Evidence Record Syntax <draft-ietf-ltans-ers-00.txt>

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Web security: SSL and TLS
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Trusted Archive Protocol (TAP) Carl Wallace
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Web services security I
Archive Time-Stamps-Syntax Dr. Ulrich Pordesch
Computer Science Public Key Management Lecture 5.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
SSL Technology Overview and Troubleshooting Tips.
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Bob can sign a message using a digital signature generation algorithm
Exchange of digitally signed SPSCertificate messages Overview of prototype of digital signature applied to SPSCertificate message between national systems.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Secure Electronic Transaction (SET)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Using SCVP to Convey Evidence Records Carl Wallace Orion Security Solutions.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
IETF - LTANS, March 2004P. Sylvester, Edelweb & A. Jerman Blazic, SETCCE Introduction The following slides were prepared as a result of analysis and discussion.
Chapter 15: Electronic Mail Security
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
1 Integrating digital signatures with relational database: Issues and organizational implications By Randal Reid, Gurpreet Dhillon. Journal of Database.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
XML Evidence Record Syntax
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
LTANS WG: ERS November 7, 2005 Tobias Gondrom. LTANS WG (ltans): ERS Draft straightened up Corrected ERS (feedback from Peter and Carl) Prepared for WG.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
The Secure Sockets Layer (SSL) Protocol
Denis Pinkas. Bull SA. Cryptographic Maintenance Policy IETF LTANS meeting in Paris August, 1rst , 2005 Denis Pinkas. Bull SA.
ERS to XML Introduction to ERS syntax in XML format
Cryptography and Network Security
LTANS WG: ERS Status July 10, 2006 Tobias Gondrom.
Homework #5 Solutions Brian A. LaMacchia
The Secure Sockets Layer (SSL) Protocol
National Trust Platform
Presentation transcript:

Evidence Record Syntax <draft-ietf-ltans-ers-00.txt> Brian Hunter brian.hunter@sit.fhg.de

Archiving electronic documents Long-term Problems algorithms weaken, certificates expire verification data no longer available changes of formats and media ArchiSig-Project 2001 - 2003 requirements, concepts, implementation, evaluation clinical trial in Heidelberg simulation study (mock trial) influence on ERS Digital signatures offer the possibility to secure integrity and authenticity of data and documents. Data + signature, the eletronic form, shall substitute paperbased form, paper + handwritten signature In many fields of application, documents need to be archived for 30 years or more in a secure and conclusive way. In Civil Procedure Code Verjährungsfrist is 30 Years Some Documents, e.g. those, which are needed to proove properties, need to be archived for ever One problem is, that additional verification data, e.g. actual used public keys of certification instances may be not available in future. We do not deal with that problem here. Another problem, the topic of this lecture, is, that the hash- or public key-algorithms used can loose their security suitability in the course of time. The reason is, that computers will get faster or new algorithms will be found, so it is possible to find other documents to the same hash value or to find signature keys So there is a need to conserve value of evidence of signed documents over long times actively. Aim of the archisig-project ist to develope technical concepts and solutions which have to be practical, cost-effective and in accordance to legislation.

Goals of data structure Standard structure containing complete proof of existence, which can be exchanged between parties EvidenceRecord external format, without forcing a particular architecture to be used by Archive Provider No restriction on type of data Support of encrypted data

Requirements from LTANS include all timestamps necessary to verify existence data structure can efficiently provide evidence for many archived data objects possible to provide evidence for data groups even within groups, non-rep proof for single object still possible deletion possible without affecting proofs of other data objects time-stamping possible without accessing data objects; only access data when hash alg becomes weak single location of all hash algorithms applied possible to include evidence and data within one structure or separately possible to archive encrypted data and allow integration of encryption info within evidence record possible to integrate additional info within the evidence record Digital signatures offer the possibility to secure integrity and authenticity of data and documents. Data + signature, the eletronic form, shall substitute paperbased form, paper + handwritten signature In many fields of application, documents need to be archived for 30 years or more in a secure and conclusive way. In Civil Procedure Code Verjährungsfrist is 30 Years Some Documents, e.g. those, which are needed to proove properties, need to be archived for ever One problem is, that additional verification data, e.g. actual used public keys of certification instances may be not available in future. We do not deal with that problem here. Another problem, the topic of this lecture, is, that the hash- or public key-algorithms used can loose their security suitability in the course of time. The reason is, that computers will get faster or new algorithms will be found, so it is possible to find other documents to the same hash value or to find signature keys So there is a need to conserve value of evidence of signed documents over long times actively. Aim of the archisig-project ist to develope technical concepts and solutions which have to be practical, cost-effective and in accordance to legislation.

