Non-repudiation Robin Burke ECT 582. Midterm scores Ave: 69 Std. dev: 23 Median: 75 Max: 100 Min: 35.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Electronic and Digital Signatures
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Chapter 13 Digital Signature
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Legislation, Regulation, Guidelines
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Digital Signatures and Digital Certificates Monil Adhikari.
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
& UETAESIGN COMPLIANCE. CHANGING LANDSCAPE As contract management transitions into a paperless world, documents must remain compliant with government.
How the ESign Act Makes Esignatures Work
Electronic Transactions & Authentication
Fundamentals of business law, 10e
Pooja programmer,cse department
Legislation, Regulation, Guidelines
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Non-repudiation Robin Burke ECT 582

Midterm scores Ave: 69 Std. dev: 23 Median: 75 Max: 100 Min: 35

Approximate grade Mid 80s and up: As High 60s and to mid80s: Bs 50s to 60s: Cs 40s: Ds

Midterm Answers

Law and Business Legal systems make business possible (sorry libertarians) Law establishes conditions for contract validity venues for disinterested mediation and dispute resolution remedies for breach of contract mechanisms of enforcement

Law and E-Commerce E-Commerce also needs legal systems Complexities global scope / jurisdiction evolving technology landscape automation / liability

Evidence Legal systems require evidence evidentiary statutes predate digital era slowly catching up Non-repudiation maintaining digital evidence for e- commerce transactions

Legal structures Common law long-established precedents in US and UK Concepts writing signing notary competence presence negotiability

Problems for e-commerce Is a digital contract "written"? digital media impermanent Is a digital signature a "signature"? must be qualified with respect to key purpose, policy, etc. Who bears liability? private key compromise service disruption Who will archive and how? digital media volatile archives must be secure

Example Financial services law banks must retain canceled checks or facsimiles thereof (microfilm) pre-dates digital era If we define "digital representation" as equivalent to physical facsimile then banks can store electronic scans of canceled checks

Example Jurisdiction location where suit can be brought party must have "minimum contacts" with a jurisdiction to be summoned there US Constitutional law Does the availability of web site constitute "minimum contacts"?

Legal framework US Federal Federal law Federal E-Sign act provisions Technology-neutral Electronic signatures have same status as written ones limits applies mostly to sale and lease contracts, will, trusts and other transactions explicitly excluded)

Legal Framework US State Law Uniform Electronic Transactions Act More specific than Federal law Enacted by 43 states Still technology-neutral Doesn't mention certificates, PKI, etc. Uniform Computer Information Transactions Act Extremely controversial Enacted by 3 states: Maryland, Virginia, Iowa Major concern imposition of onerous license terms: self-help, reverse engineering, prevention of archiving, fair-use, etc.

UETA Provisions Electronic Signature "an electronic sound, symbol. or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record." Effect of Electronic Signature: A "signature may not be denied legal effect or enforceability solely because it is in electronic form." "If a law requires a signature, an electronic signature satisfies the law." Electronic Record "Means a record created, generated, sent, communicated, received, or stored by electronic means." Effect of Electronic Record A record "may not be denied legal effect or enforceability solely because it is in electronic form." If a law requires a record to be in writing, an electronic record satisfies the law." A contract may not be denied legal effect or enforceability solely because an electronic record was used in its formation." Effect of Electronic Agents "The actions of machines ("electronic agents") programmed and used by people will bind the user of the machine, regardless of whether human review of a particular transaction has occurred."

Digital Signature Law Utah Digital Signature Act (1995) Very specific Mentions public key cryptography, certificates, CRLs, etc. Licensing and regulation of CAs Liabilities of users and CAs Not widely emulated "Digital Signature Guidelines" (1999) American Bar Association Guidelines for the deployment of PKI Expectations and liability associated with CAs, RAs, and users

International Laws UN Model Law on Electronic Commerce similar to UETA EU Directive on Digital Signatures similar to Utah law specific requirements for PKI

State of law Complex and unsettled Different laws in different states / countries Catch-22 Slow adoption of PKI is tied to legal uncertainties Lack of legal precedents / guidelines due to slow adoption

Break

Non-repudiation System property Protocol provides for the retention of evidence that can be used to resolve disputes regarding transactions

Non-repudiation Strong and substantial evidence of the identity of the signer of a message and of message integrity, sufficient to prevent a party from successfully denying the origin, submission or delivery of the message and the integrity of its contents. – ABA Digital Signature Guidelines

