Digitally Signed Documents Ambiguities and Solutions
|
|
|
- Benjamin Green
- 10 years ago
- Views:
Transcription
1 Digitally Signed Documents Ambiguities and Solutions Adil Alsaid and Chris J. Mitchell Abstract Information Security Group, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK. Digitally signing a digital document is a straightforward procedure; however, when the digital document contains dynamic content, the digital signature may remain valid but the viewed document may not be the same as the document when viewed by the signer. Other similar problems exist even with static documents, if the appearance of a document can be changed. In this paper, we consider previously proposed solutions for such problems, and propose a new solution. Unresolved issues and problems are also discussed. Keywords Digital Signature, e-commerce, e-document, Security 1 Introduction Digitally signing a digital document is a straightforward procedure, and digital signatures (see, for example (Menezes et al. 1997, Chapter 11)) are a very important cryptographic primitive. Both national and international standards for signatures exist, including the US Digital Signature Standard (DSS) (NIST 2000), which specifies a suite of recommended algorithms, and two multipart ISO/IEC standards, ISO/IEC 9796 and ISO/IEC The main security services that can be provided by a digital signature are: message integrity, origin authentication, and nonrepudiation. It is important to note that all the existing standards for signatures, including the DSS and the ISO/IEC standards, are concerned with which algorithms to use and not the form of the data that is signed. As pointed out by Kain et al. (2002), digital documents with dynamic content may cause a problem for the digital signature verification process. This paper tries to address some of the problems that arise when signing digital documents that contain dynamic content. It does not discuss other digital signature security problems such as Trojan Horses or securing the Digital Signature workstation, as discussed, for example, in (Spalka et al. 2001a, Weber 1998). The rest of the paper is organized as follows. Section 2 briefly introduces the problem of signing digital documents with dynamic content. Section 3 discusses possible locations for signature functionality in a computer system. Existing solutions to the problems discussed in Section 2 are introduced in Section 4. A novel solution is discussed in Section 5. Finally, issues and unresolved problems are discussed in Section 6. 2 The Signature Interpretation Problem In order for a program to generate a digital signature on a data structure, e.g. a document, it must first encode it as a serial string of bits and bytes. It is then expected that the signature will unambiguously commit the signer to the contents of this serialized document. However,
2 ambiguities can arise in the interpretation of the data string when this string can be viewed differently by the signer and the verifier of the signature. That is, it is possible to sign a digital document that changes when viewed at a later time, without invalidating the digital signature. One way in which this problem can arise is when the digital document being signed contains dynamic content. As an example, suppose that the creator of the digital document is different from the signer. The creator produces the document in such a way that it gives the signer the impression that what he is about to sign is what is being displayed. However, the creator may embed dynamic content, e.g. macros or JavaScript, in the document to change its displayed contents when viewed at a later time. Kain et al. (2002) describe the problem and gave some examples using MS Word, MS Excel, PDF files, as well as HTML documents. A different source of ambiguities in digitally signed documents was discussed by Jøsang et al. (2002). Jøsang et al. (2002) show how font substitution can be used to display the same digital document with different meanings on different computers. Whilst there are no doubt yet further ways in which ambiguities can be deliberately or accidentally introduced into digital documents, the main focus of this paper is problems arising from dynamic content. This is a significant and growing problem whether we like it or not, document formats appear to be becoming more complex and more dynamic, rather than less so. Of course, this enables many new features to be provided to users; this appears to be yet another area where user convenience and security are pulling in opposite directions. 