The Digital Signature Paradox
|
|
|
- Lydia Hodges
- 10 years ago
- Views:
Transcription
1 White Paper The Digital Signature Paradox Jeff Stapleton, Paul Doyle, Steven Teppler, Esq. Abstract Paradox is a term often associated with Hollywood s fanciful time travel; however in the real world a time paradox does, in fact, exist. The system clock is the immediate source of time for any computer, and is the sole source for a time stamp determining when a document was created, modified and printed; or more interestingly when a digital signature was generated. Fraud has already been perpetrated by turning back system clocks, leading to the falsification of information for which individuals have been disbarred or incarcerated. The application of a digital signature would not have resolved these issues; that is because digital signatures are time-insensitive. However, an independent clock source providing a trusted time stamp would and can circumvent individuals taking such illegal liberties. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism. This document is an updated version of a paper titled The Digital Signature Paradox that was originally published in the Proceedings of the 2005 IEEE Workshop on Information Assurance and Security. It has been made available in this format with the permission of the authors.
2 White Paper Table of Contents I. Introduction 3 A. Asymmetric Cryptography 3 B. Digital Signatures 3 C. Stamping 5 II. Paradox 7 A. -Insensitive Digital Signatures 7 B. Trusted Stamp 8 C. X9.95 Standard 9 III. Consequences of -Based Data Manipulation 10 A. Enron (CFO) 10 B. Rite-Aid (CEO, CFO) 10 C. NextCard (Auditors) 10 D. Autotote (Programmers) 10 E. Sirena Corp (CEO) 10 F. Parmalat (CEO, CFO, and Family) 10 G. Adelphia Communications (executives) 11 IV. Conclusion 11 V. References 12
3 White Paper I. Introduction A. Asymmetric Cryptography Public key cryptography is the security discipline employing asymmetric cryptography that enables key establishment of symmetric keys and digital signatures. The intrinsic modularity of asymmetric cryptographic algorithms limits their applicability to relatively short data lengths such that they are typically used to establish symmetric cryptographic keys versus operating on the data itself. The established symmetric keys are then used in streaming or block ciphers with practically unlimited data lengths. Key establishment algorithms come in two flavors key agreement and key transport [X9.44]: Key agreement is a key establishment protocol whose secret key is a function of information contributed by two or more participants, so that no party can predetermine the value of the key. Key transport is a key establishment protocol under which the secret key is determined by the initiating party. B. Digital Signatures With regard to digital signatures, a hashing function is applied to very long data strings to produce a hash value; and the asymmetric private is applied to the hash value to generate a digital signature. The digital signature can be verified by a relying party using the corresponding asymmetric public key. In a classical public key infrastructure the identity of the signer is provided to the relying party via a public key certificate [X.509] issued by a certification authority (CA). The CA s digital signature on the signer s certificate cryptographically binds the signer s identity to the public key. Similarly, the CA s public key may likewise be encapsulated in another certificate issued by another CA such that a chain of certificates may exist; leading to a root CA. The underlying assumption is that the relying party has and trusts one or more of the certification authorities in the certificate chain. 3
4 White Paper Root CA Signature Red CA Signature Signer Signature???? Data Asymmetric public key Public key certificate Public key certificate Figure 1 Certificate Chain As shown in Figure 1 Certificate Chain, the signer generates a digital signature on data. The relying party checks the signer s white certificate and determines that it was issued by the Red CA; the relying party checks the Red CA s certificate and determines that it was issued by the green Root CA. Assuming that the relying party has a trusted copy of the green Root CA s public key, the relying party verifies the green signature on the Red CA s certificate and thus can trust the Red CA public key; the relying party verifies the red signature on the signer s certificate and thus can trust the signer s white public key; the relying party can finally verify the signer s signature on the data.
5 White Paper C. Stamping Most networks provide a system time such that data can be time stamped with the year, month, day, hour, minute, and second. Figure 2 System Stamps shows the relationship between the system clock and the time stamp associated with each piece of signed data. Signer???? Data? T1???? Data? T2???? Data? T3 Figure 2 System Stamps Presumably the time stamp indicates a sequence to the relying party and implies when the digital signatures were generated. However, note that the system generated time stamp is not independent of the data generation, or the digital signature generation processes. The system clock, via the local or wide area network, may be synchronized to a national measurement institute whose clock is calibrated to the international time authority Bureau International des Poids et Mesures (BIPM) located in France. In the United States, the recognized national measurement institutes are the National Institute of Standards and Technology (NIST) and the United States Naval Observatory (USNO).