Disputes "I never said that." origin "I never got your message." reception "Check's in the mail." submission

Types needed Non-repudiation of origin NRO Non-repudiation of delivery NRD Non-repudiation of submission NRS

Non-repudiation of Origin Evidence needed Identity of originator Contents of message Time of generation this may matter for establishing a negotiation sequence Techniques two party three party

Originator Digital Signature Alice creates message M dates it T and signs it S Alice sends M + T + S to Bob Bob uses Alice's public key certificate to verify signature Bob archives M + T + S Alice's public key certificate and CRL used to verify it

Features Identity and contents are protected Timestamping depends on the accuracy of Alice's clock Alice needs digital signature capability

TTP Signature Trusted third-party (Vicky) Receives Alice's transaction M message Generates time stamp T Signs M + T creating S' Returns to Alice Bob gets M + T + S' can verify that whole transaction matches S' archives the message for dispute resolution also Vicky's certificate and CRL used to verify it

Features Alice doesn't need to sign she can review message before sending Alice doesn't need a key pair lower PKI overhead Timestamp Vicky's timestamp will be more reliable than Alice's Identity less secure no digital signature from Alice Vicky has access to message contents

TTP Digest Signature Alice doesn't want to disclose M Same operation with hash of M using key k creates hash H Sends H to Vicky gets back H + T + S' Attaches M encrypts M + k + H + T + S' Bob receives message verifies that H is a true hash of M verifies Vicky's signature archives the transaction

Features Alice needs encryption / hashing capability Confidentiality is preserved Identity still a problem

In-line TTP Receives Alice's transaction M message Generates time stamp T Signs M + T creating S' Archives M + T + S' Forwards M to Bob perhaps with transaction id Bob can contact Vicky to get evidence

Features Vicky does archiving Alice and Bob don't need encryption capability Content and identity guarantees

TTP Token Receives Alice's transaction M Generates time stamp T Creates a secure hash H of M + T using a cryptographic key k Returns to Alice M + T + H Bob gets M + T + H Bob can contact Vicky with H Vicky verifies that H matches message

Features Content secure No PKI Ordinary symmetric encryption sufficient Identity less secure

Combination of methods Originator Signature + TTP Digest Signature if we care about disclosure and recipient can archive Originator Signature + In-line TTP if we don't care about disclosure and we want 3 rd party archiving In-line TTP could archive encrypted message Bob would need private key to access evidence

Non-repudiation of delivery Same information needed Identity of recipient Content of message Timestamp Think of NRO but the origin message is the acknowledgement of receipt

Signed receipt Alice sends Bob M Bob generates a timestamp T computes a hash of M = H signs H + T = S' sends Alice a receipt message H + T + S' Alice checks H against her original message validates Bob's signature archives the receipt message

Features Like digital signature NRO, but in reverse message = acknowledgement Standardized part of S/MIME secure receipt of available in MS Outlook Other variants TTP Signature, In-Line etc. all the same options available

Problem Requires that the recipient generate the receipt What about the "reluctant recipient"? reason for NRD in the first place

Trusted Delivery Agent Alice sends message of Vicky Bob must contact Vicky to access message Vicky generates receipt

Non-repudiation of submission Useful when what matters is submitting something a bid acceptance Like NDD but with the mail system or the bidding engine doing the verification

Basic idea Parties agree to non-repudiation mechanism Evidence is generated during transaction Evidence is transmitted Evidence is verified Evidence is archived If necessary Evidence is retrieved Evidence is presented for dispute resolution

Digital evidence Evidence will be strong if secure chain of custody from creation to presentation properties of authenticity and integrity policies of the CA and TTP

Secure bidding Suppose Alice doesn't want Bob to know the contents of her message a bid to be unsealed later Additional safeguards Alice shouldn't be able to change her mind Bob shouldn't be able to read her bid "Commitment protocol" Alice commits to an answer but doesn't reveal it

Commitment protocol Alice encrypts M with symmetric key k produces ciphertext C generates the transaction based on C Bob gets Alice's bid C he can verify identity and timestamp gets copy of C When bids are revealed Alice transmits k Bid can be read

Homework #4 Use secure digital signature encryption Get certificate from cannot use web mail if necessary, open a new hotmail account Use Outlook Express or Netscape Communicator