3 Signature functionality Signature functionality can be integrated into a specific application or implemented as a standalone application. If digital signature functionality is integrated into an application, the application is aware of the document format and could be designed to avoid possible digital signature interpretation issues arising from dynamic content. Moreover, the application could act as a trusted viewer for the digital document. However, this is not really a viable general approach, since including signature functionality in every application is potentially very inefficient, with significant associated key management issues. On the other hand, when a stand-alone signature application is used, the problem of dynamic content can be much more serious, since the digital signature program is typically not aware of the format of the document being signed. One way of avoiding this problem would be to enable the signing application to communicate with the application which understands the document format. This idea forms the basis of the scheme we propose in Section 5 below. Of course, the security of the signing process also relies on the integrity and secrecy of the private signing key and controls to limit its use. The private key must thus be protected in some way, e.g. by storing it in a security module such as a smart card and requiring entry of a password to enable its use. 4 Existing Solutions In this section, previously proposed solutions to the problem of signing digital documents possessing dynamic content are briefly reviewed. Interestingly, all these solutions fall into the second category discussed above, i.e. they apply to the case where signature functionality is included in
3 a stand-alone application. 4.1 Disabling dynamic content Disabling dynamic or active content, as proposed by Spalka et al. (2001b), is one solution to this problem. However, this solution may render some documents useless. Spalka et al. (2001b) propose two further ways to solve the problem of dynamic content. One is to restrict the actions of active content instead of disabling it, although this would require re-engineering every application. The other approach is to use a secure viewer to view signed documents; however, this would require the viewer to be able to parse every possible document format (see also Section 4.4). 4.2 Static file formats In this approach, only predefined static file formats, known not to have dynamic content, are permitted to be signed. For example, plain ASCII files have no dynamic content, so the digital signature program can sign them without worrying about ambiguity issues. However, this may mean that only one file format can be digitally signed, because most digital document formats permit some sort of dynamic content. This approach may be useful in situations where the digital documents to be signed do not have dynamic content features, such as macros, JavaScript, or HTML capabilities. 4.3 XML Another solution would be to convert the digital document to the Extensible Markup Language (XML) format (W3C 2003) and then apply the XML digital signature processing standard (Bartel et al. 2002) to obtain the document signature. This does appear to help solve the problem, but dynamic content may still exist in the XML version. When the document is later presented to the signature verifier, if it is necessary to convert the document back to its original form, the dynamic content may be activated. The authors of the XML digital signature standard are aware of the problem of dynamic or active content. The standard states clearly that, in order to sign an XML document, the signature program should sign all external documents, i.e. documents referenced from within the XML document. One problem with this solution is that the XML document may no longer contain all the dynamic content of the original document. For instance, if a Microsoft Excel document contains macros, then in order to avoid any possible problems arising from such dynamic content, all macros should be removed from the XML version. This will render the document useless if there are macros that are needed to present the document to the user, or if the user wants to make some changes to the document using the macros. 4.4 Document Parser Another approach to solving the problem is to create a digital signature program with its own document parser. That is, whenever the user wants to sign a document, the digital signature program parses the digital document and removes all dynamic content. In this approach, the digital signature program will need to be aware of most, if not all, digital document formats, which appears infeasible.
4 Thus, as it stands, this approach is impractical, because of the need to provide a document parser for every possible document format. However, it might be possible to provide a parser for the most popular document formats. Nevertheless, problems will still arise since not all document format specifications are available, and the owners of proprietary document formats often change the format with every release of their product. 4.5 Graphics version The What You See Is What You Sign (WYSIWYS) concept (Scheibelhofer 2001) is designed to solve the ambiguity problem arising from signing digital documents with dynamic content. This approach works by creating a graphical representation of the digital document and then digitally signing it. That is the approach taken by a commercial product (utimaco 2003) running under the Microsoft Windows operating system. This approach appears to work well. However, it removes a lot of the flexibility enjoyed in today s business environment. Also sending an image potentially consumes a lot more bandwidth than just sending the digital document. 