Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 1 Research & Development for Internet Security in Japan November 24, 2000 Ryoichi Sasaki (

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
ECE Lecture 1 Security Services.
All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 1 Internet/Marks Hitachi, Ltd ,16 - Visual Marks for Cyber World -
Module 9: Fundamentals of Securing Network Communication.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Digital Signatures and Digital Certificates Monil Adhikari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Key management issues in PGP
Research & Development for Internet Security in Japan
e-Health Platform End 2 End encryption
Chapter 8 Network Security.
Lecture 4 - Cryptography
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 1 Research & Development for Internet Security in Japan November 24, 2000 Ryoichi Sasaki ( ) Senior Chief Researcher Systems Development Laboratory, Hitachi, Ltd. 14th AFSIT AFSIT : Asian Forum for the Standardization of Information Technologies

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 2 Table of Contents 1. Introduction 2. Security Threats and Countermeasures 3. Status on Security Countermeasures in Japan 4. Security Technology Creates Internet New Era 5. Current Status on Security R&D in Japan 6. R & D on Security Technologies in Hitachi 7. On Security Standards

Copyright (c) 2000 Hitachi, Ltd. All rights reserved Introduction Current Situation of Internet in Japan

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 4 Trend on Number of Hosts Connected to Internet (Number in '95 is 100% for each country) (%) Japan

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 5 Number of Internet Users in Japan From White Paper 2000 of Ministry of Posts and Telecommunications Number (M Persons) (%) (Year) Diffusion Rate %

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 6 Predicted Amount of E-Commerce (Business to Business) Japan USA Trillion Yen Year Announced by MITI in 1999 9

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 7 Background of Increase of Security Threat Big Digital Money Flow on Internet: More Powerful Attack to Get Big Money Increase of Victim Candidates Rapid Spread of Internet インターネットの普及 Increased Connection of Enterprise Network to Internet : Attack Increase via Internet to Extreme Valuable Information

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 8 Loss Caused by Attack to Security in USA Estimated by FBI / CSI M$ M$ M$ 120M$ 260M$

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 9 Number of Reported Security Incidents in Japan Data from JPCERT 97 1Q 97 2Q 97 3Q 97 4Q 98 1Q 98 2Q 98 1Q 98 3Q 98 4Q 99 1Q 99 2Q 99 3Q 99 4Q 00 1Q

Copyright (c) 2000 Hitachi, Ltd. All rights reserved Security Threats and Countermeasures

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 11 Objects Electronic Commerce Threats to Security Computer Files Threats to Security Loss of Confidentiality Loss of Integrity Loss of Availability (Repudiation) (Eavesdropping) (Interruption) (Improper Use) Loss of Evidence Network

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 12 (1) Protection against Intrusion (a) Access Control (Firewall etc.) (b) Encryption (2) Prevention,Detection, Recovery (a) Security Surveillance (b) Security Audit etc. Countermeasure against Attacker Countermeasure by Technology Countermeasure by Management (a) Security Policy Establishment (b) Security Education Attacker Intrusion Masquerade Security Hole Attack

Copyright (c) 2000 Hitachi, Ltd. All rights reserved Status on Security Countermeasures in Japan

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 14 Rate % DecidedDecidingUnder Consideration Not DecidedUnnecessaryNo Answer Investigated by JIPDEC in 1999 No. of Companies : 867 No. of Mean Employees : 2194 persons Security Policy Investigated Results on Security Measure Status (1) is decided in only less than one fifth of companies. JIPDEC: Japan Information Processing Development Corporation

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 15 Rate(%) Exist Under Consideration Not Exist Security Specialist exists in less than one fourth of companies. Investigated Results on Security Measure Status (2) Not Necessary No Answer

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 16 Investigated Results on Security Measure Status (3) Usage of Password Usage of Firewall Usage of Access Control Soft Access Control to Outside Inhibition of Changing LAN Connection Log Analysis Others No Measure Firewall is used in more than 50% companies. Limitation of Network Operator

Copyright (c) 2000 Hitachi, Ltd. All rights reserved Usage of Cipher Not Usage No Answer Cipher is used in less than 15% companies. Investigated Results on Security Measure Status (3) 14.7 Rate(%)

Copyright (c) 2000 Hitachi, Ltd. All rights reserved Security Technology Creates Internet New Era

