© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Digital Stamps of Companies Tarvi Martens SK, Estonia.
The Austrian Governmental eDelivery System Technical Aspects Ankara, March 17th, 2015 Christian Maierhofer, EGIZ The E-Government Innovation Center is.
Digital Signatures and Hash Functions. Digital Signatures.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Electronic and Digital Signatures
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Digital Signatures. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Copyright © 2008, CIBER Norge AS 1 Using eID and PKI – Status from Norway Nina Ingvaldsen and Mona Naomi Lintvedt 22 nd October 2008.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public Key Infrastructure (PKI) Chien-Chung Shen
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
TAG Presentation 18th May 2004 Paul Butler
e-Health Platform End 2 End encryption
Digital Signature.
Pooja programmer,cse department
Lecture 4 - Cryptography
Protocol ap1.0: Alice says “I am Alice”
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Presentation transcript:

© Julia Wilk (FHÖV NRW) 1 Digital Signatures

© Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation in public authorities 5. Conclusion

Digital Signatures © Julia Wilk (FHÖV NRW)3 1. Introduction What is a Digital Signature? - A Digital Signature is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper. - Sometimes also used: Electronic Signature (here synonymic)

Digital Signatures © Julia Wilk (FHÖV NRW)4 Why is it important for e-Government? Handwritten signature often required in public law Digital signature can replace it More possibilities of electronic services: - Cost savings - Saving Time  For both citizens and authorities

Digital Signatures © Julia Wilk (FHÖV NRW)5 2. Basics 2.1. Law 2.2. Security Properties of handwritten and digital signatures

Digital Signatures © Julia Wilk (FHÖV NRW)6 2.1.Law Germany: “Signaturgesetz” in Precondition for safe and legally binding electronic signatures - Regulates specifications for using digital signatures Europe: EU Signature Directive - Unification of different signature laws in the EU (especially different security levels) - Basis for changes of the German law in 2001, 2005 and Changes made the law conform to the European directive

Digital Signatures © Julia Wilk (FHÖV NRW)7 Law: Different Signatures 1. Electronic signature - Data in electronic form which are attached with other electronic data and which serve as a method of authentication  E.g. a scanned signature 2. Advanced electronic signature - Means an electronic signature that is also - uniquely linked to the signatory, - capable of identifying the signatory, - linked to the data to which it relates that any change of the data is detectable.  Guarantees not only the authentication, but also the integrity of the text

Digital Signatures © Julia Wilk (FHÖV NRW)8 Law: Different Signatures 3. Qualified digital signature based on a qualified certificate of a Certification Authority (CA) Germany: sole signature that is equal to a handwritten signature (§ 126a BGB) guarantees authentication, integrity and also confidentiality 4. Qualified digital signature with accreditation Like a qualified signature, but furthermore - CA was accredited voluntarily - Proof for comprehensive technical and administrative security

Digital Signatures © Julia Wilk (FHÖV NRW) Security Properties

Digital Signatures © Julia Wilk (FHÖV NRW)10 Security Properties of handwritten messages Authenticity - Nobody should impersonate someone he doesn’t is  Handwritten signatures are unique Integrity - A message can not be falsified unnoticed  No obvious changes in the document (like sth. was erased) Obligation - The signature has to assure legal certainty  If Cologne decides to choose Mr. Klüngel as the builder, his signature is a guarantee that he really builds the town hall for 20 million Euro Confidentiality - No person except the receiver should be able to read the message  Document sent in an undamaged envelope

Digital Signatures © Julia Wilk (FHÖV NRW)11 Security Properties transferred to digital signatures Authenticity - Nobody should impersonate someone he doesn’t is  So.'s identity can be proved e.g. with a chip card that can only be used with the right PIN Integrity - A message can not be falsified unnoticed  One is sure the text received is the same that was sent, and that no hacker had changed it Obligation - The signature has to assure legal certainty  If Cologne decides to choose Mr. Klüngel as the builder, his signature is a guarantee that he really builds the town hall for 20 million Euro (see § 126a BGB) Confidentiality - No person except the receiver should be able to read the message  Not guaranteed by digital signature itself, but because of asymmetric encryption

Digital Signatures © Julia Wilk (FHÖV NRW)12 3. Elements of digital signatures 3.1. Basic functionality 3.2. Hash functions and hash results 3.3. Asymmetric encryption 3.4. Certification 3.5. User’s realisation

Digital Signatures © Julia Wilk (FHÖV NRW) Basic functionality Example: Bob wants to send a message to Alice and sign it digitally 1. Bob creates a digest of the message – a sort of digital fingerprint (also: hash result). If the messages changes, so does the digest. 2. Bob then encrypts the digest with his private key. The encrypted digest is the digital signature.

Digital Signatures © Julia Wilk (FHÖV NRW)14

Digital Signatures © Julia Wilk (FHÖV NRW) Basic functionality 3. The encrypted digest is sent to Alice along the message. 4. When Alice receives the message, she decrypts the digest using Bob’s public key. 5. Alice then creates a digest of the message using the same function that Bob used. 6. Alice compares the digest that she created with the one Bob encrypted. If the digests match, then Alice can be confident that the signed message is indeed from Bob.

