Development and Application of EDI-DT System

Size: px
Start display at page:

Download "Development and Application of EDI-DT System"

Transcription

1 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM Development and Application of EDI-DT System Guangming WANG, Guiyi WEI College of Computer and Information Engineering, Hangzhou University of Commerce, ABSTRACT: EDI is an important type of B2B electronic commerce practices. Basing on the result of a successful national research program on EDI, the paper presents the development philosophy and applications of an EDI system focusing on domestic trading. The techniques utilized to achieve high adaptability and flexibility, and the measures adopted to insure high security are discussed in detail. Key Words: EDI; UN/EDIFACT; domestic trading; business forms 1. Fundamentals of EDI-DT EDI (electronic data interchange) is an important type of B2B electronic commerce practices worldwide. Chinese government set up a key research program series on EDI (96-A20) during the last five year s planning involving international trading, domestic trading, commodity inspection, customs, etc. The above works have been done successfully, and have passed the national evaluation earlier As a part of the above program (96-A20-03), and basing on wide investigation and analysis, the authors and their research team have determined work flow of domestic trading, a set of standard business forms for it, and have developed a EDI system for domestic trading (EDI-DT). EDI-DT System has been adapted for daily operation by a number of companies in Shanghai and Hangzhou. The paper here presents the ideas and techniques utilized to achieve high adaptability and flexibility for EDI-DT, and the measures adopted to insure high security to realize system s high vitality. 2. High Flexibility and Adaptability Although some business forms have been defined during the period of system development, new forms are possibly required in the future, and the appearance of existent forms could be reshaped for different users, it is important to make EDI-DT flexible and adaptable to keep the system alive longer. The ability for customers to define new types of business forms and the ability to change the form of existent forms interactively without program rewriting are the techniques adapted by EDI-DT, and the ability for customers to redefine data dictionary therefore to guarantee correct form translation automatically without programmers' help is also realized. 2.1 Defining New Types Of Business Forms By selecting the menu item Setting of Business Forms users could define new types of business forms. Considering some data items, even a big share of data are possibly identical between two different forms, the system provides customers options to develop a new type of form starting from scratch, or picking up an existent form as template. This ability not only raises the flexibility and adaptability, but also speeds up system development because program coding and business form defining could be done parallelly.

2 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM Redefining of Forms' Appearances Each business form consists of two documents: master and slave, which are related by compound key of form series number, form date, supplier ID code and demander ID code. User may decide which document to be updated or both. Redefining could be happened on the structure and shape of the form, font selection, character size and color setting, etc. In addition, the printing format of forms could also be readjusted according to users wish without programmers' help. 2.3 Adaptability of Message Translation In EDI-DT system business documents (for example, an order) are transferred from one place to another business partner in a precisely predefined data stream complied with UN/EDIFACT standards. Special measurements must be taken to make the translation module still workable when a new type of forms has been defined or the interfaces of existent forms have been changed. The technique of data dictionary is therefore used. Each type of forms has a related dictionary, in which each record corresponds to one simple data element of the form, showing its UN/EDIFACT s code, statement ordinal number, its position in the statement, etc. Translation will be done automatically according to the dictionary contents. It is required to create a new data dictionary or modify the corresponding one whenever a new type of form has been created or an old one has been changed. In many cases a closely similar template of dictionary is provided to users for updating reference, therefore, most of users will be able to update dictionaries after training, which is not a hard job, and the high adaptability of message translation is therefore achieved 3. Communication The EDI communication mode could be in one of the following ways: PTP(point to point), VAN(value added network) equipped with X.400, and Internet/intranet. Communication for EDI-DT is based on VAN obeyed with X.400 (picture 1).

