1 XML Encryption Notes from encrypt/index.html by Bilal Siddiqui And “Secure XML” by Eastlake and Niles.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
XML Encryption Prabath Siriwardena Director, Security Architecture.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security
Grid Computing Basics From the perspective of security or An Introduction to Certificates.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security,
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Chapter 8 Web Security.
Security Management.
Web services security I
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Security Standards under Review for esMD. Transaction Timeline An esMD transaction begins with the creation of some type of electronic content (e.g. X12.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
X.509 Certificate management in.Net By, Vishnu Kamisetty
Saad Haj Bakry, PhD, CEng, FIEE 1 Information Security for e -Business Saad Haj Bakry, PhD, CEng, FIEE P RESENTATIONS IN N ETWORK S ECURITY.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Data Security (File, Database, XML) Team: SecurityGurus Suresh Konda Jiji Nair Pallavi Shetty.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Krishna Sattiraju CS 792.NET. Overview  What is XML Encryption  Methods for Encryption  Storage of Encrypted Data  Benefits of XML Secure Storage.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Key management issues in PGP
An Analysis of XKMS Yamini Ghadge Shanky Subramanian.
Public Key Infrastructure (PKI)
Security Design.
K E Y Plain text Cipher text Encryption Decryption
Cryptology/Cryptography
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
National Trust Platform
Presentation transcript:

1 XML Encryption Notes from encrypt/index.html by Bilal Siddiqui And “Secure XML” by Eastlake and Niles Addison Wesley

2 Not a replacement for SSL XML Encryption adds Encrypting part of the data being exchanged Secure sessions between more than two parties

3 General Form 1 Cipher Text Gibberish in Base 64

4 General Form 2 pointer (URL) to gibberish

5 Replaces the encrypted element or Serves as the new document root May contain a KeyInfo element that describes the key needed for decryption (borrowed from XML Digital Signature) EncryptedData is the core element

6 General Example (1) …

7 General Example (2) …. Medical gibberish

8 General Example (3) Pay gibberish

9 Detailed Example (Listing 1) book visa

10 Encrypting the Entire File (Listing 2) A23B45C56 IANA = Internet Assigned Numbers Authority a function of The Internet Corporation for Assigned Names and Numbers

11 Encrypting The Payment (Listing 3) book <EncryptedData Type=' xmlns=' A23B45C One element

12 Encrypting Only the CardId (Listing 4) book <EncryptedData Type=' xmlns=' A23B45C visa

13 Encrypting Non-XML Data(Listing 5) <EncryptedData xmlns=' Type=' types/jpeg' > A23B45C56

14 Sending a public key(listing 6) <EncryptedKey CarriedKeyName="Muhammad Imran" xmlns=' <ds:KeyInfo xmlns:ds=' 1asd25fsdf2dfdsfsdfds2f1sd23

15 Receiving a secret key encrypted to the public key (listing 7) <EncryptedKey CarriedKeyName="Imran Ali" xmlns=' <EncryptionMethod Algorithm= " xyza21212sdfdsfs7989fsdbc

16 Data Encrypted to Secret Key (Listing 8) book Visa <EncryptedData Type=' xmlns=' Imran ali A23B45C564587

17 The future ? Use XMLEncryption Use XMLSignature Use a new Public Key Infrastructure

18 XKMS PKI HOST XMK Key Management Specification Holds keys, certificates and certificate revocation list Signer Verifier Signed document (SOAP) Verify signature X-KISS XML Key Information Service Specification Register key Revoke Certificate Recover Key X-KRSS XML Key Registration Service Specification Signer generates key pair or requests the pair from the PKI host Key registration request Certificate sent to Signer Signed document sent to Verifier Verifier requests certificate from PKI host Key and certificate sent to Verifier (SOAP) The Signer may request that a certificate be revoked The Signer may request copy of lost keys