Selected problems of the e-signature law and of its implementation Doc. RNDr. Daniel Olejár, CSc. Department of computer science Comenius University, Bratislava.

Slides:



Advertisements
Similar presentations
A strategy for a Secure Information Society –
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
Legal Reflexions concerning Digital Archiving Jos Dumortier K.U.Leuven University – Belgium Interdisciplinary Centre for Law & ICT (ICRI) ECPRD twin seminar.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
21 mai 2015 Bridges between Certification Authorities.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
FIT3105 Smart card based authentication and identity management Lecture 4.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Electronic invoicing in the light of the VAT Directive 2001/115/EC Anna Nordén Conference on the Legal Aspects of an E-Commerce Transaction The Hague 27.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
ITPD session on Authentication Wednesday morning April Geneva 23 rd Forum.
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
Facilitating Cross Border Trade and Commerce through Mutual Recognition of Digital Signatures/Certifying Authorities Controller of Certifying Authorities(CCA)
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
Deeper Analysis and Comparison of Slovak e-Learning Best Case Practices Related to Higher Education in a Ubiquitous Society Alena Pistovcakova Jaroslava.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
Abcde Electronic Signatures and Certification Authorities Obligations, Liabilities and Responsibilities Michael Peeters Pinsent Curtis - UK.
Crypto Bro Rigby. History
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
NETWORK SECURITY.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Digitally Signed Records – Friend or Foe? Boris Herceg Hrvoje Brzica Financial Agency – FINA Hrvoje Stančić.
Information Security Systems Cost Effective Authenticity & Integrity in CEN/FISCALIS eInvoicing Good Practice Guidelines Nick Pope – Principal Consultant,
Copyright BRISA 2001ITU —Multimidia in the 21st CenturyJun 5, 2001 Security Requirements for Business Communication HENRIQUE DE CONTI.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Component 9 – Networking and Health Information Exchange Unit 9-1 Privacy, Confidentiality, and Security Issues and Standards This material was developed.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Digital Single Market Valentinas KVIETKUS Baltic Assembly, Ryga
TAG Presentation 18th May 2004 Paul Butler
TAG Presentation 18th May 2004 Paul Butler
Presentation transcript:

Selected problems of the e-signature law and of its implementation Doc. RNDr. Daniel Olejár, CSc. Department of computer science Comenius University, Bratislava

Background and history of Slovak e-signature law (1) The changes induced by use of information and communication technologies (ICT) serious obstacle - lack of trust caused by security problems: how to guarantee the integrity and authenticity of messages cryptographic solutions: digital signatures based on one- way hash functions and asymmetric ciphers e-commerce: international character, the national solutions must be mutually compatible EU - Directive 1999/93/EC on a Community framework for electronic signatures

Background and history of Slovak e-signature law (2) Ministry of economy is preparing Slovak e-signature law since 1999 and produced numerous versions of the law the governmental proposals were repeatedly returned by Legislative council the slowly evolving e-commerce needs the law An expert group was created in the end of 2000 under Slovak computer science society. This group prepared another e-signature law, which was submitted to the Parliament as a deputy proposal Governmental proposal of e-signature law was not completed yet

Key problems of e-signature law (1) Creating e-signature law we compared many national laws, model law of UNCITRAL and international standards though they differ, they must address some basic problems. The difference between governmental and deputy proposals can be demonstrated especially on these basic problems: the approach how to write the law: up to down or down to up the philosophy of the law (Directive of EU or a model law of UNCITRAL or another national law) technological neutrality vs. practical solutions (electronic signature implemented by digital signature)

Key problems of e-signature law (2) Scope of the law (open or closed systems) levels of e-signatures and certificates (ordinary and advanced e-signatures, ordinary and qualified certificates) electronic signatures of legal persons and CA PKI architecture hierarchical tree or a mesh? Cryptographic key management –generation of cryptographic keys for clients, –client’s key protection, – key escrow –key ageing

Key problems of e-signature law (3) Role of state in building PKI - the State electronic signature bureau Security problems: –protection of cryptographic keys (cryptographic key management in CA) –availability of archived data –secure storage of clients private (signing) key –during creating an e-signature use of private key in plaintext form do you know what are you signing?

Conclusions The idea of electronic signature is relatively simple. The implementation of cryptographic solutions causes lot of problems of legislative, technological, cryptological, information security, organisational and other character. We discussed some of problems we considered most important to write a practically apply-able law. More information