5 A New Solution In this section, we propose a new method to solve the problem of signing digital documents with dynamic content. The solution works in a similar way to the document parser solution outlined in Section 4.4. The main difference is that our proposed solution passes the document parsing task to the document generator program. This removes the need for the digital signature program to be aware of the document format specifications in order to generate a static version of the document, i.e. a version of the document without dynamic content. Furthermore, the solution is flexible in that it can handle document formats introduced after the signing program was released. The solution as described here uses the Microsoft Component Object Model (COM) architecture (Box 1998); however, other component based architectures, such as CORBA or Java, could also be used. The solution is based on two assumptions, as follows. 1. The verifier has access to the program that was used by the signer to generate the digital document. In other words, both signer and verifier have access to the COM object that can generate a safe digital document for the specific digital document type. For example, if the signer is signing a document created by Microsoft Word, then the verifier should also have access to Microsoft Word. 2. All programs that generate digital documents that may need to be signed must be aware of the digital signature program, i.e. they must possess application awareness. For example, in the Microsoft Windows environment, this assumption can be met by registering the COM component of the application responsible for creating a static version of the document under a key in the Registry. We will discuss these assumptions in more detail below. 5.1 Application awareness In order for an application to be digital signature application aware, it should meet the following two requirements:
5 1. Get GUID of Digital Signature aware application and create an instance of it Registry Digital Signature Application Dynamic Document 2. Send Dynamic document to application 3. Sign recieved static document COM Interface Digital Signature aware Application Static Document Figure 1: Signing a digital document 1. It must implement an object that exposes a COM interface to help the digital signature program communicate with the application. 2. When installed, it must register itself in a predefined key location in the Registry, i.e. the data repository in the Microsoft Windows environment in which most of the Windows settings and program information are kept. The Registry location used must be specific to the digital signature program. This will make it easier for the digital signature program to locate digital signature aware applications. Given that the application meets the above two requirements, the digital signature program can consult the Registry and search for the application that is associated with any digital document (using the file type indication following the full stop in the file name). Once it has identified the application that generated the document, it creates an instance of that application and, using the digital signature COM interface, passes it the document and requests it to generate a static representation of the document. In the next two sections, we describe the process of signing and verifying digital documents. 5.2 Signing a digital document To sign a digital document, the signer uses the relevant application to check that the document appears correct. The digital signature program is then invoked and is passed the document. The digital signature program performs the following steps in order to sign the document, as shown in Figure The program consults the Registry and searches for the application program that generated the document, using the document filename extension as a key. It then obtains the Globally Unique ID (GUID) of the application and creates an instance of the application in order to get access to the digital signature interface. If the digital signature program cannot find the GUID of the application responsible for creating the particular document type, the user should be warned, and given the option of either signing the document or not. 2. The program sends the document to the identified application through the digital signature COM interface that was acquired in step 1, and requests it to parse the document and return
6 it in a static form. 3. The signature program receives back the static form of the document and signs it. 5.3 Verifying a signed document In order to verify a digital signature on a document, the document, the signature, and the signer s public key are input to the signature program for verification. After performing steps 1 and 2 as described in Section 5.2, the signature program verifies the digital signature against the static version of the document it received in step 2 and outputs a true/false indicator. If the output value is true, then the signature is valid. Figure 2 illustrates the process of verifying a digital signature on a document with dynamic content. Digital Signature + Dynamic Document + Signer s Public Key Digital Signature Application Signature verification process COM Interface Digital Signature aware Application True/False indicator Figure 2: Verifying a signed document 5.4 Security Analysis We now briefly review some possible attacks