Controller of Certification Authorities of Mauritius
|
|
|
- Alban Moses Blair
- 9 years ago
- Views:
Transcription
1
2 Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended) in Mauritius 3 Salient features of PKI Regulations 4 Financial Standing 4 Operational Criteria 5 Government Certification Authorities 5 Foreign Certification Authorities 5 Summary of the Legal Framework 6 Operational Aspects 6 Management of Certificates 6 Digital Certificates 7 Obtaining a Certificate 8 Certificate Storage 8 PKI Provides Four Security Assurances 9 Confidentiality 9 Digital Signature Generation 10 Verifying a Digital Signature 10 Authenticity, Integrity & Non - repudiation with Certificates 11 PKI based Application 12 Signed and Encrypted - S/MIME 12 Securing Online Application with Digital Certificates 12 Typical Scenario 12 mbanking Authentication 13 mbanking: transaction Validation 14 Conclusion 14 Date of Publication: June
3 Mauritian Public key Infrastructure Introduction With the coming into operation of the first Certification Authority (CA) in Mauritius in May 2012, the Mauritian Public Key Infrastructure (PKI) is now operational. This CA will start its operation by issuing digital certificates to Mauritian end-users who will in turn use these certificates to secure their online transactions in a comprehensive manner. The purpose of this guide is to fllag out to the public in general the basic information they need to be availed of in order to understand the PKI concepts so as to be able to make full use of this dedicated security infrastructure which is the PKI. Public Key Infrastructure Basics What is Public Key Infrastructure (PKI)? PKI stands for Public Key Infrastructure, an architecture put in place to prove the identities of people, websites, computer programmes and other applications on the Internet as well to secure online transactions. In simple terminology, PKI can best be described and understood if we make a comparison between the non-electronic and electronic world. In the non-electronic environment Signature of someone represents and validates the person s identity In electronic environment, the reality is that : There is No paper and No pen; Further, the Parties may not even meet each other The solution to address the electronic environment reality is : The use of digital signatures The use of the legislation gives legal sanctity to digital signatures, as: It gives legal sanctity to records, files or documents that are retained in electronic form. Puts in place legal standards for the use of electronic transactions, both in the public as well as in the private sector. 2
4 What are Digital Signatures? Digital signatures Are not scanned paper-based signatures Mathematically generated through the use of asymmetric cryptosystem Stronger than paper based signatures Tamperproof Also guarantees integrity of the electronic document Digital signatures work on the basis that there is a third party whom both parties trust, who can verify that the electronic signature belongs to the sender, and the digital signature applied by the sender to an electronic message is the same electronic signature which the recipient extracts from the received message. This trusted third party is the certification authority, who is entrusted with the responsibility of verifying the message sender s identity. Salient features of the Electronic Transactions Act (ETA) 2000 (as amended) in Mauritius The ETA clarifies the rights and obligations of transacting parties by setting out provisions dealing with issues related to the formation of electronic contracts. It also gives legal recognition on the use of electronic records and signatures and their secure counterparts. The main features of the ETA are as follows: facilitate electronic communications by means of reliable electronic records; facilitate e-commerce and the promotion of the development of the legal and business infrastructure necessary to implement secure electronic commerce; 3
5 facilitate electronic filing of documents with government agencies and statutory corporations and to promote efficient delivery of government services by means of reliable electronic records; minimise the incidence of forged electronic records, the intentional and unintentional alteration of records, and fraud in electronic commerce and other electronic transactions; help to establish uniformity of rules, regulations and standards regarding the authentication and other electronic transactions; and promote public confidence in the integrity and reliability of electronic records and e-commerce, and foster the development of e-commerce through the use of electronic signatures to provide authenticity and integrity to correspondence in any electronic medium. Salient features of PKI regulations The Regulations put in place a licensing scheme for certification authorities (CAs). lay down the administrative framework for licensing by the Controller of CAs against payment of appropriate fees. stipulate the criteria for a CA in Mauritius to be licensed/recognised/approved and the continuing operational requirements after obtaining a licence. Criteria against which CAs will be evaluated: their financial standing; operational policies and procedures; and the trustworthiness of their personnel. Financial Standing The licensing scheme is intended for individuals/companies operating in Mauritius. The applicant must demonstrate through submission of its business plan that it has sufficient funds to operate a CA, and have adequate insurance coverage to cover major areas of liability. 4