3 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM 国 家 EDI 服 务 中 心 x.400 x.435 国 际 EDI 其 它 省 市 EDI 服 务 中 心 x.25+ x.400 CHINAEDI 大 型 EDI 用 户 本 地 EDI 服 务 中 心 DDN 本 地 PSTN 大 型 EDI 用 户 一 般 EDI 用 户 一 般 EDI 用 户 Picture 1 EDI Communication Mode Picture 1 EDI Communication Mode The EDI center uses EDISwitch developed by GEIS company, it provides Intercept-Connect for client communication. The model is referenced by means of "esconnec my_para.par my_sta.sta'. Here, my_para.par is a parameter file containing all the information for communication port initialization and operations (such as sending, receiving message, updating transaction password, etc) for this connection. My_sta.sta is a status file, into which all the information about successfulness of the connection, receiving and sending messages will be written after the connection has been done. The system may judge the consequences of the connection and related operations. 4. Security of EDI-DT To make EDI transactions highly reliable some secure measurements must be taken to avoid disavowing, unauthorized interception and interpolation. Encryption/decryption and digital signature are used to achieve the above goal. Here, the EDI center acts as certificate authority, provides each registered user a pair of keys (a private and a public), and the public key of EDI center is open to all of users. Let us use M to represent the message to be sent over network, Kpuba, Kpria to represent the public and private key of user A, and Enc, Dec, H to represent the action of encryption, decryption and one way hash transform respectively, and use C for EDI center. Then Enc(H(M))Ppria means perform HASH transfer first, and then make encryption with the private key of B. Now secure message T transfer from A to B through C would be described as below.

4 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM B:public Random Key(RK) Random Key(RK) Random Key PlainText PlainText Symmentric Text Text Internet Hash Func Digest Digital A:private s Pic 2 and Secure Text Transfer B:private Random Key Random Key(RK) Internet Text -- Text Symmentric PlainText Hash Func Digest Digital A:public Same? Digest' No Yes Verified Verification Failed Pic 3 Secure Text Receiving a. A sends a request R signed with Kpria to C requesting communication with B; b. After receiving the request C performs Enc on it with Kpuba, verifies the result; then signs Kpubb with Kpric, then performs Enc with Kpuba, and then sends the result to A; C does Enc on Ppuba with Ppric, Enc with Ppubb, and then sends the result to B; c. After receiving above message from C, A applies Dec with Ppria, then performs Dec with Ppubc, after verifying A obtains Ppub; d. A performs Enc(M) Kr, here Kr is a randomly generated key, Enc(Kr) Ppubb, applies Enc(H(M)) Ppria to generate A's signature, finally, sends Enc(M) Kr, Enc(Kr) Ppubb, and Enc(H(M)) Ppria to B; The picture 2 shows the above work flow; e. After receiving message from A, B performs reverse transfer described in picture 3. A may verify is the message received from is actually sent by A and without interpolation. Here, you may see that business document T (which could be long) is encrypted by using symmetric algorithm (which is fast), and the signature is realized by means of asymmetric encryption/decryption algorithm (which is relatively slow, but higher

5 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM reliable). Hash is a one-way function turning T with variable length into a short and fixed length text for signature generation. The combination use of symmetrical and asymmetrical encryption technique is a good practice to achieve high security and efficiency. 5. Applications of EDI-DT The system has been used in Shanghai and Hangzhou in scale. Shanghai Lianhua Supermarket Group, Hangzhou Beida Department Store have adapted the system to exchange business documents on line with a number of their business partners. The business scope includes price asking, price reporting, ordering, ordering confirming, delivery noticing, delivery listing, etc. It makes the ordering practices, previously secrete, more regulated and open-eyed. Besides, due to a special characteristic provided by the system: manufacturers are able to examine dynamic movement of the goods supplied by them on line, they may reduce the number of sales persons dispatched previously in the department stores selling their products. It improves economic efficiency greatly. Furthermore, EDI-DT supports department stores to switch from two stage ordering to centralized ordering, which is considered one helpful approach to enhance enterprise competitive capability in the case of China is going to join WTO. Basing on the performances described above, the system was passed national checking and accepting, and technical appraisal separately in the year Further Work Much work has to be done in the future. Beside of expanding the business circle using EDI-DT, it is wise to develop new EDI system on Internet, due to the fact that XML (expansible markup language) supports additional capabilities in data type definition, display and linking abilities, making information exchange easier between web pages and databases. Developing XML/EDI applications is the preferable choice. REFERENCES 1. Guangming WANG, EDI Research and EDI development in domestic trading, Business Economics and Administration, Guangming WANG, Tang YONG, Principles of EDI Client System--Realization of Message Translation and Packing, Computer Engineering and Design, GE Information Services,Enterprise System and EDISwitch Administration and Support Guide,GE Information Services,Inc,USA, Robert L. Sullivan,Electronic Commerce with EDI,Twain, Inc., Jan C.A.VAN DER LUBBE, Basic Methods of ography, Cambridge University Press, Digital Standard, NISTCSL bulletin, Nov Guiyi WEI, Guangming WANG, Communication Security for Internet based MIS, Proceeding of 14 th National MIS conference, Ming WANG, Guangming WANG, Security and Digital for EDI System, Proceeding of 14 th National MIS conference,

