be trusted, or if the Subscriber is genuinely who they claim to be, then the Relying Party would not rely on the Digital Certificate

Yee Fen Lim 25 PKI: Allocation of Liability Examples of where problems arise: Inaccuracies in the Certificate Misrepresentation in the Certificate CA fails to revoke an invalid Certificate

Yee Fen Lim 26 PKI: Allocation of Liability Closed systems Open systems (Internet)

Yee Fen Lim 27 PKI: Allocation of Liability – closed system example Gatekeeper Health eSignature Authority (RA) –Betrusted (formerly Securenet) is CA –Individual certificates, location certificates –Referrals, reports

Yee Fen Lim 28 PKI: Allocation of Liability – closed system example 5.4 Keys and Certificates should only be used for Health related messages in transactions with HIC, or in transactions created by subscribers within the Health Sector but not where the transaction value is greater than $10,000 Lists obligations and duties for each party Limit on liability - $1,000/$5,000

Yee Fen Lim 29 PKI – Australia Contract law (if there is a contract) –including protection against unfair contractual liability allocation eg undue influence, unconscionable dealing, Contracts Review Act, ss51AA, 51AB & 51AC TPA Law of negligence s52 Trade Practices Act Consumer protection legislation $500 transaction?

Yee Fen Lim 30 PKI Regulation – Preferred approach Strict liability –avoidance of concepts of negligence Reliance limits Actions key can be used for

Yee Fen Lim 31 Thank you