6 Operational Criteria Prior to licensing, the applicant must undergo and pass an initial audit to demonstrate that it has met the requirements stipulated in the Act and the Regulation. In addition, the applicant will also be audited for compliance with its own Certificate Practice Statements (CPS). CPS are documents which stipulate the policies and procedures a CA adopts for the certificates it issues. Audits are also required again before a licence can be renewed. Government CAs Under the Act, a public sector agency may be approved by the Minister to act as a CA with the benefits of a licensed CA. With the exception of certain requirements (e.g. financial criteria), the Regulations will also apply to such government CAs. The Regulations which apply to licensed CAs will apply to Government/Approved CAs. Foreign CAs Criteria for the recognition of foreign CAs have been defined so as to ensure international recognition of certificates issued through the Mauritian PKI. The Regulations which apply to licensed CAs will apply to foreign/recognised CAs. This recognition element sets the basis for regional cooperation among SADC member countries to undertake PKI-based secured e-business practices. 5
7 Summary of the legal framework Electronic Transactions Act and Regulations The ETA and its corresponding Regulations aim to provide a legal framework that will establish trusted CA services in Mauritius, serving both the domestic and international markets. In the long term, they provide the foundation to establish Mauritius as a trusted hub by providing a wide range of security products and services. With a harmonised legal framework within the countries of the SADC region, a common operational framework for the region can be envisaged for cost-effectiveness purposes which can boost regional e-commerce/e-business activities. Operational Aspects How PKI works? The sender, who may be a user or an organisation, first registers with the CA for an electronic identity. This electronic identity takes the form of a certificate (public key) issued by the certification authority and stored by the CA in its online repository. This public key has a corresponding unique electronic key issued to the sender, which is only known to the sender (private key). Like a secret personal code, the sender uses this private key, which is normally stored on a secure device such as a smart card to digitally sign his identity on the message. Upon receipt of a digitally signed message, the recipient consults the CA repository to ascertain the sender s electronic identity. Management of Certificates In a PKI, the Certificate Authority (CA) issues Digital Certificates to applicants. A Digital Certificate on the Internet is similar to an ID card in the real world. The CA also verifies the identity of applicants, and publishes certificates on an on-line repository where people can look up others certificates. 6
8 The management of certificates is a core function of a CA and is subject to strict requirements. The Controller must approve the methods used by the licensed CA to verify the identity of a subscriber before granting or renewing a subscription for a certificate. In accordance with the provisions of the Act, a licensed CA must also publish: a notice of a certificate suspension or revocation immediately after receiving an authorised request for a certificate suspension or revocation. Digital Certificates A Digital Certificate is an X.509 defined data structure with a Digital Signature. The data represents who owns the certificate, who signed the certificate, and other relevant information. X.509 Certificate CA Authorised Version # Serial # Signature Algorithm Issuer Name Validity Period Subject Name Subject Public Key Issuer Unique ID Subject Unique ID Extensions When the signature is generated by a Certification Authority (CA), the signature can be viewed as trusted. Since the data is signed, it cannot be altered without detection. Extensions can be used to tailor certificates to meet the needs of end applications. Digital Signature 7
9 Obtaining a Certificate Priv Pub User requests a certificate to CA CA generates certificate Private key and Certificate are sent to the user Pub Certification Authority DS Cert Certificate Storage Typically, private keys and certificates are stored in PC disk memory ( soft certificates ) or externally on user-centric hardware such as a smart card device or a USB token ( hardware certificates ). Mobile phones with PKI enabled SIM. Factors to be considered for storage choice: the value and content of the data, usability, compliance needs, and convenience of accessing the private key and certificate. The decision about how to store certificates and private keys should reflect a pragmatic balance of these factors. 8
10 PKI Provides Four Security Assurances Confidentiality (The inability to read it other than by the sender and addressee) Authenticity (Assurance of a message source) Integrity (Assurance that a message is unaltered since sent) Non-repudiation (The originator s inability to deny having sent the message) Confidentiality Enabling confidentiality with PKI Clear - text input An introduction to PKI Cipher - text Py75c %bn&*)9l fde^bdzjf@g5= &nmdfgegms Clear - text Output An introduction to PKI Encryption Decryption Recipient s public key Pub Different keys Priv Recipient s private key 9