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 19 Inter Individuals Information Sharing GroupWare Mail, News, WEB Inner Companies Inter Companies Public, Home etc. EC(B to C)EC(B to C) E-Government EC(B to B)EC(B to B) E-Election New Social InfrastructureNew Social Infrastructure Internet * Intranet Extranet Socialnet Coverage E-Auction Future Direction Security Technologies Support Internet New Era Digital Signature Digital Watermarking Security Technologies Additional Features Information Exchange Improvement of work efficiency Application to Management Strategy Creation of new value of services E-Library Note : * Narrow Meaning

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 20 Outline of Digital Signature (1) Entity Authentication : Protection from Masquerade (2) Message Authentication : Detection of Message Manipulation Real World Digital World Objectives (1) Entity Authentication (2) Message Authentication Usage of Seal or Signature for Identifying Originator Usage of Paper and Ink for Detecting Manipulation Digital Signature or Electronic Seal Usage of Asymmetric Cipher* : It is possible to identify single signature key user. Usage of Hash Function : It is possible to detect manipulation by checking hash value. * Asymmetric Cipher equals Public Key Cipher

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 21 Digital Signature Scheme Massage (M) Alice Encryption by Using Sa and Asymmetric Cipher Private Key of Bob ( Sa ) :Secret Hash Function(h) Hash Value ( h(M)) M +Digital Signature Digital Signature (S=Sa(h(M))) Bob Decryption by Using Pa and Asymmetric Cipher Public Key of Bob ( Pa ) : Open h’=Pa(S) h”=h(M) Compare Authenticated If only one bit of M was changed, the hash value will be changed totally Pair Keys Digital Signature (S=Sa(h(M))) Hash Function(h) M +Digital Signature =

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 22 Necessity of Certification Authority Objective:Certificate the real owner of public key Pa ( Protect to pretend Pc generated by Carol as Pa of Bob) Certification Authority:CA Bob Alice (1) Generate Private Key:Sa Public Key :Pa Private Key of CA: Sn Secret (2) Pa with Sn (Pa) (5) Signed Message + X.509 Certificate (6) Pn (7) Calculate Pa Pa= Pn(Sn(Pa)) (8) Use Pa for Verification Public Key of CA: Pn Open (4) Public Key Certificate (X.509 V.3) (3) Registration of Pa and the Owner (Note:There was same system in the era of King Hammurabi about 4100 years ago.) (Asymmetric Cipher )

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 23 Example of Structure for CAs Root CA CA11 CA12 EE1 EE2 EE3 EE4 EE: End Entity ( User of CA ) Hierarchical Structure of CAs Certificate CA1 CA2

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 24 PKI for Supporting Certification Root CA CA11 CA12 EE1 EE2 EE3 EE4 Certificate CA1CA2 PKI consists of protocols, services, and standards supporting applications of public-key cipher (asymmetric cipher), especially related the use of Certificate Authority(CA). PKI : Public Key Infrastructure

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 25 Inter Individuals Information Sharing GroupWare Mail, News, WEB Inner Companies Inter Companies Public, Home etc. EC(B to C)EC(B to C) E-Government EC(B to B)EC(B to B) E-Election New Social InfrastructureNew Social Infrastructure Internet * Intranet Extranet Socialnet Coverage E-Auction Future Direction Security Technologies Support Internet New Era Digital Signature Digital Watermarking Security Technologies Additional Features Information Exchange Improvement of work efficiency Application to Management Strategy Creation of new value of services E-Library Note : * Narrow Meaning

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 26 Example of Watermarking Original ImageEmbedded Image Owner Htachi buyer Sasaki Embedd- ing software Owner Hitachi Buyer Sasaki Extract- ing Software Embedded Position

Copyright (c) 2000 Hitachi, Ltd. All rights reserved Current Status on Security R&D in Japan

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 28 Main Players on Security R & D in Japan Collaboration Universities Companies Government MITI - IPA MPT - TAO Fund for Security Projects MITI : Ministry of International Trade and Industry MPT : Ministry of Posts and Telecommunications IPA : Information - Technology Promotion Agency, Japan TAO : Telecommunications Advancement Organization of Japan STA : Science and Technology Agency STA

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 29 Main Players on Security R & D in Japan Collaboration Universities Companies Government MITI - IPA MPT - TAO Fund for Security Projects MITI : Ministry of International Trade and Industry MPT : Ministry of Posts and Telecommunications IPA : Information - Technology Promotion Agency, Japan (1) Anti-Computer-Virus Activities (2) Countermeasures Against Unauthorized Access to Computers in Cooperation with JPCERT (3) Study of Cryptography and Authentication Technologies (4) Study of IT Security Evaluation and Certification / Validation Scheme IPA - Security Center