6 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM Guangming WANG Male, Born in 1945, Professor, Hangzhou University of Commerce Director of Institute of Information Engineering and Electronic Commerce Deputy chairman, Provincial Expert Group on Information Progress 1968, graduated from Qinghua University with bachelor degree, majored in electrical engineering , graduated from Polytechnic University of New York, USA, with master degree, majored in computer science , university lecturer, computer science, Governors State University, USA , technician in factories and mine 1980-present, lecturer, associate professor, professor, Hangzhou University of Commerce Guiyi Wei Male, Born in 1972, Instructor, Hangzhou University of Commerce 1973, Graduated from Hangzhou University of Commerce with bachelor degree, majored in MIS graduated from Hangzhou University of Commerce with Master degree, majored in economic information management

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

A Digital Signature Scheme in Web-based Negotiation Support System

A Digital Signature Scheme in Web-based Negotiation Support System A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada yxmeng68@yahoo.ca

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing

More information

CEFACT AD HOC WORKING GROUP ON SIMPL-EDI AND FORMS AND WEB BASED EDI (SIMAC) Proposal for a UN Repository for XML/EDI

CEFACT AD HOC WORKING GROUP ON SIMPL-EDI AND FORMS AND WEB BASED EDI (SIMAC) Proposal for a UN Repository for XML/EDI 5 June 1998 CEFACT AD HOC WORKING GROUP ON SIMPL-EDI AND FORMS AND WEB BASED EDI (SIMAC) Proposal for a UN Repository for XML/EDI SOURCE: Dick Raman STATUS: CONTRIBUTION ACTION: FOR DISCUSSION page 2.

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

By Koji MIYAUCHI* ABSTRACT. XML is spreading quickly as a format for electronic documents and messages. As a consequence,

By Koji MIYAUCHI* ABSTRACT. XML is spreading quickly as a format for electronic documents and messages. As a consequence, Falsification Prevention and Protection Technologies and Products XML Signature/Encryption the Basis of Web Services Security By Koji MIYAUCHI* XML is spreading quickly as a format for electronic documents

More information

Sales CRM Customer Relation Management System. Presented By: Chattary Ajwan Infotech Pvt. Ltd

Sales CRM Customer Relation Management System. Presented By: Chattary Ajwan Infotech Pvt. Ltd Customer Relation Management System Presented By: Chattary Ajwan Infotech Pvt. Ltd Objective To provide Platform to Sales Team to improve Performance in every activities done at the time dealing with customers.

More information

PGP - Pretty Good Privacy

PGP - Pretty Good Privacy I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Cryptography & Network Security

Cryptography & Network Security Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

VoteID 2011 Internet Voting System with Cast as Intended Verification

VoteID 2011 Internet Voting System with Cast as Intended Verification VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005 Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors

More information

How To Encrypt Data With Encryption

How To Encrypt Data With Encryption USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security

More information

E-business Management System Based on Coordinated Center for Dealer

E-business Management System Based on Coordinated Center for Dealer The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 533 E-business Based on Coordinated Center for Dealer Ding Zhang 1, Jingwen An 1, Zhongqing Cheng 2 1 School of Management,

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0

Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Page 1 of 13 Table of Contents 1. Introduction... 3 2. System work flow and terminology... 3 3. User Descriptions...

