Electronic signature, the theory and the practice, Poland and Europe

Size: px
Start display at page:

Download "Electronic signature, the theory and the practice, Poland and Europe"

Transcription

1 Electronic signature, the theory and the practice, Poland and Europe Andrzej M. Borzyszkowski Institute of Computer Science, Gdańsk Branch, Polish Acad. of Sci. Abrahama 18, Sopot, Poland Rada Naukowa Centrum Certyfikacji Signet Abstract. We recall the technical background of electronic signatures, at least the ones widely used in existing statutes, then we discuss the legal aspects, afterwards we discuss in more detail Polish legislation and briefly compare it with the European one. Finally, we conclude on prospects of the use of electronic signature. 1 How does it work? The idea of electronic signature relies on the concept of asymmetric cryptography. Thus at first we start with recalling some details about the latter. Then we describe how the mathematics is turned into a real life. 1.1 Cryptography Cryptography is a science (and a technology) about converting a text, called a plain-text, into a text unreadable for not involved, called a cipher-text. There are, generally speaking, two parties involved, a sender and a receiver. In classical cryptography, the one in use from ancient times until recently, both parties shared a key, the key was used to encrypt a text by the sender as well to decrypt it by the receiver. The problem of authentication has been solved in a similar manner. Two parties shared a secret, authenticity has been established if one of them could prove to the other it knows the secret. The problem how to exchange these secrets securely, how to revoke them, how to handle them have haunted the users for ages. There is no room for such a cryptography if parties have not contacted each other previously or do not plan for a longer relationship, as it is customary in commerce. In the mid 70-ties Diffie and Hellman proposed the idea of having two keys for two purposes. One of the key would be used to encrypt a text, the other to decrypt it. In this schema encryption uses a public key of intended receiver but to decrypt it the receiver s private key is necessary. In such a way the problem of key transport is solved, a public key can and should be published openly, a private key need not to be transported at all. The first implementation of this idea have been provided by Rivest, Shamir and Adleman. Hence, the name RSA. Today this is probably the best known catchword in the area,

2 Preparing a key pair: 1. take two new big prime numbers, p and q; 2. calculate their product n = p q and Euler function e = (p 1) (q 1); 3. take any number f, f < e, f prime w.r.t. e; 4. find its inverse g in a sense that f g = 1 modulo e; 5. publish n, f, keep secret n, g. Signing a message m (m is treated as a number, m < n): s = m g modulo n. Verifying: checking if m = s f modulo n. Justification: (m g ) f = m g f = m 1+multiply e, by Euler s theorem m e = 1, all calculations done modulo n, hence the former must equal m. Fig. 1. RSA algorithm The same idea can be, and is, also used when the issue is to ensure the identity of a sender of the text and the integrity of the text. Then a text is encrypted with the use of a private key of a sender and can be decrypted only using his public key. The possibility to decrypt the text is a proof that the encryption has been done with a corresponding private key. In this situation we use rather terms signature and verification. Note that this time we use the keys in opposite order, first a private one, then a public one. In RSA system the order does not matter. Hence RSA may be used both for encryption and for signing. Other systems are specific. E.g., DSS, Digital Signature Standard, is based on other mathematical idea than RSA and it is applicable only for signing, not for encryption. The technology has one subtlety, namely, the asymmetric key cryptography algorithms are highly inefficient. Therefore, not a whole message is signed but only a message digest, which is (1) very short, say, 160 bits, (2) yet almost unique in the sense that it is improbable to find out, randomly or acting on purpose, another message with the same digest. In such a way a signed message consists of the original message and an encrypted message digest. The verification of a signature consists of comparing a decrypted message digest and the message digest of the signed document they should be equal. 1.2 Certification From the previous section it is clear that upon receiving a signed message one can check if the message has been signed using a private key associated with a public key known to the verifier. Assuming cryptography works it is still unclear who possesses the private key. First problem is if the private key is possessed by a single entity or, maybe, is known to others. Private suggests the former is true, but the latter may be true due to an accident, theft, carelessness of the original possessor, or for some other reasons. We have to be aware about such a possibility, but let s assume for a moment that a private key is possessed by a single entity. So the next problem is, who is this entity? Here, a trusted third party proves to be useful.