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 30 Main Players on Security R & D in Japan Collaboration Universities Companies Government MITI - IPA MPT - TAO Fund for Security Projects MITI : Ministry of International Trade and Industry MPT : Ministry of Posts and Telecommunications IPA : Information - Technology Promotion Agency, Japan TAO : Telecommunications Advancement Organization of Japan O Tokyo University (Professor IMAI), O Chuo University (Professor TSUJII), O Yokohama National University, O Kyushu University, O Keio University etc. Universities

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 31 Main Players on Security R & D in Japan Collaboration Universities Companies Government MITI - IPA MPT - TAO Fund for Security Projects MITI : Ministry of International Trade and Industry MPT : Ministry of Posts and Telecommunications IPA : Information - Technology Promotion Agency, Japan TAO :Telecommunications Advancement Organization of Japan O NTT, O Hitachi, O Mitsubishi, O NEC, O NTT Data, O Fujitsu, O Panasonic, etc. COMPANY

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 32 Security Technologies for Research Field Technology Element Technology System Technology Social Technology Certification Access Control Encryption Digital Signature Computer Virus Secure Network Recovery Vulnerability Risk Assessment Interdependency Risk Communication Security User Interface

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 33 Comparison of Research Area in USA and Japan Field Technology Element Technology System Technology Social Technology Certification Access Control Encryption Digital Signature Computer Virus Secure Network Recovery Vulnerability Risk Assessment Interdependency Risk Communication Security User Interface USA* Japan+ Research Area (%) * Ratio of number of papers in ACM and IEEE for this ten years (Total No.:4696) + Ratio of number of papers in IPSJ and IEICE for this ten years (Total No.:555)

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 34 Main Players on Security R & D in Japan Collaboration Universities Companies Government MITI - IPA MPT - TAO Fund for Security Projects MITI : Ministry of International Trade and Industry MPT : Ministry of Posts and Telecommunications IPA : Information - Technology Promotion Agency, Japan TAO :Telecommunications Advancement Organization of Japan O NTT, O Hitachi, O Mitsubishi, O NEC, O NTT Data, O Fujitsu, O Panasonic, etc. COMPANY

Copyright (c) 2000 Hitachi, Ltd. All rights reserved R & D on Security Technologies in Hitachi

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 36 Hitachi’s Security Concept Secureplaza Attack! Router Crypt LSI Smart Card Attack! Message EC Hitachi’s Total Power Hitachi’s Security Services and Products Hardware Products Software Products Systems Integration Services Operation Services Encryption Library Firewall EC System Inter-Corporate EC Certificate Authority Security Monitoring

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 37 History on R&D of Security in Hitachi Phase 3 ( ) Business Establishment Period Phase 2 ( ) Products Development Period Phase 1 ( ) Technology Development Period

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 38 Business Area and Developed Security Technologies Business Area Service Soft- ware Hard- Ware Developed Security Technologies SI & Operation Special Service Security Monitoring, Key Recovery Certificate Authority, Notary System Middle Software Library Subsystem Component LSI for Encryption, Smart Card Encryption for Hardware Equipment Biometrics for Authentication Encryption Algorithms Digital Water Marking Secure Commerce Protocol, Key Management,Group Security

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 39 Common Key Cipher and Public Key Cipher Public Key Cipher Examples DESRSA Relation between Encryption/ Decryption Keys Encryption Key = Decryption Key Encryption Key ≠ Decryption Key Secret Key DeliveryNot Necessary Digital Signature Difficult Straightforward Speed FastSlow ApplicationsData Encryption Key Delivery Digital Signature Common Key Cipher Necessary

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 40 Common Key Cipher Developed in Japan Company Name Year Comment NTT Mitsubishi NEC FEAL-N E2 MULTI2 MULTI-S01 MISTY Unicorn Candidate of AES Stream Cipher Hitachi 1998

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 41 Products Related MULTI (b) Encryption LSI for Satellite Broadcast (a) Encryption Software Library ( Keymate/MULTI ) (Japan Standard for Digital Satellite Broadcast ) PerfecTV DirecTV Japan TV IRD MULTI Chip MULTI is the baseline cipher recommend by CPTWG for IEEE1394 CPTWG: Copy Protection Technology Working Group

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 42 Common Key Cipher and Public Key Cipher Public Key Cipher Examples DESRSA Relation between Encryption/ Decryption Keys Encryption Key = Decryption Key Encryption Key ≠ Decryption Key Secret Key DeliveryNot Necessary Digital Signature Difficult Straightforward Speed FastSlow Applications Data Encryption Key Delivery Digital Signature Common Key Cipher Necessary

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 43 Necessity of New Public Key Cipher RSA Required key length for safe enough bits bits bits Computation time when key length becomes twice 6 times - 8 times Improvement of Hardware and Integer Factorization Method Hitachi has decide to develop new public key cipher in 1996.