6 White Paper Figure 3 US National Measurement Institutes shows the relationship of the various NIST timing services such as the: Internet Service (ITS), Automated Computer Service (ACTS), Frequency Measurement Analysis Service (FMAS); and the Global Positioning System (GPS) operated by the USNO [NIST].??? ITA International Authority National Institute of Standards & Technology???? NIST???? USNO United States Naval Observatory Automated Computer Service???? ACTS Traceable Monitored??? GPS Global Positioning System??? ITS Calibration Calibration Calibration???? FMAS Internet Service Device Under Test (DUT) Frequency Measurement & Analysis Service Figure 3 US National Measurement Institutes
7 White Paper II. Paradox A. -Insensitive Digital Signatures Figure 4 Digital Signature Paradox below shows the same sequence of signed data; however the system clock has been reset such that the same time stamp is generated at three different times (T1, T2, and T3) for different versions of the same data. The time paradox is that a relying party now has three versions of the same data with the same time stamp; and despite the presence of a legitimate digital signature the relying party can no longer have confidence in the data. Thus digital signatures are time-insensitive. The relying party has no practical method to distinguish between the three data versions, has no method to prioritize the data versions and has no option but to distrust all three versions. In order for the relying party to distinguish between the data versions and continue to trust the digital signatures, the signer needs to implement a verifiable mechanism such that the time stamp generation is independent of the signature generation. This method is referred to as a trusted time stamp. Signer Data T1 Data T2 Data T3 Figure 4 Digital Signature Paradox 7
8 White Paper B. Trusted Stamp In a trusted time stamp scheme, there are five entities: time source entity, time stamp authority, requestor, verifier, and relying party. The relying party can be the requestor or any other third party. The time stamp authority (TSA) calibrates its clock with an upstream time source entity such as Master Clock (MC) or directly with a national measurement institute. The TSA provides a trusted time stamp token to the requestor. The time stamp token can be verified by a third party verifier. Figure 5 Trusted Stamp shows the relationship between the time source entities, the TSA, and the requestor. The requestor generates a digital signature by hashing known data and applying its asymmetric private key to the hash. The digital signature is presented to the TSA as a request for a time stamp token. Note that the TSA only knows the digital signature, not the original source data, and therefore has no liability as to the data content. The TSA appends a time stamp to the requestor s hash and binds them together with a cryptographic method, such as a digital signature [X9.95]. The hash, the time stamp and the crypto are the essential elements of the time stamp token that the TSA returns to the requestor. The requestor can then provide the original data, the requestor s digital signature, and the time stamp token to a relying party.??? ITA International Authority Source Entities??? NMI?? MC National Measurement Institute Master Clock Hash Data Stamp Authority TSA Request Response Sign????? Token R Requestor???? Figure 5 Trusted Stamp???? DATA????? Token
9 Stamp Authority TSA Request Response Sign????? Token White Paper R Requestor???? Figure 6 Verification shows how the relying party can then make use of a verification service who (i) verifies that the hash in the time stamp token matches the data, (ii) verifies the TSA s crypto binding, and (iii) verifies the requestor s digital signature this provides non-reputable evidence of who signed the data (authentication), when it was signed (timeliness) and what data was signed (integrity) provable to an independent third party.???? DATA????? Token???? V Verifier Figure 6 Verification The definition of data integrity a property whereby data has not been altered or destroyed must therefore be expanded to embrace time-sensitive mechanisms such as trusted time stamps. An better definition might then be the continuity of data at a provable point in time. With this definition a relying party can verify that data integrity is currently contiguous from a previous point in time. C. X9.95 Standard The American National Standard X Trusted Stamps was developed based on RFC 3161 [TSP] and the ISO/IEC standards [ISO], but goes much further in its analysis and offerings. X9.95 defines time stamp schemes that provide a high assurance level of data integrity and non-repudiation not achievable by digital signatures alone; suitable for regulatory compliance. The standard defines roles, responsibilities, and the management and security requirements for the time source entity, the time stamp authority, the requestor, and the verifier. The standard specifies data objects; message protocol; and trusted time stamp methods, including the digital signature, MAC, linked token, linked and signature, and transient key methods. The standard also provides sample time stamp policy and practice statements along with evaluation compliance criteria suitable for use by a professional practitioner.