11 Digital Signature Generation Message or file This is the document created Message Digest (Typically 128 blts) Py75c%bn Digital Signature 3KJf* $& SHA, MD5 Generate Hash RSA Asymmetric encryption Verifying a Digital Signature This is the document created Calculate a short message digest from even a long input using a one - way message digest function (hash) Generate Hash Signed Document Message Digest Py75c%bn Priv Signatory s private key 3KJf* $& Signed Document Digital Signature?Compare? Pub Asymmetric encryption Py75c%bn Sender s public key (from certificate) 10
12 Authenticity, Integrity & Non-repudiation with Certificates Alice Alice Pub DS Cert Priv I Like Flowers Certificate is sent for authentication Decrypt using public key in certificate and compare? Bob Alice Pub DS Cert I Like Flowers Bob verifies the digital signature on the certificate He can trust that the public key really belongs to Alice, but is it Alice standing in front of him? Bob challenges Alice to encrypt for him a random phrase he generated 11
13 PKI - Based Applications Signed and Encrypted - S/MIME S/MIME Secure Multipurpose Internet Mail Extensions Prevent spoofing Helps preventing forged Helps preventing spam Protect sensitive messages & documents Secure business processes Signed messages S/MIME-based applications Securing online applications with Digital Certificates Typical scenario Citizen connects to server (thru SSL) Client component is downloaded to the citizen s machine Citizen fills form & clicks submit button Citizen uses her private key to sign the data Signed data is encrypted with server public key & sent Server decrypts signed data and performs verification and validation checks Following Validation done Successful check will result in server generating and sending a receipt Date integrity verification Signer certificate is expired? Signer certificate is trusted? Signer certificate is compromised? 12
14 mbanking Authentication 1. End user accesses bank website with his mobile phone with PKI based SIM Card 2. Bank system sends authentication request to Operator s WPKI server, based on user credentials (phone number) 3. Users enters his authentication PIN 4. Access to the bank service is allowed Please authenticate yourself to enter Bank X Service. Enter PIN **** You are successfully authenticated ok Back ok Back ok An introduction page is shown to the user The user enters his PIN & the signature is sent The user is given feedback on the result of the signing 13
15 mbanking: Transaction Validation An introduction page is shown to the user Bank X wants you to validate the following transaction Bank sends validation request to Operator s WPKI service The signature process is WYSIWYS (what you see is what you sign) ok Back Money transfer to account: Enter Signing PIN **** Transaction Successfully Validated ok Back ok Back ok The text to be signed by the users is displayed Conclusion The user enters his PIN and the signature is sent The user is given feedback on the result of the signing The purpose of this guide is to give an insight into the PKI. Definitions of terms commonly employed have been defined in simple terms. The salient features of the laws related to the PKI are presented. The operating mechanics including typical examples depicting the illustrative uses of PKI have been presented. Please feel free to visit the website of the CCA of Mauritius on for more detailed information on the PKI framework in Mauritius. A Discussion Forum has also been created on the website inviting any views and suggestions that you may have. 14
16 NOTES 15
17 NOTES 16 Controller of of Certification Authorities of of Mauritius
18 Level 12 - the Celicourt -, Sir Celicourt Antelme Street - Port Louis - Mauritius Tel: (230) /4 Fax: (230) [email protected] Website: [email protected] Website:
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
SSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
Public Key Infrastructure. A Brief Overview by Tim Sigmon
Public Key Infrastructure A Brief Overview by Tim Sigmon May, 2000 Fundamental Security Requirements (all addressed by PKI) X Authentication - verify identity of communicating parties X Access Control
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
Installing your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
Transnet Registration Authority Charter
Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/
Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure
Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,
documents Supplier handbook - Introduction to Digital Signature - Rome, January 2012
Digital signature on received/sent documents Supplier handbook - Introduction to Digital Signature - Rome, January 2012 Digital signature - overview Digital signature is defined as an attestation system
Public Key Encryption and Digital Signature: How do they work?
White Paper Public Key Encryption and Digital Signature: How do they work? Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved. Reproduction of
Digital certificates. Name Vivek kumar EM No 230409 Subject E-Business technologies Prof. Dr. Eduard heindl
Digital certificates Name Vivek kumar EM No 230409 Subject E-Business technologies Prof. Dr. Eduard heindl Certificate of Declaration I certify that the work in this term paper has been written by me.