3 The trusted third party is an institution which verifies that a person is in possession of a private key, either by checking this fact or by generating this key, and then it issues a certificate, i.e., a document stating that a particular person is an owner of a private key complementary to a public key contained in the certificate. Technically speaking, this certificate is again an example of a signed document signed by a certificate issuer. The problem of checking the latter signature is solved by a wide publication of certificate issuer s public keys, e.g., by preinstalling them in popular Web browsers. Now, a signer of a document signs it using his private key and attaches the certificate to a document, or points to a repository where this certificate is available. A verifier of a signed document checks if the document has been signed using a key paired to a key contained in the certificate and checks the certificate itself, possibly going a longer route, if the certificate issuer s public key is known only by means of another certificate. If verification is positive, one assumes that the document has been signed by a person named in the certificate mentioned at the beginning. Now let us return to the fact that a private key may be lost, despite the fact it should never happen. Then a certificate has to be revoked. One of the services of certificate issuers is to maintain a list of revoked certificates. The process of signature verification is therefore longer. It involves the inspection of the CRL (certificate revocation list) of a given issuer. However, this is still not the end of the story. A signed document verified today may turn out to be not verifiable tomorrow. This happens if a certificate is valid in the time of verification process but is revoked at some time later. In many cases this will not create a problem. But if a signed document has to be kept for a longer time as a proof of a legal action, there is another service needed time-stamping. A signer of a document not only signs it with his private key but also asks a timestamping authority to record a time the document existed as being signed. This servise needs on-line connection to time-stamping authority. Technically, not the whole document is being stamped, but only its small digest. One of the purposes is not to overload connection lines; the other purpose is not to reveal possibly sensitive data to the public. Now, if a certificate is revoked, one can still check that a document has been signed earlier, and conclude the signature is valid. On technical level, there are industry standards for the formats of certificates and certificate revocation lists, for certificate management protocols. The one worth mentioning is widely used X.509 v. 3 standard. A certificate conforming to the standard contains not only obvious data like the name of an owner and his public key, but also the name of its issuer and some technical data, e.g., what algorithm is to be used with this key and what algorithm is to be used to compute a message digest. 1.3 Legislation The two previous sections show how one may arrive at a conclusion that a particular document has been signed by a particular person. However, the

4 legal meaning of such a conclusion has to be provided by law, technology alone is not enough. At the turn of the 20 th and 21 st century, both in USA and in Europe, there appeared legislative initiatives whose effects have been to make an electronic signature legally equivalent to a handwritten signature. Generally, the following is required from electronic signature: 1. it must include a method to identify the signer, 2. it must be under the sole control of the person using it, 3. it must be linked to a document in such a way that every change of the document invalidates the signature. The first European country to adopt such a law has been Germany. In 1999 the European Parliament and the Council has adopted directive 1999/93/EC on a Community framework for electronic signatures. The electronic signature, as defined by the directive, is based on already described ideas of certificates and certificate issuing authorities. Only qualified certificates count, and a certificate is qualified if its issuer conforms to some measures. E.g., thoroughly checks the identity of a person applying for a certificate, or assumes responsibility for possible damages of those who rely on a qualified certificate. Of course, a company can issue both: qualified certificates and non-qualified ones, too. The second ones e.g., given away for free to everybody who applies electronically. Neither the identity of such applicants can be checked, nor there is a reason to assume liability for such a product. Certification authorities, according to the directive, may be subject to accreditation process. Such an accredited certification provider gains more faith of a public in the quality and accuracy of its certificates. On a technical level there are several classes of certificates: class 1 certificates are the ones just binding whatever name to a key; class 2 certificates require some check-outs; class 3 certificates are probably issued only in case a person appears in person, or some other equivalent measure is taken to assure the identity of a certificate owner; class 4 certificates imply some serious check-out of certificates content has been done. Still, one has to be aware, that a certificate is not a certificate of somebody s credit capabilities neither of moral conduct. We talk only about identity. 2 Poland The Polish parliament has adopted an electronic signature bill on September 18, 2001 (Dz.U. 130/1450) with a 9-month vacatio legis. The Polish bill is along the lines of a European directive mentioned above, and of course it is more detailed. 2.1 Statute The statute carefully formulates conditions which a qualified certification authority have to meet: it has to buy an insurance against possible losses due