on the scheme described immediately above File type attacks As discussed in Section 5.1, the application program must register the file type extensions that it uses in a special location within the Registry, in addition to the regular extension registration process. Correct operation of the proposed solution relies heavily on the correctness of both document extensions and the file type/extension table held in the Registry. Apart from ensuring that the application program possesses application awareness of the digital signature program, the use of a special extension mapping table minimises the risk of accidental changes to this table. The document extension scheme could be attacked by taking advantage of this reliance. One attack of this type would be to change the extension of a document that is to be signed. For example, suppose that a document is in Microsoft Word format, i.e. it has the extension.doc, and that a malicious third party changes its extension to.txt, the extension for text files. In order to sign the document, the digital signature program performs all the steps discussed in section 5.2, and passes the document to the application registered for handling text files. Since.txt files cannot contain dynamic content, the application will simply return the unchanged file to the signature program, which will sign it. If an attacker can then change the document type back to.doc before it is viewed by the signature verifier, then problems can clearly arise. If the file contains dynamic content then the problem that the solution was designed to avoid will recur on the verifier s computer. The only way of avoiding this problem is to prevent changes to the file type extension, which can be achieved
7 by including the file name within the scope of the digital signature. However, even if such a precaution is enforced (and this would be our recommendation) problems can still arise if the extension/application mapping table in the Registry can be modified, as we now describe. Suppose an attacker can modify the signature program extension/application association tables in the Registry of both the signer s and the verifier s computer so that in both cases.doc files are processed by an application designed to work with ASCII text files. Suppose, moreover, that the signer is given a document to sign that contains dynamic content. When the signature program passes it to the application to make a static version, no changes will be made since the document will be treated as an ASCII text file. Exactly the same will happen at the verifier, and the signature on the document will thus be verified. However, when the verifier views the document using Word, the dynamic content will be activated, and the usual problems with dynamic content arise. It should be noted that, as long as the file name (and hence the extension) is signed, attacks require the modification of settings on the signer and/or verifier machine. The use of a special association table, used only by the signature program, will prevent such changes being made accidentally. However, no system can completely address threats which arise if attackers have access to the signer or verifier computer, and thus users of signatures should take all the usual precautions to protect the integrity of their computers Changes to documents In order to sign a digital document, the user views the document on the screen, approves it for signature, and finally requests the digital signature program to sign it. However, a threat exists that the document could be changed after the user views it and before the document is signed. For instance, just after viewing the document and before signing it, a piece of malicious code could change the document. This issue can be addressed by integrating the digital signature functionality into the application itself, instead of separating the viewing and signing functions. An application may provide both facilities to the user; for instance, the application may enable the user to view the document, approve it for signature, and have the signature generated (e.g. using a system function call) without switching to any other application. Of course, this problem arises with any scheme designed to sign documents, independently of the solution described in this paper. Again, this underline the importance of protecting the integrity of any computer used to create digital signatures. 6 Concluding remarks The suggested solution requires all document handling applications to possess application awareness of the digital signature program in order to function properly. Every application must implement a COM interface and register itself in the Registry, in a location specific to the digital signature program, to enable the digital signature program to sign the digital document. We conclude this document by discussing one possible area for possible future research. In order to sign a digital document, the user private key should be accessible to the digital signature program. Securing the user private key is very important to the operation of the suggested solution and, indeed, to any implementation of digital signatures. Where should this key be stored? The use of trusted computing technology (Balacheff et al. 2003), as incorporated into
