Digital Signatures A Brief Overview by Tim Sigmon August, 2000.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Security Management.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure Ammar Hasayen ….
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
1 PKI Update September 2002 CSG Meeting Jim Jokl
Secure Electronic Transaction (SET)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Some Technical Issues in PKI Deployment David Chadwick
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
S/MIME T ANANDHAN.
Public Key Infrastructure
Technical Approach Chris Louden Enspier
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
September 2002 CSG Meeting Jim Jokl
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Digital Signatures A Brief Overview by Tim Sigmon August, 2000

Digital Signatures u Legal concept of “signature” is very broad –any mark made with the intention of authenticating the marked document u Digital signatures are one of many types of electronic signatures u Example electronic signatures –loginid/password, PIN, card/PIN –digitized images of paper signatures –digitally captured signatures (UPS, Sears, etc.) –typed notations, e.g., “/s/ John Smith” – headers

Digital Signatures (cont’d) u “digital signature” means the result of using specific cryptographic processes u Digital signatures operate within a framework of hardware, software, policies, people, and processes called a Public Key Infrastructure (PKI) u Note: PKI also supports other security requirements; in particular, confidentiality, both during transmission (e.g., SSL) and for storage

Public Key Cryptography u First, “secret key” or symmetric cryptography –same key used for encryption and decryption –orders of magnitude faster than public key cryptography u Public key technology solves the key exchange problem (no shared secrets!) u Public key and private key that are mathematically linked u Private key not deducible from public key u Confidentiality: one key encrypts, other decrypts u Digital signature: one key signs, other validates

Digital Signature example

Signed example u (show example of sending/receiving digitally signed using Netscape Messenger) u (uses S/MIME)

Problem: relying party needs to verify a digital signature u To do this, must have an assured copy of the signer’s public key –signer’s identity must be assured –integrity of public key must be assured u Potential options for obtaining public keys –signer personally gives their public key to relying party –relying party obtains the desired public key by other “out of band” means that they trust, e.g., transitive relationships, signing parties, etc. u But, what about strangers? what about integrity of the public key?

Public Key (or Digital) Certificates u Purpose: validate both the integrity of a public key and the identity of the owner u How: bind identifying attributes to a public key (and therefore to the keyholder of the corresponding private key) u Binding is done (i.e., digitally signed) by a trusted third party (Certification Authority) u It is this third party's credibility that provides "trust"

X.509 v3 Certificates u Subject’s/owner’s identifying info (e.g., name) u Subject’s/owner’s public key u Validity dates (not before, not after) u Serial number u Level of assurance u Certification Authority’s name and signature u Extensions

Example Certs u (this is where I show and describe the contents of the actual certificates that were used to verify a digitally signed message)

Distribution of Certificates u since certs carry public info and are integrity- protected, they can be distributed and shared by any and all means, e.g., –distribute via floppies or other removable media –publish on web sites –distribute via (e.g., S/MIME) –directory lookups (e.g., LDAP, X.500) u distribution via directories is the ultimate solution u however, many important applications and uses of digital signatures can be implemented without the implementation or use of sophisticated directories

Trust and Certification Paths u Relying party needs an assured copy of the issuing CA’s PK in order to validate a certificate containing the signer’s PK u In general, a chain of multiple certificates that ends at a trusted root may be needed u How to organize the CA’s? –single top-down hierarchy (yikes!) –multiple hierarchies (Netscape/Microsoft disservice) –cross certifications (e.g., Federal BCA, Virginia’s BCA) u Revocation and CRLs (certificate revocation lists)

Where are we now? u Technologies are still evolving but are very usable u Policies and legal standing exist but still developing (need case law) –Code of Virginia, Federal law –Uniform Electronic Transctions Act u Browsers/ already contain a lot of capability u Particular uses widely taking place, e.g., SSL u Some universities making more use, e.g., MIT u Federal government taking a leadership role u ITC/UVa project for deployment

DS efforts in Virginia u Digital Signature Initiative (COTS workgroup) formed to pursue pilot deployments u UVa led development of a bridge certification architecture (modeled after federal bridge) u Pilot project sponsors –VIPNet, DIT, DGIF –DMV, DOT, DGS –Counties of Chesterfield, Fairfax, Wise –Cities of Norfolk, Charlottesville u –Virginia’s Council on Technology Services

Portals at UVa A Status Report by Tim Sigmon August, 2000

Portal Definition u problem: every person/group has a different definition u working definition: deliver information and services in an integrated, customized, and personalized manner u elements that we include: –authenticated access –customization - system presents info that is peculiar to the specific user –personalization - user controls certain aspects –break down organizational views/barriers

Background and Players u discussions among ITC, Univ. Relations, Student Council, Student Affairs,.... u JA-SIG conference and uPortal evaluation u development of “e-volving University” proposal u Reynolds and Sweeney presentation to Senior Cabinet u team is led by Nancy Tramontin and Debbie Mills

First Phase u deliver first version of student portal by Jan., 2001 u will not use uPortal (nor any other portal framework) u desired functionality –authenticated access (using existing passwords) –brief stats and web-based access –calendar that includes student events (not personal, yet) –course links –personal links (i.e., bookmarks) –personal reminders (?) –news, announcements, weather –important “fixed” links