5 e.g., to its negligence; it should not be negligent; it should hire an appropriate personnel, it should maintain an appropriate security policy, it should use an appropriate hardware and software, etc. Of course, a qualified certification authority has to maintain CRL, it is obliged to keep important documents for quite a long time and many more detailed conditions. It is also subject to a scrutiny done by appropriate authority (art. 25 of the bill). A qualified certification authority receives a certificate signed by a central root authority. In fact, Polish statute carefully applies the term signature to physical persons only, as only people have hands to put handwritten signatures ;-), and there is a different term used for signatures put by authorities e.g., on certificates or time stamps. A signature verified against a valid qualified certificate is equivalent to a handwritten signature. If a certificate is no longer valid, revoked or expired, a signature is still considered valid if one can prove it has been done when the certificate was valid, e.g., utilizing a time-stamping service defined in the statute. Again, this is considered a legal evidence if time-stamping is done by a qualified authority. Polish bill imposes some restrictions on the content of a qualified certificate. It should contain not only an owner s name, a public key, the issuing authority s name, but also the time of its validity. An important part of a certificate is a pointer to a policy according to which a certificate is issued. There one can learn about the process of certificate production, how much one can rely on the data contained in a certificate, and for what purposes a given certificate is appropriate. According to the bill, a qualified certificate has to be clearly marked as such. Also, a certificate may contain some additional restrictions, like the upper bound of the value of transactions that can be signed using this certificate, or a particular field of the use of such a certificate. A certificate needs not to contain somebody s surname, it may contain a pseudonym, but then it has to be marked as such. Of course, documents signed under a pseudonym have little legal effect. 2.2 Services We have already mentioned the most common service binding a name to a public key. Even this service has a few versions, an issuer of a certificate may require the person to show up and examine his/her passport, or it may issue a certificate to anyone wishing to have one and applying through the Internet. Also, a certificate may be issued not for a physical person, but, say, for an SSL server, which also possesses a name. Of course, such certificates are not covered by the law we discuss here. Moreover, certification authorities may want to issue certificates to each other, just to ease the process of signature verification. Such certificates are within the framework of the statute. Yet another kind of certificates are certificates for encryption. Technically they are not much different, they bind a name of a person to a public key which can be used to encrypt a message to this person. These certificates however are outside the scope of the statute in question.

6 The Polish bill recognizes some other services concerning certificates that a provider may offer. E.g., if a certificate owner wants to keep his private key in secret, then an issuer only checks if the owner really possesses the private key. It may also generate the key pair for the prospective owner on his request. The statute sets a lot of conditions to the effect, that the certificate issuer does not know private keys of its clients, as otherwise signatures could be forged. While it is legally forbidden, and technologically not justified, to keep somebody s private key used for signature, it is reasonable to keep somebody s key used for encryption, allowing for access to encrypted documents in case a key is lost key escrow. Usually such keys are kept in a manner requiring some effort to reconstruct them, e.g., coordinated action of several entities. Certificates expire, thus new ones have to be acquired. The process of replacing old ones for new ones may be simpler, and cheaper, than the process of issuing brand new certificates. A certification authority has to maintain certificate revocation lists. The Polish bill allows also for a temporary suspension of the validity of a certificate. Therefore, another list has to be maintened. A CA may also offer a service to check validity of certificates on-line, again to make the lifes of customers easier. Also, apart from keeping the list of revoked certificates, a certification services provider may keep the list of valid certificates. In such a way these certificates need not be attached to signed documents, it is enough to point to them, making signed documents shorter. Time-stamping is a service much different than certificate issuing. There is no need to contact people in person. Instead, there is a need to contact customers on-line. Also a creditable source of time is needed, which only seems to be a simple story. 2.3 Service providers Currently we have three qualified certification authorities in Poland offering their service to the general public, Certum, Signet, Sigillum, There are also certification authorities for banking industry only. Signet, one of the issuers, offers certificates of almost any kind: class 1 for casual Internet users and qualified certificates for legal transactions; certificates for encryption; certificates for use in a company to identify users of a local net; certificates for servers, etc. Recently (August 1, 2003) a certificate for all internauts accessing Internet via Polish national telekom TPSA was offered. In fact, Signet is a CA of TPInternet, an Internet service provider owned by TPSA. While this certificate is not a qulified one, and legally cannot be used to sign documents, one may hope that its wide availability will raise the public awareness of the existing technology.

