Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cyber Law & Islamic Ethics
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Digital Signatures. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original.
CROMERR Applied to Industrial Pretreatment Linko Data Systems, Inc. PretreatmentPretreatment & Fats Oil and Grease SoftwareFats Oil and Grease Software.
National Smartcard Project Work Package 8 – Security Issues Report.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Electronic Submission of Medical Documentation (esMD) Digital Signature and Author of Record Pre-Discovery Wednesday May 2,
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Public Key Infrastructure (PKI)
Unit 3 Section 6.4: Internet Security
TAG Presentation 18th May 2004 Paul Butler
e-Health Platform End 2 End encryption
Chapter 5: The Art of Ensuring Integrity
S/MIME T ANANDHAN.
Digital Signature.
Digital Signatures and Forms
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
PKI (Public Key Infrastructure)
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Trusted Electronic Transactions

 Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How we achieve trust in paper-based transactions  Problems with common electronic transactions TOPICS COVERED

 Achieving trust in electronic transactions with Digital Signature technology and an effective archiving scheme What are digital Signatures? An introduction to Public Key Infrastructure An introduction to Archiving digitally signed transactions using XML. TOPICS COVERED

 Applying Public Key Infrastructure to address security risks when granting public access to community-right-to-know data  Relevant Legislation regarding Digital Signatures and electronic government transactions TOPICS COVERED

ELECTRONIC TRANSACTIONS  Streamline Reporting Process Reduce burden on regulated community  Efficient Record Retention  Timely and Accurate Data Retrieval and Access Emergency Response (24/7 access) Community-Right-to-Know

CAN ELECTRONIC DATA BE TRUSTED?  Accuracy and Authenticity Decisions regarding Environmental Health and Impact  Security Protection from unauthorized access Tamper-resistant  Accidental – human errors  Intentional - Fraud  Credibility in Judicial Proceedings Effective Enforcement Plaintiff/Defendant Subpoena

 Evidence must be unambiguous to be admissible in court  Once admitted into Court, evidence must be persuasive to a jury JUDICIAL CREDIBILITY is the Highest Standard for Trusted Data ** ** National Governor’s Association (NGA) State Guide to Environmental Reporting

1.AUTHENTICATION: the ability to prove the sender’s identity 2. REPORT INTEGRITY: the ability to prove that there has been no change during transmission, storage, or retrieval 3. NON-REPUDIATION: the ability to prove that the originator of a report intended to be bound by the information contained in the report WHAT DETERMINES A LEGALLY BINDING REPORT ?

NON-REPUDIATION AUTHENTICATION REPORT INTEGRITY

TRUST IN PAPER-BASED REPORTS

ELECTRONIC REPORTING

FROM PAPER TO ELECTRONIC: Repudiation Risks in Basic Electronic Transactions  “I did not send that report !”  “That report is not the one I sent !”  “I did not mean that !”

“I did not send that report !”  Identity of user is unknown  Possible Solutions:  Telephone call follow-up  Terms and Conditions Agreement (TCA) / Mailed Certification Agreement  Mail a Diskette Containing Electronic Data

“That report is not the one I sent !”  Electronic reports contain no evidence of tampering in transmission, storage or retrieval  Sources of possible loss of data integrity Human Error Data Corruption Fraud

Ensuring Authenticity and Report Integrity in Electronic Transactions  Digital Signatures Public Key Infrastructure

Public Key Infrastructure (PKI)  PKI is a combination of software, encryption technologies and facilities that can facilitate trusted electronic transactions.  PKI Components Key Pairs Certificate Authority Public Key Cryptography

Key Pairs A “key” is a unique digital identifier –Keys are produced using a random number generator A “key pair” consists of two mathematically related keys –The private key is secret and under the sole control of the individual –The public key is open and published

A trusted authority Responsible for creating the key pair, distributing the private key, publishing the public key and revoking the keys as necessary The “Passport Office” of the Digital World Certificate Authority

Digital Certificates A unique electronic signifier issued by a Certificate Authority that functions like a passport to verify a user’s identity. The certificate authority binds the unique key to the following Name of the Certificate Authority Certificate Expiration Date Certificate Identity Number Certificate Storage software tokens browser certificate stores hardware tokens (Smart Cards, USB Tokens)

Public Key Cryptography Complimentary Algorithms are used to encrypt and decrypt documents $#%$%$^& Encryption key Decryption key Unreadable Format

Public Key Infrastructure in Action Public KeyPrivate Key Secure Transmission Signatures Decrypting Encrypting Decrypting

Report Encryption Algorithm Digitally Signed An individual digitally signs a document using the private key component of his certificate. Digital Signatures Private key

