LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
Digital Signatures Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Digital.
Public Key Management and X.509 Certificates
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
INFORMATION TECHNOLOGY LAW LECTURE 3- ELECTRONIC SIGNATURE Dr. Kadir Bas.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Exchange of digitally signed SPSCertificate messages Overview of prototype of digital signature applied to SPSCertificate message between national systems.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
DIGITAL SIGNATURE.
Ch 13 Trustworthiness Myungchul Kim
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
What Counts As An Esignature?
How the ESign Act Makes Esignatures Work
ESign Aashutosh.
Security Outline Encryption Algorithms Authentication Protocols
S/MIME T ANANDHAN.
Digital Signature.
Chapt. 10 – Key Management Dr. Wayne Summers
Chapter -8 Digital Signatures
PKI (Public Key Infrastructure)
One-way Hash Function Network Security.
National Trust Platform
Presentation transcript:

LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School

Legal Aspects of eDocuments Legal basis of e-Documents depens upon eSignature Law No 5070 in Turkey. Legal basis of e-Documents depens upon eSignature Law No 5070 in Turkey. In U.S. and EU eSignature laws were accepted. In U.S. and EU eSignature laws were accepted. But there are many countries that do not have any eSignature law. But there are many countries that do not have any eSignature law.

eSignature Law No 5070 was accepted on Jan 23, eSignature Law No 5070 was accepted on Jan 23, 2004.

Certificate Authorities in Turkey (ESHS)

CA A certificate authority or certification authority (CA) is an entity that issues digital certificates for use by other parties as trusted third party. A certificate authority or certification authority (CA) is an entity that issues digital certificates for use by other parties as trusted third party.

Electronic Signature Electronic Signature or Digital Signature is an electronic process logically associated with an electronic record by a person with the intent to sign the record. Electronic Signature or Digital Signature is an electronic process logically associated with an electronic record by a person with the intent to sign the record.

Paper-based signing process versus e-Signature

Authenticity Digital signatures authenticate the source of messages. A valid signature shows that the message was sent by a user. Digital signatures authenticate the source of messages. A valid signature shows that the message was sent by a user. Authentic means that you know who created and signed the document. Authentic means that you know who created and signed the document.

Authorization Authorization is the function of specifying rights, responsibility and competence of the user who sent a e-document. Authorization is the function of specifying rights, responsibility and competence of the user who sent a e-document.

Integrity Prevent the orginal message from any alteration. Only sender can be change content of orginal document. Prevent the orginal message from any alteration. Only sender can be change content of orginal document.

Hashing The process whereby e-document was input to a cryptographic hash function to produce a mixed content. The process whereby e-document was input to a cryptographic hash function to produce a mixed content.

Time Stamp A timestamp denotes the date and time at which a certain e-Document signed. A timestamp denotes the date and time at which a certain e-Document signed. Preventing from retrospective issuance of a document by dating back. Preventing from retrospective issuance of a document by dating back.

Public key infrastructure Public Key Infrastructure is an encryption system used by Certificate Authorities to issue digital certificates. Public Key Infrastructure is an encryption system used by Certificate Authorities to issue digital certificates.

Biometrics Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control.

Mobile Signature

eUCP Electronic documents in the future commercial life will be very active according to the vision of ICC - International Chamber of Commerce at the beginning of In this year a working group was formed for the electronic submission of documents under the letter of credits. As a result eUCP (Supplement to UCP 600 for Electronic Presentation) brochure went into effect as of 1 April Electronic documents in the future commercial life will be very active according to the vision of ICC - International Chamber of Commerce at the beginning of In this year a working group was formed for the electronic submission of documents under the letter of credits. As a result eUCP (Supplement to UCP 600 for Electronic Presentation) brochure went into effect as of 1 April 2002.