Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.

Slides:



Advertisements
Similar presentations
Ministry of Public Sector Development Public Sector Development Program Better Government Delivering Better Result.
Advertisements

Global e¦security WISeWorld2000 The WISeKey Global Trusted Infrastructure By Carlos Moreira President & Cofounder WISekey.
Steps towards E-Government in Syria
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
ITU E-Commerce Conference for the Arab Region - May 2001 A Digital Signature Act for Egypt: Understanding the Challenges! Dr. Sherif Hashem Head, Electronic.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Worldwide Access to Foreign Law: International & National Developments Toward Digital Authentication IFLA World Library and Information Congress 2012 Helsinki,
Empowering E-Business in Egypt: Facing the Challenges!
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
The Icelandic PKI project Jóhann Gunnarsson Head of Division, Ministry of Finance.
Assuring e-Trust always 1 Guaranteeing Electronic Trust at all times.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Strengthening Public Finance Management Through Computerization of Procurement Management System High Level Forum on Procurement Reforms in Africa Tunisia.
June 2003 © S.Hashem Empowering E-Business in Egypt: Facing the Challenges! Dr. Sherif Hashem Director, Information Society Development Office Ministry.
Civil Registry Agency of the Ministry of Justice, Georgia Georgian ID card Mikheil Kapanadze.
UN Economic Commission for Europe 23rd UN/CEFACT FORUM 7-11 April rd UN/CEFACT FORUM – Geneva Tahseen A. Khan Project Proposal : Trusted Third Party.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Information and Communication Technologies in the field of general education in Armenia NATIONAL CENTER OF EDUCATIONAL TECHNOLOGIES.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Facilitating Cross Border Trade and Commerce through Mutual Recognition of Digital Signatures/Certifying Authorities Controller of Certifying Authorities(CCA)
Recent Projects & progress made
F. Guilleux, O. Salaün - CRU Middleware activities in French Higher Education.
E-government in the Pacific Islands: project update Rowena Cullen Graham Hassall.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The State Procurement Agency of the Republic of Azerbaijan Welcomes the participants of the 11 th Public Procurement Knowledge Exchange Forum “Procurement.
IT in the Swedish public sector Britta Johansson
URUGUAY National Committee for the Information Society UNCTAD Expert Meeting Electronic Commerce Strategies for Development Geneva 10 – 12 July 2002 Uruguay.
X-Road – Estonian Interoperability Platform
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
The Evolving U.S. Federal PKI Richard Guida Chair, Federal PKI Steering Committee Federal Chief Information Officers Council
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
1 June Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Electronic Signatures Implementation 1 DIAGRAM of interrelationships CERTIFICATION INFRASTRUCTURE EXAMPLE LAYOUT of a trust centre.
DIGITAL SIGNATURE.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Digital Signatures and Digital Certificates Monil Adhikari.
European Electronic Identity Practices Country Update of Estonia Speaker: Ivar Jung Date:
e-Procurement System (SETAD)
Transforming Procurement E- GP Planning and change management Action Plan for E- GP implementation in Kenya Jerome Ochieng Public Procurement Oversight.
National Qualification Framework Romanian Experience.
ICT Indicators Egypt Profile Eng. Hesham Baraka Director of Information Center (NTRA) Dr. Nagwa Elshnawy Director of Strategic Planning ( ITIDA ) Presented.
EJBCA AT THE HEART OF A TRUST CENTER F.Koray ATSAN Trust Center Project manager F.Koray ATSAN Trust Center Project manager
© Software602 a.s. SOFTWARE Zdenek Metodej Zalis Martin Vondrous Ondrej Malek.
ESign Aashutosh.
 The Executive President shall represent
Presentation transcript:

Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA

ITIDA -Jan 2010 Drafting an Electronic Signature Law National E-Signature Committee (members): –Ministry of Communications and Information Technology –Ministry of Justice –Ministry of Economy and Foreign Trade –Ministry of Finance –Ministry of Foreign Affairs –Ministry of Interior –Ministry for Administrative Development –Central Bank of Egypt –Cabinet Information & Decision Support Center

E-Signature Law -In 2004, law no. 15 was officially released to help enforce the e-Signature in Egypt and to establish the (Information Technology Industry Development Agency–(ITIDA). -The Executive Directive of the E-signature law issued in May The e-signature law establishes legal recognition of electronically (digitally) signed documents and contracts as well as (unsigned) electronic documents -The establishment of ITIDA supports Egypts e-commerce industry by securing the Internet as a legally viable medium for online financial activities.

Continue…… In 28th, September 2009, Prime Minister Dr. Ahmed Nazif witnessed the launch of E-Signature services for the public and private sectors and the inauguration of the Egyptian Root-CA trust center, marking the e-signature authorization by the Information Technology Industry Development Agency (ITIDA).

Regulating Digital Certificates Awareness and technical support Licensing and auditing Request for digital certificates Digital Certificates Information Technology Industry Development Agency (E-Signature regulator) Client Organizations Digital Certificate Providers Providers

Egyptian E-Signature Infra- Structure National ROOT Certification Authority Country XY Cross recognition Signature Key Holders ( End Users) Gov Employees CSP1 CSP2 CSP3 CSP4 GOV CA Operates Certifies Issues

The Egyptian Root CA -As one of its primary roles, ITIDA operates the Egyptian Root Certificate Authority (Root CA) according to the highest security standards offering a continuous 24hx7 operation (based on the means of a 2nd hot-standby Trust Center). -The national Root CA is the trust anchor for all relying parties within that domain. Furthermore, the national Root CA is the legal and national base upon which all IT applications, E-commerce and E-business Transactions will be affected.

Root CA Key Functions Issues digital certificates for licensed certificate service providers (CSPs) and publish them to be available 24/7. Helps to prove or deny instantaneously the validity of digital certificates of the licensed CSPs by providing both OCSP Service and LDAP directory. Root CA has the rights to stop the operation of any CA in case of security deficiencies. Working as TSA (Time Stamping Authority) for CSPs.

Continue…… Responsible for interoperability between other countries providing a point of communication between Egypt and other nations in relations of E-signature. Auditing all the PKI technical requirements of CSPs against the Egyptian executive directives and all the updated international standards. Offers technical consultations to all the community in the field of Information Security especially in Public key Infrastructure.

Achievements…… Root CA main trust center with 6 IT fortified rooms and more than 40 different types of servers and security equipments has been implemented to operate 24/7 by 100% highly trained Egyptian staff. GOV- CA trust center is implemented and is ready to serve the governmental organizations. Signing an MOU with the German Root CA to facilitate the cross recognition with the German Root CA. Three private CSPs are ISO certified and one of them passed ITIDA audit (financial, legal and technical) and are ready to issue digital certificate private sector under the hood of Egyptian Root CA.

Continue…… The first deployed private CSP has been securely connected to the Root CA main trust center to maintain a copy of all the issued digital certificates and CRLs to maintain client rights in case of disaster. Auditing process by ITIDA is to be continued for the remaining CSPs. Home made E-signature tools are ready to be used –(Egyptian Smart Token (with and without Fingerprint). –E-Signature Applications (Desktop, Web, and Mobile)

Pictures from Reality

ITIDA Cryptography Suite

Smart Token Software

Mobile Phone Application

The Future…… Finalizing the Root CA disaster recover site at the Ministry of finance premises 30 KM apart from the Root CA main site. Doubling the staff to achieve the business continuity. Cross recognizing our Egyptian Root CA with other imitates in other countries. Collaborating with the Egyptian CERT to maintain the work sustainability.

Questions ???????

Thank You…