7 Signet also offers certificates for companies which want to apply public key infrastructure for their internal use, e.g., for signing documents internally, for control access, etc. Certificates offered for companies can be taylored for particular needs. 3 Europe and Poland As already mentioned, the first European country adopting electronic signature law was Germany. The other are: Austria, the United Kingdom, Ireland, Denmark, Sweden,.... The list is not exhaustive. There are some similarities among European statutes and some differences. E.g., the Austrian bill introduces the notion of a supervising body (Telekom- Control-Kommission) which monitors certificate providers. It is not a root of PKI in a strict technical sense as it does not issue certificates for providers, like the Polish bill requires. However, Telekom-Control will keep a register of certificates of these providers, which serves the purpose. Also, as mentioned earlier, it seems that the Polish bill requires that a certificate issuer, before being accepted as qualified, undergoes a procedure which is effectively equivalent to accreditation in the Austrian bill, and which is optional only there. Unfortunately, the Polish bill does not use the term accreditation at all, thus putting the Polish certificates somehow in a weaker position than the European ones they are as good as made by accredited providers in Europe, but they are not recognized as such. 4 Conclusions As a conclusion we allow ourselves to utter a few opionions of the current status of electronic signature in Poland. It seems that currently we have all the infrastructure we need we have a law making electronic signature not only a toy for computer nerds, we have certificate issuers, making certificates available to the public. Yet, electronic signatures are not as popular as plastic money or mobile phones are, though the latter ones exists only since a few years, too. A question arises why is it so and what are the perspectives? I think there are a few reasons. One is time. The technology is really new, only 2 3 years, not 5 10 years old. E.g., only from July 1, 2003, we have a statute regulating the way citizens may communicate with governmental administration electronically. Without such a statute even if an electronic document signed electronicaly is considered equivalent to a paper document with handwritten signature, still a particular officer does not know how to handle it. It really takes some time for many to understand that electronic documents are much, much easier to handle and as safe and as valid, and as tangible as the paper ones. Understanding is not enough, the wide use of computers and network is neccessary. The other reason why electronic signatures are not widely used is probably the price of certificates. The first users have to pay the price to start the system.