Pre requisites for Digital Signature
Pre requisites for Digital Signature Know about Digital Signature Certificate You should have a legally valid Class III digital certificate as per Indian IT Act from the licensed Certifying Authorities
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Eskom Registration Authority Charter
REGISTRATION WWW..CO.ZA Eskom Registration Authority Charter Version 2.0 applicable from 20 November 2009 Megawatt Park Maxwell Drive Sunninghill, SOUTH AFRICA, 2157 Phone +27 (0)11 800 8111 Fax +27 (0)11
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
RESEARCH ON DIGITAL SIGNATURE Aanchal Chanana, Akash Sharma, Amit Yadav
ABSTRACT RESEARCH ON DIGITAL SIGNATURE Aanchal Chanana, Akash Sharma, Amit Yadav 7 th Semester, Computer Science and Engineering. Dronacharya College Of Engineering, Gurgaon This paper introduces a number
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
ING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Information on secure e-mail communication. ALDI SOUTH group
Information on secure e-mail communication ALDI SOUTH group Secure e-mail communication Introduction Nowadays, e-mail is a common means of communication. Businesses widely use e-mails to exchange information.
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
ELECTRONIC SIGNATURES FACTSHEET
ELECTRONIC SIGNATURES FACTSHEET Electronic signatures mean that you can exchange information with others electronically and securely safe in the knowledge that everyone is who they claim to be and that
A simple tscheme guide to securing electronic transactions
A simple tscheme guide to securing electronic transactions 1 A simple tscheme guide to securing electronic transactions Electronic Transactions An electronic transaction is best thought of as a type of
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
Public Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...
FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2
Simple Guide to Digital Signatures
Simple Guide to Digital Signatures Rohas Nagpal Asian School of Cyber Laws About the author Rohas Nagpal is the founder President of Asian School of Cyber Laws. He advises Governments and corporates around
Electronic and Digital Signatures
Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as
Public Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
StartCom Certification Authority
StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction
An Act to provide for the facilitation of the use of electronic transactions and signatures and for related matters.
Electronic Transactions and Electronic Signatures Act Act No. [ ] of [ ] An Act to provide for the facilitation of the use of electronic transactions and signatures and for related matters. ENACTED by
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
User Guide. Digital Signature
User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this
CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES
Krajowa Izba Rozliczeniowa S.A. CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Version 1.5 Document history Version Number Status Date of Issue 1.0 Document approved by the Management
CS 392/681 - Computer Security
CS 392/681 - Computer Security Module 3 Key Exchange Algorithms Nasir Memon Polytechnic University Course Issues HW 3 assigned. Any lab or course issues? Midterm in three weeks. 8/30/04 Module 3 - Key
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
Land Registry. Version 4.0 10/09/2009. Certificate Policy
Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2
TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE
TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
How To Create A Digital Signature Certificate
Tool. For Signing & Verification Submitted To: Submitted By: Shri Patrick Kishore Chief Operating Officer Sujit Kumar Tiwari MCA, I Year University Of Hyderabad Certificate by Guide This is certifying
1. Lifecycle of a certificate
1 1. Lifecycle of a certificate 1. Client generates Signing Request (CSR) in his secure computer or server where application will be used. Now client has two s a CSR (usually with CSR extension but it
CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS
CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS Please fill in the form using BLOCK CAPITALS. All fields are mandatory. 1 1. SUBSCRIBER
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE
TERMS OF USE FOR TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information and other information contained
Federal Law No. (1) of 2006 On Electronic Commerce and Transactions
Federal Law No. (1) of 2006 On Electronic Commerce and Transactions We, Khalifa bin Zayed Al Nahyan, President of the United Arab Emirates, In cognisance of the Constitution, and The Federal Law No. (1)
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
How to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
LAWS OF BRUNEI CHAPTER 196 ELECTRONIC TRANSACTIONS ACT
CHAPTER 196 ELECTRONIC TRANSACTIONS ACT S 93/00 REVISED EDITION 2008 B.L.R.O. 4/2008 Electronic Transactions 1 2008 Ed. CAP. 196 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 197 ELECTRONIC TRANSACTIONS
to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many
In the world of secure email, there are many options from which to choose from to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many cryptographical concepts to achieve a supposedly
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Certification Practice Statement
Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require
Strong Security in Multiple Server Environments
White Paper Strong Security in Multiple Server Environments VeriSign OnSite for Server IDs Contents 1. Introduction 1 2. Security Solutions: The Digital ID System 2 2.1. What Is a Digital ID? 2 2.2 How
Electronic And Digital Signatures
Electronic And Digital Signatures Summary The advent of e-government and e-services is changing the way we do business. Traditionally, we created records on paper and we authenticated a record by signing
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
