Digitally Signed Transcripts Department of Computer Science, University of Wisconsin – Eau Claire Student Researcher: Kevin M. Spinar

Slides:



Advertisements
Similar presentations
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
E-Transcripts – Electronic procedure for the exchange of curriculum data of exchange students.
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Electronic Data Interchange (EDI)
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
E-Invoicing & Legal Aspects RA42 Presentation Michael Uebber, LH SIS – Simplified Interline Settlement.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Electronic Mail Security
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
Masud Hasan Secue VS Hushmail Project 2.
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
Internet Security for Small & Medium Business Week 6
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
DIGITAL SIGNATURE.
Development and Implementation of a Honeynet on a University Owned Subnet Erin L. Johnson, John M. Koenig, Dr. Paul Wagner (Faculty Mentor) {johnsone,
Secure Systems Research Group - FAU A Pattern for XML Signature Presented by Keiko Hashizume.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Network Security Celia Li Computer Science and Engineering York University.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
TAG Presentation 18th May 2004 Paul Butler
The Secure Sockets Layer (SSL) Protocol
TAG Presentation 18th May 2004 Paul Butler
BY GAWARE S.R. DEPT.OF COMP.SCI
S/MIME T ANANDHAN.
Digital Signature.
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Electronic Payment Security Technologies
Presentation transcript:

Digitally Signed Transcripts Department of Computer Science, University of Wisconsin – Eau Claire Student Researcher: Kevin M. Spinar Faculty Mentor: Professor Paul J. Wagner Funded by: Department of Computer Science and University of Wisconsin – Eau Claire Differential Tuition Problem Every year, millions of college transcripts are printed, enveloped, stamped, and sent through the postal system. These transcripts could be sent just as easily by almost instantaneously with virtually no cost. However, is generally viewed as an insecure medium of exchange, allowing others to intercept and modify s during their transit over the internet. Objective The objective of this research is to develop a method to send transcripts securely over the internet using digital signatures. Digital signatures have successfully been used to validate the authenticity of electronic documents, software, and s. A digital signature is created by applying a private key, known only to the creator of the document, to the document, generating a unique signature. As long as the private key remains private, only the holder of the key can modify the document, ensuring the integrity of the contents. If the transcript has been digitally signed, even if it is sent over an insecure medium such as , the receiver can be confident that the transcript has not been altered. The focus of this project is to create a system that will read in the student transcript information, generate a document, apply a signature, and transmit the secured document to the intended receiver. Conclusion The technology required to create and send digitally-signed transcripts has been available for many years. The issue resides in the reluctance of educational institutions to embrace technology and to trust the security inherent in digital signatures. With proper education and readily- available services to generate signed transcripts, educational institutions should continue to reduce the amount of documents physically transmitted and rely more on electronic transfers. This project is hopefully one step in that direction. Process A student logs onto a computer (1) and submits the transcript request using an online form (2). The request is processed by a university server (3), which retrieves the student transcript information from the university’s database (4). The student information is combined with a document layout template (5a) to create an electronic transcript (5b). The document is then digitally signed using the university’s private key (5c). The resulting signed transcript is sent to the server (6), which sends the document across the internet (7). Even though the could be intercepted, the signed document cannot be modified without invalidating the signature. The arrives at the destination server (8) and is downloaded by the intended recipient (9). The digital signature is validated automatically by the recipient’s document viewing software against a certificate server (10), ensuring the authenticity of the document. Implementation This project attempts to provide all the functionality necessary for a university to set up a service to create and send digitally-signed transcripts with the least amount of effort possible. Unfortunately, as database configurations vary from university to university, individual universities will need to implement the extraction of the student information from their database (4) and convert the information into the format that the transcript generator requires. However, the remainder of the steps—creation of the transcript, signing of the transcript, and ing of the document—is handled by the transcript transmission service.