Digital Signatures © Julia Wilk (FHÖV NRW)16

Digital Signatures © Julia Wilk (FHÖV NRW) Hash functions and hash results Asymmetric encryption guarantees confidentiality Encryption can take too much time and would be too much to calculate if there are bigger documents Solution: Not the document itself, but its hash result gets signed

Digital Signatures © Julia Wilk (FHÖV NRW) Hash functions and hash result Hash function:= algorithm which creates a digital representation in the form of a hash result of a standard length which is usually much smaller than the message but substantially unique to it Hash function also known as “digital fingerprint”

Digital Signatures © Julia Wilk (FHÖV NRW) Premises for hash functions It has to be impossible to generate the same hash result for two different documents (like a fingerprint is unique, too) Hash function has to have the “one-way- property”: The hash result can be calculated from the document, but it mustn’t be possible to calculate the document from the hash result

Digital Signatures © Julia Wilk (FHÖV NRW) Asymmetric encryption Basic: a pair of keys, namely a private key and a public key Premises: - Private key has to be saved, e.g. using a chip card with a PIN - Public key can be accessible for everyone, but its owner’s identity has to be identifiable without problems to guarantee authentication (certificate) - Not possible to generate the Private key by knowing someone’s Public key

Digital Signatures © Julia Wilk (FHÖV NRW) Encryption: Proceeding Generating message’s digest (hash result) Using Public Key to encrypt hash result Result of the encryption: digital signature Sender sends - message, - digital signature and - certificate to receiver Receiver wants to check - Integrity  Generating hash result, compare it to the sender’s hash result and decrypting the message with the sender’s public key - Authenticity  Can be checked by means of the certificate

Digital Signatures © Julia Wilk (FHÖV NRW) Encryption: Proceeding

Digital Signatures © Julia Wilk (FHÖV NRW) Certification Important for authenticity: - Receiver of a message has to be sure that the public key he uses really belongs to the sender Solution: Certification Authority (CA) - Independent, confidential - Law causes premises for a CA:  Professional competence  Qualified equipment of hardware and software  Unimpeachable employees

Digital Signatures © Julia Wilk (FHÖV NRW) Certification Certificate: comparable with a digital identity card Document that shows someone’s identity doubtless Three-stepped infrastructure guarantees authenticity: - Sender - CA - Authority that controls CA  In Germany “Bundesnetzagentur”

Digital Signatures © Julia Wilk (FHÖV NRW) Realisation by user Important for security: private key has to be absolutely saved and only available for his user Technical premises: - Chip card and PIN  High security level because of “possession and knowledge”  Cards available through bank branches, but they are only mediators of accredited CAs  Encryption of the hash result is realised in a matter of seconds - Card reader - Computer and corresponding software

Digital Signatures © Julia Wilk (FHÖV NRW) User acceptance Citizen’s interests: - Doing as much administrative aspects as possible by using the internet - Survey: 88 % of German citizens would like to do everything concerning public administration online to avoid waiting times and save time

Digital Signatures © Julia Wilk (FHÖV NRW) User acceptance Today: Nearly every authority has got a homepage where you can download forms or search for information Problem: Forms often need to be signed handwritten We learned: Only the qualified digital signature can replace a handwritten signature Using qualified signatures premises special equipment (remember chip card, card reader…)

Digital Signatures © Julia Wilk (FHÖV NRW) User acceptance Special equipment costs money Question: Are the citizens really willing to pay for their wish to do as much as possible online? - Equipment costs are estimated about 50 € in Germany - Expensive if someone only needs his authority for 2 or 3 times a year - Solution: Equipment has to be all-purposed, it has to be possible to use the equipment in other fields, like home banking e.g. - Digital signatures are not established plentiful, a distribution in Germany would also reduce costs

Digital Signatures © Julia Wilk (FHÖV NRW) User acceptance Other problems: - Administrative procedures often need original documents (like a family register or a birth certificate) - If you do everything in a electronic way, the expert advice of the official is missing which maybe causes mistakes

Digital Signatures © Julia Wilk (FHÖV NRW) User acceptance Summing up: - The more possibilities of using digital signature equipment exist, the more will be established the digital signature and also the citizen’s acceptance - Electronic government offer is rising year by year, so maybe also the success will rise with it

Digital Signatures © Julia Wilk (FHÖV NRW)31 4. Realisation in public authorities 2001: only 4,8 % of German local authorities use digital signatures 2006: 30 % use respectively qualified signatures and qualified signatures with accreditation

Digital Signatures © Julia Wilk (FHÖV NRW)32 Use of digital signatures in German cities (Survey by KGSt, 2006)

Digital Signatures © Julia Wilk (FHÖV NRW)33 5. Conclusion Offering and diffusion of digital signatures had grown in the last years Reasons: - Unification of law in the EU - Further development - Increasing disposition of public authorities to engage in digital signatures

Digital Signatures © Julia Wilk (FHÖV NRW)34 5. Conclusion Citizen’s vantages: - Many transactions can be done from the computer at home - Citizen is not bound to opening times and reachability of public authorities Public authorities: - Saving costs in traditional sectors - New technologies cause other costs and other resources like qualified employees - Long-term: digital signatures can redound to more efficiency

Digital Signatures © Julia Wilk (FHÖV NRW)35 5. Conclusion Security - Today things like the one-way hash function, asymmetric encryption and sophisticated chip card system cause secure proceedings - The security standard has to be conformed to the computer systems that get increasingly powerful Costs - High costs are indispensable to guarantee a high security level

Digital Signatures © Julia Wilk (FHÖV NRW)36 5. Conclusion User’s/Citizen’s Acceptance - Chip card systems are easy to use - High costs could reduce the success of digital signatures - Necessary to coordinate standards to use a chip card system for many different applications  The more people use it, the more can costs be reduced and digital signatures can be used area- wide

Digital Signatures © Julia Wilk (FHÖV NRW)37 5. Conclusion Summing-up: - Today digital signatures are under way and can only be seen as an amendment to traditional procedures - In the future digital signatures will get more and more important to guarantee an efficient action of public authorities

Digital Signatures © Julia Wilk (FHÖV NRW)38 Questions???

Digital Signatures © Julia Wilk (FHÖV NRW)39 -The End-