8 And there is no immediate gain in having a certificate if almost nobody uses this technology. The only way to change this situations seems to be providing certificates to a great number of people. This is precisely what Signet does recently. The other reason why electronic signatures are not widely used is, in my opinion, legislation concerning banks. Until recently banks have disclosed little interests in the use of electronic signature. They have their own legislation, specific for banks, which allows for other ways to authenticate users and authorize transations on-line. These ways are much weaker just giving a credit card number known, by definition, widely is enough to commit a transaction. Under this legislation no wonder banks were not interested in a more complex infrastructure. A new bill limits responsibility of users for transactions authorized in this way. So again, chances are that the use of electronic signature will be considered soon as a reasonable way of authorization. 5 Sources of information The most important single book containing a lot of materials on algorithms used in cryptography and also a source of bibliographical data is [1]. Diffie and Hellman published his idea first in an article [2]. Rivest, Shamir and Adleman published his idea if the implementation of public key cryptosystem in [3], it has been patented, cf. [4]. American National Standard Institute published a lot o standards concerning cryptography, e.g., [5] defines other than RSA implementation of digital signature while [6] defines a hash function (message digest) that have to be a part of the algorithm. The same Institute published also its standards based on RSA too, ANSI X.91. The most popular standard concerning the format of certificates, CRL, directories etc. is X.509, by International Telecommunication Union. It is available e.g., as [7]. However, the format is not new, it evolves, currently version 3 is in use, hence the European Electronic Signature Standarization Initiative publishes new technical standards as e.g., [8]. The European Parliament and Council publish its directives, among them the directive on electronic signature [9], Polish implementation of the directive has been published in two years later, cf. [10]. References 1. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22 (1976), pp R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21 (1978), R. L. Rivest, A. Shamir, and L. M. Adleman, Cryptographic communications system and method, U.S. Patent #4,405,829, 20 Sep 1983.

9 5. ANSI X9.30 (PART 1), American National Standard for Financial Services Public key cryptography using irreversible algorithms for the financial services industry, Part 1: The digital signature algorithm (DSA), ASC X9 Secretariat American Bankers Association, ANSI X9.30 (PART 2), American National Standard for Financial Services Public key cryptography using irreversible algorithms for the financial services industry, Part 2: The secure hash algorithm (SHA), ASC X9 Secretariat American Bankers Association, R. Housley, W. Ford, W. Polk, and D. Solo Request for Comments: 2459, Internet X.509 Public Key Infrastructure Certificate and CRL Profile ftp://ftp.isi.edu/ in-notes/rfc2459.txt, Qualified Certificate Profile, EESSI, TS v.1.2.1, Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, Official Journal of the European Communities L 13/ Ustawa z dnia 18 wrzesnia 2001 r. o podpisie elektronicznym, Dz.U nr 130 poz

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Business Issues in the implementation of Digital signatures

Business Issues in the implementation of Digital signatures Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous

More information

Public Key Cryptography of Digital Signatures

Public Key Cryptography of Digital Signatures ACTA UNIVERSITATIS APULENSIS No 13/2007 MATHEMATICAL FOUNDATION OF DIGITAL SIGNATURES Daniela Bojan and Sidonia Vultur Abstract.The new services available on the Internet have born the necessity of a permanent

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Concept of Electronic Approvals

Concept of Electronic Approvals E-Lock Technologies Contact info@elock.com Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

What is a digital certificate, why do I need one, and how do I get it?

What is a digital certificate, why do I need one, and how do I get it? PKI FAQ s What is a digital signature and how do you get one? You can t buy a digital signature. It s not like a handwritten one. A digital signature is different every time it is made, and is related

More information

Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)

Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

Information & Communication Security (SS 15)

Information & Communication Security (SS 15) Information & Communication Security (SS 15) Electronic Signatures Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Agenda

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

Public Key Cryptography: RSA and Lots of Number Theory

Public Key Cryptography: RSA and Lots of Number Theory Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: luca.veltri@unipr.it) Course of Network Security,

More information

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate

More information

Digital Signatures. Meka N.L.Sneha. Indiana State University. nmeka@sycamores.indstate.edu. October 2015

Digital Signatures. Meka N.L.Sneha. Indiana State University. nmeka@sycamores.indstate.edu. October 2015 Digital Signatures Meka N.L.Sneha Indiana State University nmeka@sycamores.indstate.edu October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

A New Efficient Digital Signature Scheme Algorithm based on Block cipher IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1

More information

1 Public Key Cryptography and Information Security

1 Public Key Cryptography and Information Security International Carpathian Control Conference ICCC 2002 MALENOVICE, CZECH REPUBLIC May 27-30, 2002 IMPLEMENTATION ISSUES OF PKI TECHNOLOGY Victor-Valeriu PATRICIU, Marin BICA and Ion BICA Department of Computer