10 White Paper III. Consequences of -Based Data Manipulation A. Enron (CFO) Mr. Fastow, the Chief Financial Officer of Enron, and other members of his executive team made it a habit to engage in time-based data manipulation, i.e., altering or changing financial data to suit whatever it was they wanted the investing public, or governmental authorities, to know or not know. Mr. Fastow pleaded guilty and is now a guest of the federal government. B. Rite-Aid (CEO, CFO) The CEO and the CFO of this publicly-traded company backdated compensation grant letters to enrich themselves by millions of dollars. They then attempted to remove any evidence of their wrongdoing by dumping the computer they used to backdate the documents into the Atlantic Ocean. These gentlemen are now guests of the federal government. C. NextCard (Auditors) Now defunct NextCard was the largest issuer of Internet MasterCard and Visa credit cards. Executives of this former high-flying public company fraudulently and illegally re-characterized loan losses, thereby reducing the amount of cash reserves required. Assisting in no small way in this billion dollar flameout, auditors from Ernst & Young perpetuated the company s fraud by backdating their work papers and their final reports to conform to the fraudulent representations by company executives. These auditors are also currently guests of the federal government. The SEC attorney investigating this matter lamented that the real crime here was that there was no way to ascertain or recover the real, or the true data, because of the time-based data manipulation of these insiders. D. Autotote (Programmers) A senior trusted-insider programmer for the largest electronic wagering organization in the United States back-dated data to create a 6 million dollar winning ticket in the Maryland Breeder s Cup race. This gentleman is now a guest of the state. E. Sirena Corp (CEO) The Securities and Exchange Commission fined publicly traded Sirena Corp. for holding the quarter open for days after the end of that quarter in order to squeeze additional revenues to meet analysts projections. Sirena eventually declared bankruptcy. F. Parmalat (CEO, CFO, and Family) In this 18 billion dollar 2003 bankruptcy, the entire CxO level of this multi-national conglomerate engaged in time-based data manipulation by creating an authenticappearing confirmation by Bank of America, on Bank of America letterhead, and signed by a Bank of America Vice President, to the effect that there existed an offshore bank account holding 5 billion euro on account. In reality both the funds and the account were non-existent, and the alleged Bank of America letter used by the Company to 10
11 White Paper raise billions in the public credit market was pieced together by the company executives using a scanner and Adobe Photoshop, from three totally unrelated sources. The signature of the Bank of America VP was from the information technology department. There are currently at least three lawsuits, including two class actions, pending in various courts around the world. G. Adelphia Communications (executives) Once one of the largest cable providers in the United States, Adelphia s top executives engaged in time-based data manipulation to hide the theft of more than 400 million dollars from the company. Adelphia subsequently entered bankruptcy, its top executives were tried (and two convicted), and the company is now being acquired by one of its competitors. IV. Conclusion So is time-based data manipulation really that much of a problem? It most certainly is: a multi-billion dollar problem, as the case studies above make clear. When given the opportunity, a certain percentage of trusted insiders will always abuse their authority to manipulate records to their advantage. Digital signature-based schemes cannot adequately address this problem, but trusted timestamp technologies might be just what the doctor ordered: a practical, inexpensive and technically robust solution. 11
12 White Paper V. References [X9.44] X9.44 (draft) Public Key Cryptography for the Financial Services Industry Key Establishment Using Integer Factorization Cryptography, Accredited Standards Committee X9, October 2003 [X.509] ISO/IEC International Standard ITUT Recommendation X.509 (1997), Information Technology Open Systems Interconnections The Directory: Authentication Framework [NIST] National Institute of Standards and Technology, Physics Laboratory and Frequency Division, [X9.95] American National Standard X Trusted Stamps, Accredited Standards Committee X9, March 2005 [TPS] Request for Comments (RFC) 3161 Internet X.509 Public Key Infrastructure -Stamp Protocol (TSP), Internet Engineering Task Force (IETF), C. Adams, P. Cain, D. Pinkas, R. Zuccherato, August 2001 [ISO] ISO/IEC Information Technology Security Techniques Stamping Services, ISO/IEC Joint Technical Committee One (JTC1), 2003 Digital Signature Paradox, J. Stapleton, P. Doyle, S. Teppler Esq., Proceedings of the th IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY Digital Signatures are Not Enough, J. Stapleton, S. Teppler Esq, THE ISSA JOURNAL, January All Rights Reserved., Transient Key, the logo, ProofMark and the ProofMark System are trademarks of Inc. All other trademarks are owned by their respective companies. 12
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Biometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
2.1 The scope of Time Stamping Protocol (TSP)
XML Security Time Stamping Protocol Axelle Apvrille Vincent Girier Storage Technology European Operations 1 Rd Point Général Eisenhower 31106 Toulouse, France Axelle Apvrille,Vincent Girier @storagetek.com
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
TechNote 0006: Digital Signatures in PDF/A-1
TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
TC TrustCenter GmbH Time-Stamp Policy
