Presentation is loading. Please wait.

Presentation is loading. Please wait.

© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.

Similar presentations


Presentation on theme: "© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation."— Presentation transcript:

1 © Julia Wilk (FHÖV NRW) 1 Digital Signatures

2 © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation in public authorities 5. Conclusion

3 Digital Signatures © Julia Wilk (FHÖV NRW)3 1. Introduction What is a Digital Signature? - A Digital Signature is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper. - Sometimes also used: Electronic Signature (here synonymic) Why is it important for E-Government? - Handwritten signature often required in public law - Digital signature can replace it - More possibilities of electronic services:  Cost savings  Saving Time

4 Digital Signatures © Julia Wilk (FHÖV NRW)4 2. Basics 2.1. Law Germany: “Signaturgesetz” in 1997 - Precondition for safe and legally binding electronic signatures - Regulates specifications for using digital signatures Europe: EU Signature Directive - Unification of different signature laws in the EU (especially different security levels) - Basis for changes of the German law in 2001, 2005 and 2007 - Changes made the law conform to the European directive

5 Digital Signatures © Julia Wilk (FHÖV NRW)5 Law: Different Signatures 1. Electronic signature - Data in electronic form which are attached with other electronic data and which serve as a method of authentication 2. Advanced electronic signature - Means an electronic signature that is also - uniquely linked to the signatory, - capable of identifying the signatory, - linked to the data to which it relates that any change of the data is detectable. 3. Qualified digital signature - based on a qualified certificate of a Certification Authority (CA) - Germany: sole signature that is equal to a handwritten signature (§ 126a BGB) 4. Qualified digital signature with accreditation - Like a qualified signature, but furthermore  CA was accredited voluntarily  Proof for comprehensive technical and administrative security

6 Digital Signatures © Julia Wilk (FHÖV NRW)6 2.2. Security Properties

7 Digital Signatures © Julia Wilk (FHÖV NRW)7 Security Properties of handwritten messages Authenticity - Nobody should impersonate someone he doesn’t is Integrity - A message can not be falsified unnoticed Obligation - The signature has to assure legal certainty Confidentiality - No person except the receiver should be able to read the message

8 Digital Signatures © Julia Wilk (FHÖV NRW)8 3. Elements of digital signatures 3.1. Basic functionality 3.2. Hash functions and hash results 3.3. Asymmetric encryption 3.4. Certification 3.5. User’s realisation

9 Digital Signatures © Julia Wilk (FHÖV NRW)9

10 Digital Signatures © Julia Wilk (FHÖV NRW)10 3.2. Hash functions and hash results Solution: Not the document itself, but its hash result gets signed Hash function:= algorithm which creates a digital representation in the form of a hash result of a standard length which is usually much smaller than the message but substantially unique to it Hash function also known as “digital fingerprint” Premises for hash functions: - Hash function has to be unique - “One-way-property”

11 Digital Signatures © Julia Wilk (FHÖV NRW)11 3.3. Asymmetric encryption Basic: a pair of keys, namely a private key and a public key Premises: - Private key has to be saved, e.g. using a chip card with a PIN - Public key can be accessible for everyone, but its owner’s identity has to be identifiable without problems to guarantee authentication (certificate) - Not possible to generate the Private key by knowing someone’s Public key

12 Digital Signatures © Julia Wilk (FHÖV NRW)12 3.2. Encryption: Proceeding Generating message’s digest (hash result) Using Public Key to encrypt hash result Result of the encryption: digital signature Sender sends - message, - digital signature and - certificate to receiver Receiver wants to check - Integrity  Generating hash result, compare it to the sender’s hash result and decrypting the message with the sender’s public key - Authenticity  Can be checked by means of the certificate

13 Digital Signatures © Julia Wilk (FHÖV NRW)13 3.2. Encryption: Proceeding

14 Digital Signatures © Julia Wilk (FHÖV NRW)14 3.4.Certification Important for authenticity: - Receiver of a message has to be sure that the public key he uses really belongs to the sender Solution: Certification Authority (CA) - Independent, confidential - Law causes premises for a CA Certificate: comparable with a digital identity card Document that shows someone’s identity doubtless Three-stepped infrastructure guarantees authenticity: - Sender - CA - Authority that controls CA

15 Digital Signatures © Julia Wilk (FHÖV NRW)15 3.5. Realisation by user Important for security: private key has to be absolutely saved and only available for his user Technical premises: - Chip card and PIN  High security level because of “possession and knowledge”  Cards available through bank branches, but they are only mediators of accredited CAs  Encryption of the hash result is realised in a matter of seconds - Card reader - Computer and corresponding software

16 Digital Signatures © Julia Wilk (FHÖV NRW)16 3.5. User acceptance Citizen’s interests: - Doing as much as possible by using the internet - Survey: 88 % of German citizens would like to do everything concerning public administration online to avoid waiting times and save time Today: Nearly every authority has got a homepage where you can download forms or search for information Problem: Forms often need to be signed handwritten We learned: Only the qualified digital signature can replace a handwritten signature Using qualified signatures premises special equipment (remember chip card, card reader…)

17 Digital Signatures © Julia Wilk (FHÖV NRW)17 3.5. User acceptance Question: Are the citizens really willing to pay for their wish to do as much as possible online? - Costs for licences are estimated about 50 € in Germany - Solution: Equipment has to be all-purposed, it has to be possible to use the equipment in other fields, like home banking e.g. Further problems: - Administrative procedures often need original documents (like a family register or a birth certificate) - If you do everything in a electronic way, the expert advice of the official is missing which maybe causes mistakes

18 Digital Signatures © Julia Wilk (FHÖV NRW)18 3.5. User acceptance Summing up: - The more possibilities of using digital signature equipment exist, the more will be established the digital signature and also the citizen’s acceptance - Electronic government offer is rising year by year, so maybe also the success will rise with it

19 Digital Signatures © Julia Wilk (FHÖV NRW)19 4. Realisation in public authorities 2001: only 4,8 % of German local authorities use digital signatures 2006: 30 % use respectively qualified signatures and qualified signatures with accreditation

20 Digital Signatures © Julia Wilk (FHÖV NRW)20 Use of digital signatures in German cities (Survey by KGSt, 2006)

21 Digital Signatures © Julia Wilk (FHÖV NRW)21 5. Conclusion Offering and diffusion of digital signatures had grown in the last years because of - Unification of law in the EU - Further development - Increasing disposition of public authorities to engage in digital signatures Citizen’s vantages: - Many transactions can be done from the computer at home - Citizen is not bound to opening times and reachability of public authorities Public authorities: - Saving costs in traditional sectors - New technologies cause other costs and other resources like qualified employees - Long-term: digital signatures can redound to more efficiency

22 Digital Signatures © Julia Wilk (FHÖV NRW)22 5. Conclusion Security - Today things like the one-way hash function, asymmetric encryption and sophisticated chip card system cause secure proceedings - The security standard has to be conformed to the computer systems that get increasingly powerful Costs - High costs are indispensable to guarantee a high security level User’s/Citizen’s Acceptance - Chip card systems are easy to use - High costs could reduce the success of digital signatures - Necessary to coordinate standards to use a chip card system for many different applications

23 Digital Signatures © Julia Wilk (FHÖV NRW)23 5. Conclusion Summing-up: - Today digital signatures are under way and can only be seen as an amendment to traditional procedures - In the future digital signatures will get more and more important to guarantee an efficient action of public authorities


Download ppt "© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation."

Similar presentations


Ads by Google