XML Signature 20041121 Choi, Yoon-jung. Outline Introduction Introduction Structure Structure Structure - Example Structure - Example Creation Creation.

Slides:



Advertisements
Similar presentations
An Overview of XML Digital Signatures Xuemei Wu. Introduction XML Digital Signatures are digital signatures designed for use in XML transactions. An XML.
Advertisements

XML DIGITAL SIGNATURE ASIM REHMAN YURI ALEGRIA. Introduction What is a digital signature Digital signature provides a mechanism for assuring integrity.
Web Service Security CS409 Application Services Even Semester 2007.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
M.Sc. Hrvoje Brzica Boris Herceg, MBA Financial Agency – FINA Ph.D. Hrvoje Stancic, assoc. prof. Faculty of Humanities and Social Sciences Long-term Preservation.
Public Key Infrastructure Ben Sangster February 23, 2006.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Can PKI be made simple enough to be used by non-experts? Signature formats and context Antonio Lioy ( polito.it ) Politecnico di Torino Dip. Automatica.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Web services security I
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Security Standards under Review for esMD. Transaction Timeline An esMD transaction begins with the creation of some type of electronic content (e.g. X12.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Chapter 13 Digital Signature
Implementation Of XML DIGITAL SIGNATURES Using Microsoft.NET.
Multimedia Communication and Information Logistics for AFTER-SALES AND PRODUCT LIFE- CYCLE SUPPORT Click to edit Master title style
Exchange of digitally signed SPSCertificate messages Overview of prototype of digital signature applied to SPSCertificate message between national systems.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
XML Signature Prabath Siriwardena Director, Security Architecture.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Secure Systems Research Group - FAU Web Services Cryptographic Patterns Presented by Keiko Hashizume Advisor: Prof. Eduardo Fernandez.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Web - based business and XML security. Dagmar Brechlerova.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
 A Web service is a method of communication between two electronic devices over World Wide Web.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Elliptic Curve Cryptography
Secure Systems Research Group - FAU A Pattern for XML Signature Presented by Keiko Hashizume.
EbXML Conference Ministry of Informatics
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
Introduction To Data Standards eRA SBIR Public Briefing March 4, 2002
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Web Services Security INFOSYS 290, Section 3 Web Services: Concepts, Design and Implementation Adam Blum
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Digital Receipt Onno W. Purbo Reference ry/flash/digital_receipts.html
Web Services Security Standards Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
T Network Application Frameworks and XML XML Security Basics Sasu Tarkoma Based on slides by Pekka Nikander.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
OASIS Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity OASIS Digital Signature Services and ETSI standards Juan Carlos.
Miroslav Pavleski (SETCCE)
Presented by Edith Ngai MPhil Term 3 Presentation
ELECTRONIC DOCUMENT: LITHUANIAN EXAMPLE
Introduction Used for communication to verify
Message Security, User Authentication, and Key Management
Lecture 6: Digital Signature
LAB 3: Digital Signature
Presentation transcript:

XML Signature Choi, Yoon-jung

Outline Introduction Introduction Structure Structure Structure - Example Structure - Example Creation Creation Validation Validation Conclusion Conclusion Reference Reference

Introduction XML Signature is a W3C recommendation that defines and XML syntax for digital signatures. XML Signature is a W3C recommendation that defines and XML syntax for digital signatures. It add authentication, data integrity, and support for non-repudiation to the data that they sign. It add authentication, data integrity, and support for non-repudiation to the data that they sign.

Introduction XML signatures can be used to sign data – a resource – of any type. XML signatures can be used to sign data – a resource – of any type. - detached signature - detached signature - enveloped signature - enveloped signature - enveloping signature - enveloping signature

Structure

Structure - Example

Structure - Example j6lwx3rvEPO0vKtMup4NbeVu8nk= j6lwx3rvEPO0vKtMup4NbeVu8nk= MC0CFFrVLtRlk=... MC0CFFrVLtRlk=... … </Signature>

Creation  Determine which resources are to be signed  Calculate the digest of each resource  Collect the Reference elements  Signing  Add key information  Enclose in a Signature element

Validation The required steps of core validation include Reference Validation and Signature Validation. The required steps of core validation include Reference Validation and Signature Validation. - Reference Validation - Reference Validation : The verification of the digest contained in each Reference in SignedInfo. : The verification of the digest contained in each Reference in SignedInfo. - Signature Validation - Signature Validation : The cryptographic signature validation of the signature calculated over SignedInfo. : The cryptographic signature validation of the signature calculated over SignedInfo.

Conclusion As XML becomes a vital component of the emerging electronic business infrastructure, we need trustable, secure XML message to form the basis of business transactions. As XML becomes a vital component of the emerging electronic business infrastructure, we need trustable, secure XML message to form the basis of business transactions. XML Signature is an evolving standard for digital signatures. XML Signature is an evolving standard for digital signatures.

Reference XML-Signature Syntax and Processing XML-Signature Syntax and Processing Introduction to XML Digital Signatures. (by Ed Simon) Introduction to XML Digital Signatures. (by Ed Simon) gnature gnature gnature gnature ocs/1.6/tutorial/doc/XMLDigitalSig natureAPI7.html ocs/1.6/tutorial/doc/XMLDigitalSig natureAPI7.html ocs/1.6/tutorial/doc/XMLDigitalSig natureAPI7.html ocs/1.6/tutorial/doc/XMLDigitalSig natureAPI7.html

The End Thank you for your listening.