8 Microsoft s Next Generation Secure Computing Base (NGSCB) (England et al. 2003), may be useful in this context. Further research in this area is required in order to answer such questions. 7 References Balacheff, B., Chen, L., Pearson, S., Plaquin, D. & Proudler, G. (2003), Trusted Computing Platforms: TCPA Technology in Context, Prentice Hall PTR, Upper Saddle River, New Jersey. Bartel, M., Boyer, J., Fox, B., LaMacchia, B. & Simon, E. (2002), XML-Signature Syntax and Processing. Box, D. (1998), Essential COM, Addison-Wesley, Boston, MA. England, P., Lampson, B., Manferdelli, J., Peinado, M. & Willman, B. (2003), A trusted open platform, IEEE Computer 36(7), Jøsang, A., Povey, D. & Ho, A. (2002), What You See is Not Always What You Sign, in The proceedings of the Australian UNIX User Group, Melbourne. Kain, K., Smith, S. W. & Asokan, R. (2002), Digital signatures and electronic documents: A cautionary tale, in B. Jerman-Blazic & T. Klobucar, eds, Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia, Vol. 228 of IFIP Conference Proceedings, Kluwer Academic, Boston, MA, pp Menezes, A., van Oorschot, P. C. & Vanstone, S. A. (1997), Handbook of applied cryptography, CRC Press, Boca Raton, Florida. NIST (2000), FIPS PUB 186-2: Digital Signature Standard (DSS), National Institute for Standards and Technology, Gaithersburg, MD, USA. URL: Scheibelhofer, K. (2001), Signing XML Documents and the Concept of What You See Is What You Sign, Master s thesis, Institute for Applied Information Processing and Communications, Graz University of Technology. Spalka, A., Cremers, A. B. & Langweg, H. (2001a), The fairy tale of what you see is what you sign Trojan horse attacks on software for digital signature, in S. Fischer-Hübner, D. Olejar & K. Rannenberg, eds, Proceedings of the IFIP WG 9.6/11.7 Working Conference, Security and Control of IT in Society-II (SCITS-II), Bratislava, Slovakia. Spalka, A., Cremers, A. B. & Langweg, H. (2001b), Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs, in M. Dupuy & P. Paradinas, eds, Proceedings of the IFIP SEC 2001, Kluwer Academic, Boston, MA, pp utimaco (2003), WYSIWYS What You See Is What You Sign. pdf/wysiwys.pdf. W3C, T. (2003), Extensible markup language (XML). Weber, A. (1998), See what you sign: Secure implementations of digital signatures, in S. Trigila, A. P. Mullery, M. Campolargo, H. Vanderstraeten & M. Mampaey, eds, Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 5th International Conference on Intelligence and Services in Networks, IS&N 98, Antwerp, Belgium, May 25-28, 1998, Proceedings, Vol of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp
Dynamic content attacks on digital signatures
Dynamic content attacks on digital signatures Adil Alsaid and Chris J. Mitchell [email protected], [email protected] Information Security Group Royal Holloway, University of London Egham, Surrey
Digital signature in insecure environments
Digital signature in insecure environments Janne Varjus Helsinki University of Technology [email protected] Abstract Due to current legislation the digital signatures can be as valid as the hand written
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
A Taxonomy of Single Sign-On Systems
A Taxonomy of Single Sign-On Systems Andreas Pashalidis and Chris J. Mitchell Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {A.Pashalidis, C.Mitchell}@rhul.ac.uk http://www.isg.rhul.ac.uk
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
11557 - CRIPT - Cryptography and Network Security
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
Information Security Group Active-client based identity management
Active-client based identity management Chris Mitchell Royal Holloway, University of London www.chrismitchell.net 1 Acknowledgements This is joint work with Haitham Al-Sinani, also of Royal Holloway. 2
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract
A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Number Theory and Cryptography using PARI/GP
Number Theory and Cryptography using Minh Van Nguyen [email protected] 25 November 2008 This article uses to study elementary number theory and the RSA public key cryptosystem. Various commands will
Digital Signatures with Familiar Appearance for e-government Documents: Authentic PDF
Digital Signatures with Familiar Appearance for e-government Documents: Authentic PDF Thomas Neubauer, Edgar Weippl, Stefan Biffl Institute of Software Technology and Interactive Systems Vienna University
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
A CASE STUDY OF ELECTRONIC SIGNATURE APPLIED IN PRE-EMPLOYMENT SCREENING INDUSTRY
100 A CASE STUDY OF ELECTRONIC SIGNATURE APPLIED IN PRE-EMPLOYMENT SCREENING INDUSTRY Miao Kang, Haris Mouratidis School of Computing, IT and Engineering, University of East London [email protected], [email protected]
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS
A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit
Archival Data Format Requirements
Archival Data Format Requirements July 2004 The Royal Library, Copenhagen, Denmark The State and University Library, Århus, Denmark Main author: Steen S. Christensen The Royal Library Postbox 2149 1016
Published online: 18 Feb 2015.