Authentication and Verification The individual’s public key, published by the CA decrypts and verifies the digital signature. Digitally Signed Public Key Decryption Algorithm

Authentication and Verification Any changes made to the report will invalidate the signature Provides evidence of report integrity Provides proof of report originator’s identity - Authentication

Security in Transmission Secure Socket Layer (SSL) https Submission is encrypted by the sender with recipient’s public key After receipt, submission is decrypted with recipient’s private key

ACHIEVING TRUST IN ELECTRONIC REPORTS

What Should Be Signed ?  Balance between capturing the entire content of the transaction vs. ease of data integration  Data that is Machine readable but which separates user entry content from context: database, comma delimited, spreadsheet, etc  Data that records content and context but which are not easily integrated into databases: word, pdf, image, html, etc

Ensuring Non-repudiation in Electronic Transactions  Capturing Complete Transactions in Archive Signing the content and context of a transaction Storing the signed transaction in a data warehouse without manual intervention

 eXtensible Markup Language  XML can be used to store both the questions on the form (context) and the data entered by the user (content).  The entire form can be stored as one object  Default Values  Lookup values (ie chemical classifications)  Questions  Physical Characteristics XML

XML Schema From the W3C: …define and describe a class of XML documents by using these constructs to constrain and document the meaning, usage and relationships of their constituent parts: datatypes, elements and their content, attributes and their values, entities and their contents and notations. Schema constructs may also provide for the specification of implicit information such as default values. Schemas are intended to document their own meaning, usage, and function through a common documentation vocabulary. Business Plan Schema

INCORPORATING XML AND PKI XML Transaction Instance conforming to Schema Public Key Cryptography via Web Browser plugin

Granting Public Access to paper reports  Public comes into agency office  Public provides driver’s license or other identification  Agency can monitor who is accessing data

Providing Trusted Electronic Access to Data  Identity of user is unknown  Access cannot be monitored  Relying on the Certificate Authority

Public Digital Certificate In order to obtain access to Community Right to Know Data, individuals first obtain digital Certificates. Applying PKI to Public Access

Public After contributing a certificate to gain access, The individual’s certificate can be cross- referenced with other security databases to monitor suspect individuals. Digital Certificates Agency

 TITLE 27, Part 2, Article 5  CA Title 2, Division 7, Ch.10 Digital Signatures RELEVANT LEGISLATION

TITLE 27 – CUPA Legislation

California Digital Signature Regulations Definitions Digital Signatures Must Be Created By An Acceptable Technology- Criteria For Determining Acceptability List of Acceptable Technologies Provisions For Adding New Technologies to the List of Acceptable Technologies Issues to Be Addressed By Public Entities When Using Digital Signatures California Code of Regulations Title 2. Administration DIVISION 7. CHAP 10. DIGITAL SIGNATURES

 The technology known as Public Key Cryptography is an acceptable technology for use by public entities in California, provided that the digital signature is created consistent with the provisions in Section 22003(a)1-5.  "Acceptable Certification Authorities" means a certification authority that meets the requirements of either Section 22003(a)6(C) or Section 22003(a)6(D).  "Approved List of Certification Authorities" means the list of Certification Authorities approved by the Secretary of State to issue certificates for digital signature transactions involving public entities in California. California Digital Signature Regulations

 Unsigned Web forms can be sent by anyone. They can be tampered in transmission and the sender can’t be legally verified  Unsigned Data in a database can be altered and does not provide adequate evidence in a court of law  Data on Diskette can be altered without visible evidence Summary: Electronic Report Transactions are subject to fraud and easily repudiated:

 Digitally signed reports can also be repudiated, if the signed data is stored independently of the form question data. Summary, cont.

Conclusion: Ensuring Trusted Electronic Transactions 1. PKI supports trusted electronic report transactions:  Authentication- authenticates the sender of a report  Report Integrity- invalidates a report if it has been tampered.  Non-repudiation- sender and document are authenticated- the sender cannot deny having sent the report

Conclusion, cont. 2. PKI supports trusted access to Public Data:  Agencies require individuals to contribute digital certificates in order to gain access.  Agencies can track who gains access at what time  The names of individuals who seek access can be cross-referenced with additional security databases to protect public safety

Conclusion, cont. 3. Complete Archiving ensures that a legal record of a transaction can be trusted :  Non-repudiation- Storing a copy of the entire data (including questions on the form) with the digital signature.

Resources: eCompliance, Inc. White paper/ Electronic Transactions Copy of presentation Environmental Protection Agency Central Data Exchange National Governor’s Association State Guide to Electronic Reporting of Environmental Data F%5ED_1139,00.html F%5ED_1139,00.html