More information

Message Authentication Codes

Message Authentication Codes 2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,

More information

An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups

An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups Abstract Yan Shen 1, Bao Wu 2* 3 1 Hangzhou Normal University,

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

Introduction to E-commerce

Introduction to E-commerce i Zheng Qin Introduction to E-commerce With 98 figures Springer Contents Part 1 Fundamentals 1 Fundamentals of E-commerce 3 1.1 The Origin and Development of E-commerce 4 1.1.1 The Origin and Development

More information

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them. Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com melkins@foxguardsolutions.com Version.05 9/2012 1 Certificate Use Overview

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published

More information

B U S I N E S S G U I D E

B U S I N E S S G U I D E VeriSign Microsoft Office/Visual Basic for Applications (VBA) Code Signing Digital Certificates Realizing the Possibilities of Internet Software Distribution CONTENTS + What Is Developer Code Signing?

More information

SecureMessageRecoveryandBatchVerificationusingDigitalSignature

SecureMessageRecoveryandBatchVerificationusingDigitalSignature Global Journal of Computer Science and Technology: F Graphics & Vision Volume 14 Issue 4 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Project #2: Secure Email System Due: Tues, November 29 th in class

Project #2: Secure Email System Due: Tues, November 29 th in class Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within

More information

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

FIPS 140-2 SECURITY POLICY FOR

FIPS 140-2 SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer

More information

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

More information

PGP Encryption Software

PGP Encryption Software PGP Encryption Software Shuhan Wang Technology, Communication and Transport Degree Programme in Information Technology 2014 Abstract of Thesis Technology, Communication and Transport Degree Programme in

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

Feature and Technical

Feature and Technical BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5

More information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public

More information

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object

More information

METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology -

METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology - METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology - Distribution and Logistics Policy Division Ministry of Economy, Trade and Industry 1 Contents 1.

More information

AS2 AND EDI OVER THE INTERNET FAQ

AS2 AND EDI OVER THE INTERNET FAQ AS2 AND EDI OVER THE INTERNET FAQ A SoftCare EC Inc. White Paper ABOUT SOFTCARE Founded in 1989 and headquartered in British Columbia, SoftCare EC Inc. develops e-business software. Our OpenEC product

More information

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028 Review Final Exam 12/10/2015 Thursday 5:30~6:30pm Science S-3-028 IT443 Network Security Administration Instructor: Bo Sheng True/false Multiple choices Descriptive questions 1 2 Network Layers Application

More information

Guide to Data Field Encryption

Guide to Data Field Encryption Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations

More information

ISM/ISC Middleware Module

ISM/ISC Middleware Module ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006

XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006 XML Encryption Syntax and Processing Duan,Limiao 07,12,2006 Agenda Introduction Encryption Overview and Examples - An XML Element - XML Element Content (Elements) - XML Element Content (Character Data)

More information

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department

More information

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10. Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

AS DNB banka. DNB Link specification (B2B functional description)

AS DNB banka. DNB Link specification (B2B functional description) AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...

More information

LatticeXP2 Configuration Encryption and Security Usage Guide

LatticeXP2 Configuration Encryption and Security Usage Guide April 2013 Introduction Technical Note TN1142 Unlike a volatile FPGA, which requires an external boot-prom to store configuration data, the LatticeXP2 devices are non-volatile and have on-chip configuration

More information

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security

More information

Steganos Secure E-Mail Step by Step Instructions. Introduction STEP 1: INSTALLATION

Steganos Secure E-Mail Step by Step Instructions. Introduction STEP 1: INSTALLATION Steganos Secure E-Mail Step by Step Instructions Introduction Although more and more PC users learn that an e-mail can be read by a third party as easily as a postcard, e-mail encryption is still quite

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Using ASP-Based Message Encryption Project To Teach Information Security Concepts