GmbH Time-Stamp Policy NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This document may not be copied, distributed, used, stored or transmitted in any form or
Record Integrity and Authentication for Electronic R&D
Record Integrity and Authentication for Electronic R&D Author: Michael H Elliott Note: The following is a summary of a comprehensive analysis on electronic record integrity and authentication contained
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
TELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December 2014. Document issue: 2.0
Entrust Certificate Services Java Code Signing User Guide Date of Issue: December 2014 Document issue: 2.0 Copyright 2009-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Guideline for Implementing Cryptography In the Federal Government
NIST Special Publication 800-21 [Second Edition] Guideline for Implementing Cryptography In the Federal Government Elaine B. Barker, William C. Barker, Annabelle Lee I N F O R M A T I O N S E C U R I T
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Adobe PDF for electronic records
White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract
A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Cryptography in Metrology
Cryptography in Metrology Experiences, Applications and new Developments Norbert Zisky Content Metrology needs security Secure electronic exchange of measurement data Secure bidirectional communication
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
The Importance of Security Standards
The Importance of Security Standards Presented by Douglas Kozlay Principal Engineer, Information Resource Engineering, Inc. Member: ANSI X9F INFORMATION RESOURCE ENGINEERING, INC. The Importance of Security
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
EFFECT OF THE SARBANES-OXLEY ACT OF 2002
EFFECT OF THE SARBANES-OXLEY ACT OF 2002 August 15, 2002 President Bush signed the Sarbanes-Oxley Act of 2002 (the Act ) into law on July 30, 2002, after numerous business and accounting scandals had rocked
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.
21 CRF 11 Electronic Records and Signatures Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. By Todd Duell What does Title 21 of the Code of Federal
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Berkley Insurance Company
Lawyers Professional Liability Insurance New Business Application CLAIMS MADE WARNING FOR APPLICATION: This Application is for a Claims Made and Reported Policy, relating to claims made against the Insureds
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
ETSI EN 319 401 V1.1.1 (2013-01)
EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1
How To Understand And Understand The Certificate Authority (Ca)
TS 102 042 V1.1.1 (2002-04) Technical Specification Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V1.1.1 (2002-04) Reference DTS/SEC-004006 Keywords e-commerce,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
Information & Communication Security (SS 15)
Information & Communication Security (SS 15) Electronic Signatures Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Agenda
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Digital Signatures in a PDF
This document describes how digital signatures are represented in a PDF document and what signature-related features the PDF language supports. Adobe Reader and Acrobat have implemented all of PDF s features
The Concept of Trust in Network Security
En White Paper Date: August 2000 Version: 1.2 En is a registered trademark of En, Inc. in the United States and certain other countries. En is a registered trademark of En Limited in Canada. All other
PkBox Technical Overview. Ver. 1.0.7
PkBox Technical Overview Ver. 1.0.7 14 September 2015 All the information in this document is and can t be used entirely or in part without a written permission from Intesi Group S.p.A. Le informazioni
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
TC TrustCenter GmbH Time-Stamp Practice and Disclosure Statement
GmbH NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This document may not be copied, distributed, used, stored or transmitted in any form or by any means, whether
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Procedures associated with Board Policy 5.22
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Procedures associated with Board Policy 5.22 5.25.1 Use of Electronic Part 1. Purpose. This procedure establishes requirements
Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.
Code Signing Code signing is the process of digitally signing executables and scripts to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since
1 Definitions 86-611 001-001.10
NEBRASKA ADMINISTRATIVE CODE NUMERICAL TABLE OF CONTENTS Chapter # Chapter Title Statutory Code Section(s) Authority 1 Definitions 86-611 001-001.10 2 Digital Signatures Must be Created by Acceptable Tech.
HOLDER IN DUE COURSE and CHECK FRAUD
HOLDER IN DUE COURSE and CHECK FRAUD Frank Abagnale President, Abagnale and Associates www.abagnale.com Greg Litster President, SAFEChecks Canoga Park, CA (800) 949-2265 [email protected] Every company
Human Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
ETSI TS 102 778-3 V1.1.2 (2009-12) Technical Specification
TS 102 778-3 V1.1.2 (2009-12) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
ehealth Ontario PKI Certification Policy Manual
ehealth Ontario PKI Certification Policy Manual Part One: Concept of Operations Part Two: Certification Policies Version: 1.1 2005 January 25 Document Control Document Identification Title Location: Maintained
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1
Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
How To Get A Whistleblower Pass On A Corporation
FLORIDA SARBANES OXLEY ACT What a Whistleblower Needs to Know Corporations have a legal and moral obligation to both their employees and their investors to ensure that the company is both profitable and