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 44 Hitachi Elliptic Curve Cryptosystem(ELCURVE) Type of Elliptic Curve Scheme Digital Signature Encryption/ Decryption K-out-of-N Scheme Elliptic Curve based on 2 powers Elliptic Curve based on large prime numbers Hitachi original scheme ELCURVE Software Library for PC and WS (Product:Keymate/Crypto) Software for Smart Card ( Prototype )

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 45 Development of ELCURVE on Smart Card PC Smart Card H8/3111 BLOCK DIAGRAM ROM 14K BYTES RAM 512 BYTES EEPROM 8K BYTES CO- PROCESSOR RAM 288 BYTES H8/300 CPUI/O PORT EXTERNAL CLOCK : 10MHZ CPU : 5MHZ 、 CO-PROCESSOR : 10MHZ DIGITAL SIGNATURE(160BITS) 0.17 SEC ・ High speed calculation by utilizing co-processor in smart card designed for fast RSA calculation

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 46 Business Area and Developed Security Technologies Business Area Service Soft- ware Hard- Ware Developed Security Technologies SI & Operation Special Service Security Monitoring, Key Recovery Certificate Authority, Notary System Middle Software Library Subsystem Component LSI for Encryption, Smart Card Encryption for Hardware Equipment Biometrics for Authentication Encryption Algorithms Digital Water Marking Secure Protocol, Key Management, Group Security

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 47 paint- ing Application Areas of Watermarking Protection by watermarking needed 1 month $10 Life span catalogue news- paper TV-news education software music movie karaoke magazine Still picture painting Motion picture Picture in digital book Voice Music Voice in movie TextSentence in digital book Program Application programs Contents kind Examples program book high low short long Movies in DVD Price Photography

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 48 Actual Applications of Water Mark (1) Copy Detection in Toppan Co. for Selling Digital Arts ( Still Picture ) (2) Copy Protection Standard Proposal for DVD - RAM in CPTWG ( Motion Picture ) (3) Internet - Marks For WWW paint- ing Protection by watermarking needed 1 month $10 Life span catalogue news- paper TV-news education software music movie karaoke magazine program book short long Price

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 49 Problems Web systems are important social infrastructures. – Means for effective information delivery and collection – Bases for most EC systems However they have trust problems. – Impersonation (e.g., fake Web site represents itself as an established site) – Criminal actions (e.g., receives money and then disappears without sending goods) – Unclear service policies (e.g., on returning goods)

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 50 Authentication using visual seals Authority issues seals guaranteeing or rating Web sites. Seals are pasted on the Web pages. Consumers trust or know service levels of the Web sites via the seals. Problems Seals are easily forged and copied onto unauthorized Web pages. Reliable seal system is needed.

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 51 Recommend for School Education SCIENCE ΕΔΩ Assoc. Internet-Mark technology Internet-Marks are verifiable seals because digital signatures are embedded in them by digital watermarking. Material image (JPEG, bit map, etc.) Internet-Mark (JPEG, bit map, etc.) Watermarking Embedded digital signature Recommend for School Education SCIENCE ΕΔΩ Assoc. Digital object for which Internet-mark will be used. Private key of issuer Digital signature Internet-Marks can be verified via the embedded digital signatures.

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 52 Details of Internet-Mark Watermarking Material Image Web site address Web page Internet-Mark Signature, etc. Additional info. - term of validity etc. Certificate for issuer Private key of issuer Paste Digital signature

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 53 Business Area and Developed Security Technologies Business Area Service Soft- ware Hard- Ware Developed Security Technologies SI & Operation Special Service Security Monitoring, Key Recovery Certificate Authority, Notary System Middle Software Library Subsystem Component LSI for Encryption, Smart Card Encryption for Hardware Equipment Biometrics for Authentication Encryption Algorithms Digital Water Marking Secure Commerce Protocol, Key Management,Group Security

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 54 Prototype model for Product Biometric Authentication Devices of Hitachi Demonstration model Fingerprint Device Veridicom FPS100A 300×300×8bits 12Mbps USBI/F Hitachi’s Contactless Smart Card & R/W 8bits CPU 8kB EEPROM 9600bps

