Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Slides:



Advertisements
Similar presentations
PKI Strategy PKI Requirements Standard –Based on e-MARC or other Certificate Policy Statements –Specify key aspects that must be met by CA Cert format.
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (X509 PKI)
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Creating Trust in Electronic Environment - IT Act 2000 Deputy Controller (Technology) Controller of Certifying Authorities Ministry of Communications &
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Public Key Infrastructure Ammar Hasayen ….
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Copyright © 2008, CIBER Norge AS 1 Using eID and PKI – Status from Norway Nina Ingvaldsen and Mona Naomi Lintvedt 22 nd October 2008.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
DIGITAL SIGNATURE.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Dr.N.Vijayaditya Controller of Certifying Authorities Department of Information Technology Government of India October 29, 2010 PKI DEVELOPMENTS IN INDIA.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
TAG Presentation 18th May 2004 Paul Butler
Digital Signature.
IS3230 Access Security Unit 9 PKI and Encryption
Security in ebXML Messaging
جايگاه گواهی ديجيتالی در ايران
PKI (Public Key Infrastructure)
Presentation transcript:

Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy Controller

Electronic Transactions The success of electronic transactions depends on “the trust that the transacting parties place in the security of the transmission and content of their communications” Authenticity Non-Repudiability Confidentiality Integrity

Information Technology (IT) Act, 2000 Accorded legal recognition to Digital signatures Digital signatures treated at par with handwritten signatures Technology-specific

Public key cryptography for Digital signatures Pair of keys for every entity One Public key – known to everyone One Private key – known only to the possessor To digitally sign an electronic document the signer uses his/her Private key. To verify a digital signature the verifier uses the signer’s Public key. No need to communicate private keys

Creating a Digital signature Encryption Algorithm Signed document Document + Digital signature Document + Digital signature Private Key

Verifying a Digital signature Decryption Algorithm Document + Digital signature Document + Digital signature Signature verification and Document integrity Public Key of signer

Public key Cryptography & Digital Signatures Assurance of Authenticity of the Digital Signature created by the Private key is determined by the Trust that can be placed in the Public key Public key Certificates or Digital Signature Certificates bind a “public key” to an “Identity”

Public key Cryptography & Digital Signatures Change in Document => Change in the Digital Signature Digital Signature is bound to the Document as well as the Signer => Assurance of Integrity

Issues in Public key Cryptosystems How will verifier get signers public key? How will verifier authenticate signers public key ? How will the signer be prevented from repudiating his/her digital signature?

Public key Cryptography & Digital Signatures Digital Signature Certificates(containing the public key) are issued by Certifying Authorities after Identity verification Responsibility of protecting the private key lies with its owner. Loss or compromise of private key should be communicated to the CA so as to result in REVOCATION of the corresponding Digital Signature Certificate.

Certifying Authority Issues Digital signature Certificates (Public Key Certificates). Is widely known and trusted Has well defined methods of assuring the identity of the parties to whom it issues certificates. Confirms the attribution of a public key to a person by means of a public key certificate. Always maintains online access to the Digital Signature Certificates issued.

Public Key Certification User credentials User’s Public Key CA’s Name Validation period Signature of CA User credentials User’s Public Key CA’s Name Validation period Signature of CA User 1 certificate User 2 certificate. User 1 certificate User 2 certificate. Digitally Signed using CA’s private key Digitally Signed using CA’s private key User credentials User credentials User’s Public key User’s Public key Digital Signature Certificate Certificate Database Publish Certificate Request

Certificate Revocation List (CRL) A list of Certificates that have been revoked and declared invalid

Public Key Infrastructure & the IT Act 2000 Controller of Certifying Authorities as the “Root” Authority certifies the technologies and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates

CCA’s role Licensing Certifying Authorities (CAs) under section 21 of the IT Act and exercising supervision over their activities. Controller of Certifying Authorities as the “Root” Authority certifies the technologies and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates Certifying the public keys of the CAs, as Public Key Certificates (PKCs). Laying down the standards to be maintained by the CAs, Addressing the issues related to the licensing process including: Approving the Certification Practice Statement(CPS); Auditing the physical and technical infrastructure of the applicants through a panel of auditors maintained by the CCA.

Audit Process Adequacy of security policies and their implementation; Existence of adequate physical security; Evaluation of functionalities in technology as it supports CA operations; Compliance to the adopted Certification Practice Statement (CPS); Adequacy of contracts/agreements for all outsourced CA operations; Adherence to Information Technology Act 2000, the Rules, Regulations and Guidelines issued by the Controller from time-to-time.

CCA’s technical Infrastructure The CCA operates the following :- Root Certifying Authority (RCAI) under section 18(b) of the IT Act, and National Repository of Digital Signature Certificates (NRDC) under section 20 of the IT Act.

Internet Directory Client CA LAN Cert/CRL RCAI CCA NRDC Relying Party Subscriber  CA Public Keys Certified by RCAI  CA’s Revoked Keys CCA : Certificates of Public Keys of CAs National Repository of Certificates

CCA TCSCANICCASafescrypt India PKI IDRBTCA iCert (CBEC) (n)Code MTNLTrustline

PKI enabled Applications eProcurement IFFCO DGS&D ONGC GAIL Air-India Railways Others MCA21 Income Tax e-filing IRCTC DGFT RBI Applications (SFMS)

Challenges ahead Interoperability Uniformity in certificate contents Validation methods - Certificate Revocation Lists,.. International alliances End User Adoption Application interoperability. Digital Signature Certificate interoperability. Trusted Verification Authority. Storage medium

Challenges ahead..contd Awareness Understanding of digital signature concepts Knowledge about legal rights, duties and liability of owning digital certificate

Controller of Certifying Authorities Thank you