NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Bill Maaske CIO AZ Secretary of State
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Electronic and Digital Signatures
The E-Signatures Act and eConsent Karin Fuog Nelnet Policy Services November 6, 2006.
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
E-commerce Law Electronic signatures and security.
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Electronic Signatures in the SFA Loan Programs Electronic P-Notes Presented by Jeff Baker & Kay Jacks.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
How the ESign Act Makes Esignatures Work
Unit 3 Section 6.4: Internet Security
E-Commerce Security.
Pooja programmer,cse department
Electronic Payment Security Technologies
Presentation transcript:

NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24, 2006

Overview Definitions of Electronic/Digital Signatures What is a Digital Certificate and what does it have in common with a Digital Signature How do Digital Signatures Work The legal perspective on Digital Signatures

Electronic/Digital Signatures More than one definition: 1.Can be used to sign a document (i.e., contract, letter, etc) – Person’s signature 2. Can be used to authenticate a secure Website or to send secure messages ( – Business Web site

Digital Signature A way to ensure whether a message was actually sent by the person who claimed to have sent it. The sender's private key encrypts the signature, and the recipient decrypts the signature with the sender's public key. Digital signatures use public key cryptography and work in conjunction with certificates

Digital Certificate A digitally signed statement that binds the identifying information of a user, computer, or service to an encryption algorithm A digital certificate is commonly used in the process of authentication and for securing information on the networks Examples: Verisign, GeoTrust, Thawte

Digital Certificate Is issued by a Certificate Authority Certifies the person and particular Web site are connected Increases confidence and trust from the user

Digital Certificate Example: A digital certificate verifies to the shopper the online store is actually associated with a physical address and phone number – increases shopper’s confidence in merchant’s authenticity. Examples: PayPal, Barnes & Noble, Amazon

Certificate Authority In cryptography, a certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. Examples: GeoTrust, Verisign, Thawte

Public Key Cryptography Some forms of public key cryptography: public key encryption — keeping a message secret from anyone that does not possess a specific private key.encryption public key digital signature — allowing anyone to verify that a message was created with a specific private key.digital signature key agreement — generally, allowing two parties that may not initially share a secret key to agree on one.key agreement

How to & Demonstration Lorna Olsen

Legal Perspective – Laws & Regs 1. Electronic Signatures in Global & National Commerce Act (E-Sign Act), 15 USC § 7000 et. seq. (10/1/00)

Legal Perspective – Laws & Regs North Dakota Electronic Transactions Act, NDCC ch (8/1/01), “Electronic signature” is: 1)electronic sound, symbol or process; 2)attached to or logically associated with a record; and 3)executed or adopted by a person with intent to sign the record (§ (8)).

North Dakota Electronic Transactions Act Allows, but does not mandate use of electronic signatures (§ ). Gives legal effect to electronic records and signatures ( ). Even allows notarization to be electronic ( ).

North Dakota Electronic Transactions Act Provides that the State Records Administrator (now the Chief Information Officer in OMB) can make rules and guidelines ( ). Government agencies not mandated to permit electronic signatures ( (3)). No rules yet? N.D. Secretary of State has a reserved section, NDAC ch , for “Digital Signatures”. University Policies??

Legal Perspective – Laws & Regs FERPA, 34 CFR § 99.30(d) (5/21/04) DOE wanted to allow electronic signatures, but give schools wide flexibility. (d) says that signed and dated consent can include electronic signatures if authenticates the person and shows their approval of the consent. Also provides that FSA (Federal Student Aid) Standards for Electronic Signatures are a Safe Harbor for implementing electronic signatures,

Legal Perspective – Laws & Regs Other resources: –South Dakota Electronic Signature Standards,

Questions? Lorna Olsen, Trainer Rick Johnson, General Counsel Theresa Semmens, IT Security Officer