This article was downloaded by: [Gianluca Lax] On: 21 February 2015, At: 09:29 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer
Multiple electronic signatures on multiple documents
Multiple electronic signatures on multiple documents Antonio Lioy and Gianluca Ramunno Politecnico di Torino Dip. di Automatica e Informatica Torino (Italy) e-mail: [email protected], [email protected] web
Practical Mobile Digital Signatures
Practical Mobile Digital Signatures Antonio Maña and Sonia Matamoros Computer Science Department University of Málaga. Spain. {amg, sonia}@lcc.uma.es Abstract. There are important details that give legal
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Using EMV Cards to Protect E-commerce Transactions
Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
An Introduction to Digital Signature Schemes
An Introduction to Digital Signature Schemes Mehran Alidoost Nia #1, Ali Sajedi #2, Aryo Jamshidpey #3 #1 Computer Engineering Department, University of Guilan-Rasht, Iran [email protected] #2 Software
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
Representation of E-documents in AIDA Project
Representation of E-documents in AIDA Project Diana Berbecaru Marius Marian Dip. di Automatica e Informatica Politecnico di Torino Corso Duca degli Abruzzi 24, 10129 Torino, Italy Abstract Initially developed
Chapter 1. Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705. CS-4337 Organization of Programming Languages
Chapter 1 CS-4337 Organization of Programming Languages Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705 Chapter 1 Topics Reasons for Studying Concepts of Programming
Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature
Outline Digital signature Cryptography basics Digital signature Dr. László Daragó, Ph.D. Associate professor Cryptography Cryptography encryption decryption Symmetric-key Cryptography Encryption with a
GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
PKI implementation issues in B2B e-commerce Pita Jarupunphol and Chris J. Mitchell Information Security Group, Royal Holloway, University of London
PKI implementation issues in B2B e-commerce Pita Jarupunphol and Chris J. Mitchell Information Security Group, Royal Holloway, University of London About the authors Pita Jarupunphol (B.B.A. (Dhurakijpundit)
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
Preventing Abuse of Cookies Stolen by XSS
Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi Kenji Yasunaga Masahiro Mambo Kwangjo Kim KAIST Korea Heung Youl Youm Soonchunhyang University Korea Abstract Cross Site Scripting (XSS) makes
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
This Month s Tips & Tricks Topic: PDF Digital Signatures - Part 1: The Basics
This Month s Tips & Tricks Topic: PDF Digital Signatures - Part 1: The Basics January, 2011 All PDF-XChange Products allow you to digitally sign your PDF as you create PDF files from any windows based
Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil
Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil S.Thamarai Selvi *, Rajkumar Buyya **, M.R. Rajagopalan #, K.Vijayakumar *, G.N.Deepak * * Department of Information
Microsoft Office 2000 and Security Against Macro Viruses
Microsoft Office 2000 and Security Against Macro Viruses A White Paper by Darren Chi Symantec AntiVirus Research Center Symantec Corporation Microsoft Office 2000 and Security Against Macro Viruses 1 Contents
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Preservation Handbook
Preservation Handbook [Binary Text / Word Processor Documents] Author Rowan Wilson and Martin Wynne Version Draft V3 Date 22 / 08 / 05 Change History Revised by MW 22.8.05; 2.12.05; 7.3.06 Page 1 of 7
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Number Theory and the RSA Public Key Cryptosystem
Number Theory and the RSA Public Key Cryptosystem Minh Van Nguyen [email protected] 05 November 2008 This tutorial uses to study elementary number theory and the RSA public key cryptosystem. A number
Specifying the content and formal specifications of document formats for QES
NATIONAL SECURITY AUTHORITY Version 1.0 Specifying the content and formal specifications of document formats for QES 24 July 2007 No.: 3198/2007/IBEP-013 NSA Page 1/14 This English version of the Slovak
ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification
TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
VERS Standard Electronic Record Format PROS 99/007 Specification 3. Public Record Office Victoria
VERS Standard Electronic Record Format PROS 99/007 Specification 3 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 3: VERS Standard Electronic Record Format 1 Table of Contents
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December 2014. Document issue: 2.0
Entrust Certificate Services Java Code Signing User Guide Date of Issue: December 2014 Document issue: 2.0 Copyright 2009-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
EFFICIENCY CONSIDERATIONS BETWEEN COMMON WEB APPLICATIONS USING THE SOAP PROTOCOL
EFFICIENCY CONSIDERATIONS BETWEEN COMMON WEB APPLICATIONS USING THE SOAP PROTOCOL Roger Eggen, Sanjay Ahuja, Paul Elliott Computer and Information Sciences University of North Florida Jacksonville, FL
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1
MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1 Chris J. Mitchell Computer Science Department Royal Holloway and Bedford New College University of London Egham Hill Egham Surrey TW20 0EX England
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