Using ASP-Based Message Encryption Project To Teach Information Security Concepts Using ASP-Based Message Encryption Project To Teach Information Security Concepts Qidong Cao College of Business Administration, Winthrop University Rock Hill, SC 29733, USA caoq@winthrop.edu John S. Davis

More information

Secure Email. SOFTWAR INC. PO Box 325 Manquin, VA 23106 Information Security

Secure Email. SOFTWAR INC. PO Box 325 Manquin, VA 23106 Information Security Secure Email SOFTWAR INC. PO Box 325 Manquin, VA 23106 Information Security Softwar Choctaw Secure Email Application 2015 Softwar Inc. all rights reserved. CHOCTAW Secure Email application Choctaw provides

More information

e-business Frameworks based on MDA

e-business Frameworks based on MDA e-business Frameworks based on MDA Haeng-Kon Kim Abstract In this paper, we survey and analyze the actual conditions of EDI system for B2B business of transport companies in Korea. As the result of our

More information

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number

More information

Microsoft Dynamics TM NAV 5.00. Installation & System Management: Employee Portal for Microsoft Dynamics NAV

Microsoft Dynamics TM NAV 5.00. Installation & System Management: Employee Portal for Microsoft Dynamics NAV Microsoft Dynamics TM NAV 5.00 Installation & System Management: Employee Portal for Microsoft Dynamics NAV INSTALLATION AND SYSTEM MANAGEMENT: EMPLOYEE PORTAL FOR MICROSOFT DYNAMICS NAV Information

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Auditing Encryption in Oracle Databases

Auditing Encryption in Oracle Databases Auditing Encryption in Oracle Databases Prepared and presented by: Tanya Baccam SANS Institute Senior Certified Instructor CPA, CITP, CISSP, CISA, CISM, GSEC, GPPA, GCIH, OCP DBA Baccam Consulting LLC

More information

Pulse Secure, LLC. January 9, 2015

Pulse Secure, LLC. January 9, 2015 Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May

More information

CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services

CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services P/N:900-1005-20 CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services (hereinafter referred

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Standardised Electronic Invoicing for the Increased Efficiency of Australian Small Business

Standardised Electronic Invoicing for the Increased Efficiency of Australian Small Business Standardised Electronic Invoicing for the Increased Efficiency of Australian Small Business 31st May 2015 - Revision 0 Author: James Dwyer About the Author Introduction Immediate Benefits of a Nationally

More information

Chapter 16: Authentication in Distributed System

Chapter 16: Authentication in Distributed System Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Function and Structure Design for Regional Logistics Information Platform

Function and Structure Design for Regional Logistics Information Platform , pp. 223-230 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.22 Function and Structure Design for Regional Logistics Information Platform Wang Yaowu and Lu Zhibin School of Management, Harbin Institute of

More information

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

More information

Cryptography Lecture 8. Digital signatures, hash functions

Cryptography Lecture 8. Digital signatures, hash functions Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

INVOICES 5-5. The world s most popular gateway to electronic invoice processing

INVOICES 5-5. The world s most popular gateway to electronic invoice processing INVOICES 5-5 The world s most popular gateway to electronic invoice processing Electronic invoice processing is extremely profitable Can your company afford the traditional, manual handling of supplier

More information

On the Interaction and Integration of Cross Selling and Customer Relationship Management

On the Interaction and Integration of Cross Selling and Customer Relationship Management On the Interaction and Integration of Cross Selling and Customer Relationship Management SUN Shaofu School of Management, Dalian Jiaotong University, Dalian, Liaoning, China, 116028 sunshaofudl@163.com

More information

Electronic Permit Submittals

Electronic Permit Submittals Central District Water Permitting Electronic Permit Submittals November 19, 2014 Electronic Submittal of Documents You can submit electronic applications and comply with the PE Sign, Seal, and Requirements.

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system

More information

1. PORTAL TIE ENTERPRISE

1. PORTAL TIE ENTERPRISE 1. PORTAL TIE ENTERPRISE 1 The ideal open environment for B2B ecommerce Working efficiently, that is what it is all about in B2B ecommerce. Integration of your company s applications with those of your

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information