COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Signatures and Hash Functions. Digital Signatures.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
Tracing Computer Forensics 152 / 252.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Cryptography Basic (cont)
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
1 Intro To Encryption Exercise Analyze the following scenario: Sender:  Cipher1= Encrypt message with symmetric key algorithm  RSA_Encrypt (SHA1(message)
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Security Jonathan Calazan December 12, 2005.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Cryptography 101 Frank Hecker
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Tracing Examples Computer Forensics Tracing Examples.
Secure Data Transmission EDI-INT AS1, AS2, AS3 Kevin Grant.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown & Süleyman KONDAKCI.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
Cryptography: Digital Signatures Message Digests Authentication
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
DIGITAL SIGNATURE.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
Network Security Celia Li Computer Science and Engineering York University.
Fall 2006CS 395: Computer Security1 Key Management.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Chapter 5a - Pretty Good Privacy (PGP)
Basics of Cryptography
Unit 3 Section 6.4: Internet Security
S/MIME T ANANDHAN.
Lecture 4 - Cryptography
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Chapter 8 roadmap 8.1 What is network security?
Digital Signatures Network Security.
Presentation transcript:

COEN 351 Non-Repudiation

A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been received, or to protect the recipient against false denial by the sender that the data has been sent. Thus, a non- repudiation service provides evidence to prevent a person from unilaterally modifying or terminating legal obligations arising out of a transaction effected by computer-based means. American Bar Association

Non-Repudiation Legal Need: Enough evidence to meet the legal requirement for proof that signature / communication occured. Not exactly equivalent to the cryptography standard.

Non-Repudiation Traditional written signature delivered by mail Can be forged. But forging is difficult. Name under Easily forged. Digitally signed Almost impossible to forge Attack needs key theft Or needs successful crypto-attack on verified and trusted scheme.

Non-Repudiation Types of non-repudiation: Non-repudiation of origin Non-repudiation of submission Non-repudiation of delivery

Non-Repudiation Non-repudiation request Parties need to agree on non-repudiation services. Non-repudiation service involves 5 different activities: Non-repudiation request Record generation Record distribution Record verification Record retention

Non-Repudiation Phases Non-repudiation request Often implicit. Request for attestation (additional signatures) Record generation Needs to involve the potential repudiator Autonomous generation or by trusted third party Record distribution To trusted third party or to person requesting non- repudiation. Record verification Record retention

Non-Repudiation of Origin: Mechanisms Originator’s Digital Signature with Certificate Message Digital Signature: Hash of Message encrypted with private key of originator. Certificate of Digital Signature: Certificate by trusted party containing public key of originator. Key-Revocation Possibility: Time of key revocation is crucial, message needs to contain a time stamp. Stored at recipient.

Non-Repudiation of Origin: Mechanisms Digital Signature of a Trusted Third Party Originator sends message to trusted third party and authenticates her/him-self. Trusted third party digitally signs the message and returns it to the originator. Originator sends it to recipient. Recipient stores it.

Non-Repudiation of Origin: Mechanisms Digital Signature of a Trusted Third Party Originator sends message to trusted third party and authenticates her/him-self. Trusted third party digitally signs the message and returns it to the originator. Originator sends it to recipient. Recipient stores it.

Non-Repudiation of Origin: Mechanisms Digital Signature of Message Hash Digital signatures are compute-expensive. Calculate a secure hash of the message. Hash is easy / fast to calculate Impossible to find other message with the same hash. WARNING: Analysis of secure hash functions is about a decade behind analysis of encryption security. MD5, SHA1 are not yet broken But less secure than thought SHA-2 family seems to be O.K. (2006) Then use the various schemes to sign the hash.

Non-Repudiation of Origin Transactional Certificate Only used for one transaction. Originator provides: Message Hash of message, encrypted by private key of originator. Signature of trusted party on originator signature

Non-Repudiation of Origin Inline trusted third party (Evidence stored) Originator sends message to trusted third party. Trusted third party stores evidence of transaction (signed message digest, time stamp) Trusted third party forwards message.

Non-Repudiation of Delivery Recipient Acknowledgment with Signature Recipient signs digest of received message and sends it back to the sender. “Reluctant recipient problem”

Non-Repudiation of Delivery Trusted Delivery Agent Akin to process server Police officer, deputy delivering summons or subpoena. Delivery agent is trusted when attesting to handing message to recipient Delivery agent signs digest of message and returns it to sender after handing it to the receiver.

Non-Repudiation of Delivery Progressive Delivery Reports Mail transfer protocol hands messages from one mail server to the next. Possible to send reports from each mail server. header has a record of those hand-offs Unfortunately, these might be faked, too.

Protocols: SMTP Server used to fak To: From: This is a spoofed message. From Tue Dec 23 17:25: Return-Path: Received: from Xavier (dhcp engr.scu.edu [ ]) by server4.engr.scu.edu ( / ) with ESMTP id hBO1Plpv for ; Tue, 23 Dec :25: Received: from mail pickup service by Xavier with Microsoft SMTPSVC; Tue, 23 Dec :25: To: From: Message-ID: X-OriginalArrivalTime: 24 Dec :25: (UTC) FILETIME=[D3B56160:01C3C9 BC] Date: 23 Dec :25: X-Spam-Checker-Version: SpamAssassin 2.60-rc3 ( exp) on server4.engr.scu.edu X-Spam-Level: X-Spam-Status: No, hits=0.3 required=5.0 tests=NO_REAL_NAME autolearn=no version=2.60-rc3 This is a spoofed message.

Non-Repudiation of Submission Messages are handled by a delivery system Not under control of sender Reasonably efficient in sending messages Delivery system can send receipt to sender.

Non-Repudiation Trusted Third Party Role Public-key certification Identity and authority validation By (co)signing Time stamping service Records retention Delivery intermediation Dispute resolution