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 55 Outline of Secured Office System Door Control unit Smart card R/W Door Log DB Temporal Fingerprint file DB Entrance X.509 User’s Office User List Enrollment Server Card Issuer System Certification Authority Issuer Center Smart Card certificated fingerprint Smart Card certificated fingerprint PCs for End User Live scanner Live scanner DB access control Log-on access control Verification Server Entrance control Workflow control

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 56 Business Area and Developed Security Technologies Business Area Service Soft- ware Hard- Ware Developed Security Technologies SI & Operation Special Service Security Monitoring, Key Recovery Certificate Authority, Notary System Middle Software Library Subsystem Component LSI for Encryption, Smart Card Encryption for Hardware Equipment Biometrics for Identification Encryption Algorithms Digital Water Marking Secure Commerce Protocol, Key Management,Group Security

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 57 インタネット For Operator CA system Against Invasion Firewall Firewall Encryption Encryption Hitachi Certificate Authority Server CA Server Certificate StoreBank/Card Company Consumer Certification List Against Inside Crime Prevent Single Operation Front End Server Firewall Certificate

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 58 Certificate Authority Notary Authority Corporate A Corporate B A B NA A B AB 1998/3/6 14:10 NA Time Stamping NA Archiving a digital document Notary Service Certificate Authorize NAB A B A B Making(Writing) a notarial deed CA 認 Authorizing a private document Image of CA & NA System for Ministry of Justice

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 59 Business Area and Developed Security Technologies Business Area Service Soft- ware Hard- Ware Developed Security Technologies SI & Operation Special Service Security Monitoring, Key Recovery Certificate Authority, Notary System Middle Software Library Subsystem Component LSI for Encryption, Smart Card Encryption for Hardware Equipment Biometrics for Identification Encryption Algorithms Digital Water Marking Secure Commerce Protocol, Key Management,Group Security

Copyright (c) 2000 Hitachi, Ltd. All rights reserved On Security Standards

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 61 Security Standards and Related Organizations National Level World Wide Security Application Field Official : ISO-SC27, ITU etc. Private : IETF(Protocol) etc. Official: NIST(AES), JIS etc. Private : IEEE (1394) etc. SET (Certification) MULTOS (Card OS ) CPTWG (Copy Protection ) etc. Security Basic Field

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 62 On Cryptography Standard (1) USA: AES Project by NIST AES (Advanced Encryption Standard ) was selected in Oct > Rijndael Proposed from Belugium (2) JAPAN: CRYPTEC Project by IPA and TAO ( Chair: Prof. Imai ) Assessment of Security and the Implementation of Available Cryptographic Techniques to Achieve information Security in the Electronic Government -> Technical Report Including a List of Analytical Results on Security Profile and Implementation Aspects for Proposed Cryptographic Technologies ( in March, 2001 ) (3) EC : NESSIE Project by the Information Technology Programme of the European Commission 1.National Level / Official

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 63 On Cryptography Standard 2. World Wide / Official Standardization of Ciphers has started at ISO/IEC JTC1 SC 27 (#18033) from Standardization Items (1) Asymmetric Ciphers (2) Block Ciphers (3) Stream Ciphers Symmetric Ciphers (Common Key Ciphers)

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 64 Security Standards and Related Organizations National Level World Wide Security Application Field Official : ISO-SC27, ITU etc. Private : IETF(Protocol) etc. Official: NIST(AES), JIS etc. Private : IEEE (1394) etc. SET (Certification) MULTOS (Card OS ) CPTWG (Copy Protection ) etc. Security Basic Field

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 65 IETF WG on Security Common Authentication Technology (cat) IP Security Protocol (ipsec) Intrusion Detection Exchange Format (idwg) Public-Key Infrastructure (X.509) (pkix) Simple Public Key Infrastructure (spki) XML Digital Signatures (xmldsig) Authenticated Firewall Traversal (aft) One Time Password Authentication (otp) Secure Shell (secsh) Transport Layer Security (tls) An Open Specification for Pretty Good Privacy (openpgp) Domain Name System Security (dnssec) S/MIME Mail Security (smime) Web Transaction Security (wts) Secure Network Time Protocol (stime) Infrastructure Middleware Application CategoryWG

Copyright (c) 2000 Hitachi, Ltd. All rights reserved Conclusion

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 67 Conclusions 1. R & D on security technologies in Japan were explained. 2. Future Tendency (1) Attack will increase and be harder in future. (2) More powerful countermeasures will be required, especially in security surveillance, audit, evaluation and education. (3) Attack will be given from all over the world. Therefore, world wide collaborations must be performed to protect against the attacks.

Copyright (c) 2000 Hitachi, Ltd. All rights reserved. 68 Research & Development for Internet Security in Japan END