More information

Validity Models of Electronic Signatures and their Enforcement in Practice

Validity Models of Electronic Signatures and their Enforcement in Practice Validity Models of Electronic Signatures and their Enforcement in Practice Harald Baier 1 and Vangelis Karatsiolis 2 1 Darmstadt University of Applied Sciences and Center for Advanced Security Research

More information

IBM i Version 7.3. Security Digital Certificate Manager IBM

IBM i Version 7.3. Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

Strong Encryption for Public Key Management through SSL

Strong Encryption for Public Key Management through SSL Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key

More information

Den Gode Webservice - Security Analysis

Den Gode Webservice - Security Analysis Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework

More information

Security in Electronic Payment Systems

Security in Electronic Payment Systems Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch

More information

How To Encrypt Data With Encryption

How To Encrypt Data With Encryption USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

Efficient construction of vote-tags to allow open objection to the tally in electronic elections Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent

More information

Public Key Cryptography and RSA. Review: Number Theory Basics

Public Key Cryptography and RSA. Review: Number Theory Basics Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and

More information

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of

More information

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Public Key Encryption and Digital Signature: How do they work?

Public Key Encryption and Digital Signature: How do they work? White Paper Public Key Encryption and Digital Signature: How do they work? Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved. Reproduction of

More information

Trustis FPS PKI Glossary of Terms

Trustis FPS PKI Glossary of Terms Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1 Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can

More information

www.studymafia.org Seminar report Digital Signature Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

www.studymafia.org Seminar report Digital Signature Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science A Seminar report on Digital Signature Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Understanding Digital Certificates and Secure Sockets Layer (SSL) Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?

More information

Fighting product clones through digital signatures

Fighting product clones through digital signatures Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Cryptography and Key Management Basics

Cryptography and Key Management Basics Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn. CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.edu Slide 09-1 Overview Key exchange Session vs. interchange

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

Understanding Digital Signature And Public Key Infrastructure

Understanding Digital Signature And Public Key Infrastructure Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS ; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite

More information

ETSI TS 101 456 V1.4.3 (2007-05)

ETSI TS 101 456 V1.4.3 (2007-05) TS 101 456 V1.4.3 (2007-05) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates 2 TS 101 456 V1.4.3

More information

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173 Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

Representation of E-documents in AIDA Project

Representation of E-documents in AIDA Project Representation of E-documents in AIDA Project Diana Berbecaru Marius Marian Dip. di Automatica e Informatica Politecnico di Torino Corso Duca degli Abruzzi 24, 10129 Torino, Italy Abstract Initially developed

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.

More information

An Introduction to digital signatures

An Introduction to digital signatures An Introduction to digital signatures This document is an extract from the book Ecommerce - Legal Issues authored by Rohas Nagpal. This book is available as courseware for the Diploma in Cyber Law and

More information

7 Key Management and PKIs

7 Key Management and PKIs CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.

More information

An Introduction to CODE SIGNING

An Introduction to CODE SIGNING An Introduction to CODE SIGNING CONTENTS. 1 What is Code Signing. 03 2 Code Signing Certificates 101...05 3 Why & When to Digitally Sign Code.09 4 Self Signing vs. Publicly Trusted...12 5 Code Signing

More information

Chapter 7: Network security

Chapter 7: Network security Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport

More information

Number Theory and Cryptography using PARI/GP

Number Theory and Cryptography using PARI/GP Number Theory and Cryptography using Minh Van Nguyen nguyenminh2@gmail.com 25 November 2008 This article uses to study elementary number theory and the RSA public key cryptosystem. Various commands will

More information

Digital Signature Standard (DSS)

Digital Signature Standard (DSS) FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute

More information

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security (2) CPSC 441 Department of Computer Science University of Calgary Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate

More information

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

A Novel Approach to combine Public-key encryption with Symmetric-key encryption Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view

PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view Version 0.5 Richard Levitte, mailto:levittelp.se November 18, 2003 A serie of lectures PKI and OpenSSL part 1: codex.509

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information