ERS Overview Syntax and Processing (particularly verification) of an Archive Time Stamp Element to verify existance of any data objects over an undetermined period of time, useable for signature renewal optimized (but not restricted to) centralized Archive Time Stamping by Trusted Archive Authority including optional encryption addendum: integration into signed documents Not specified here: Service protocol: possible but not necessary for internal use Architectures of archive systems

Archive Time-Stamp Archive Time Stamp Initial Stamp hash-tree (Merkle) time-stamp containing digital signature single time-stamp for many data objects Initial Stamp event: after document is archived collect hash values of many documents and build tree, request time-stamp store archive time-stamp renew if necessary Reduction to Archive Time-Stamp necessary hash values for verification + time-stamp {SEQUENCE of SEQUENCE of OCTET STRING time-stamp} Hint: each Sequence Of Octet String is one layer of the tree SEQ2[1] SEQ1[2]

Time-Stamp Renewal Event: Any algorithm in time-stamp becomes weak (or time-stamp certificate expires) Method hash time-stamp with old hash algorithm and include it in new archive time-stamp Properties no access to data objects only few (at minimum 1) time-stamp for a whole archive Reduction: ArchiveTimeStampChain SEQUENCE of ArchiveTimeStamp

Hashtree Renewal Event: Hash Algorithm of chain becomes weak Method (for each data object) build Archive Time-Stamp chain include hash of (hash of chain + hash of data object) in new Archive Time-Stamp Properties need to access data objects avoidable via redundant hash trees Reduction: ArchiveTimeStampSequence SEQUENCE of ArchiveTimeStampChain

ERS Approach Client - Submission Select data objects (document, ..) Optional: Encrypt data objects Trusted Archive Authority – Reception and maintenance Initial Archive Time-Stamp Renewal: Time-Stamp Renewal, Hashtree Renewal Reduce hashtrees, generate Archive Timestamps Elements Client - Retrieval Optional: Decrypt data objects Optional: Add encryption info to record Optional: Integrate as an attribute if wanted Verify Archive Time-Stamps Element and document

ERS Approach Client Trusted Archive Authority Judge Doc Storage .. eDocn Doc Storage Evidence Record1 Time ERinit= rHT(Doc1 wrt Doc1-j) TSa (Root of rHT) Today eDoc1 rHT(TSa wrt other TS) TStsr (Root of rHT) ERtsr1= Expiry of TS-cert or sig alg weakens rHT(TSa wrt other TS) TStsr (Root of rHT) ERtsr2= Expiry of TS-cert or sig alg weakens rHT(Prev ERs|Hash(Doc1)..) TStsr (Root of rHT) ERhtr= Hash alg weak ER1 EvidenceRecord1 EncryptionMethod cek or private key rHT = reduced hash-tree TS = Time-stamp eDoc1 Judge

Evidence Record Structure EvidenceRecord ::= SEQUENCE { version INTEGER { v1(1) }, digestAlgorithms SEQUENCE OF AlgorithmIdentifier, cryptoInfos [0] CryptoInfos OPTIONAL, encryption [1] EncryptionMethod OPTIONAL, archiveTimeStampSequence ArchiveTimeStampSequence} Req.7 digestAlgorithms Req.10 cryptoInfos Req.9 encryption Req.1-6 archiveTimeStampSequence

Archive Time-Stamp ArchiveTimeStamp ::= SEQUENCE { digestAlgorithm AlgorithmIdentifier OPTIONAL, reducedHashtree [0] SEQUENCE OF {SEQUENCE OF OCTET STRING} OPTIONAL, timeStamp ContentInfo} ArchiveTimeStampChain ::= SEQUENCE OF ArchiveTimeStamp ArchiveTimeStampSequence ::= SEQUENCE OF ArchiveTimeStampChain R.2-6 reducedHashtree R.1 timeStamp

Optional Encryption Caution: Encryption must be unambigious! Method: CMS-Encryption before archiving (Algorithms: RSA, DES-CBC) Archive Service time-stamps data as always add CMS-cover to CMS-encryption-params, store content seperately verification: reconstruction of archive time-stamped data object by decryption of content-encryption key, reencrypt content, insert content CMS_encryption_params::= SEQUENCE { encryptionCover ContentInfo, publicKey BIT STRING OPTIONAL, params CHOICE { [0] privateKey BIT STRING, [1] encryptionKeyRan EncryptionKeyRandom}} EncryptionKeyRandom::= SEQUENCE { encryptionKey OCTET STRING, randomValue BIT STRING}}

Appendices Optional Integration CMS: signed data Archive Time-Stamps-Element as an unsigned signature attribute for signature

Summary Syntax + Processing of ArchiveTimeStamp Element optimized for centralized time-stamping effective for large document volumes applicable for any data objects and groups of data objects normally no need to access data redundancy easy to realize compatible with existing services