White Paper. Cloud Signing vs. Smartcard Signing
|
|
|
- Joshua Preston
- 10 years ago
- Views:
Transcription
1 White Paper Cloud Signing vs. Smartcard Signing
2 1. Introduction 2. What is the Goal? What is driving successful Electronic Commerce and e-government solutions? The answer is simple: useful applications and user-friendly solutions that can provide operational cost savings. Drivers should not be up-front legislation on digital signatures, smartcards or PKI for the sake of PKI, which was the approach we saw around the turn of the millennium. Some of the user experiences with PKI back then were so poor that for many years we could not even use the term PKI or Public Key Infrastructure. Smartcards used for digital signatures also never caught on in any significant volume for the mere fact that there are very few smartcard readers around, which is due to the costly and cumbersome nature of the readers. But there is an alternative approach: Virtual smartcards, or signature servers as we call them introduced by Cryptomathic in 2000 long before cloud solutions became fashionable namely in an approach that allows transparent PKI, just as when you use your credit or debit card. This approach has been a tremendous success in countries like Denmark, Norway and Luxembourg and it is catching on outside Europe as well. In Denmark all companies and citizens must now, in principle, be able to communicate electronically with government agencies and in effect banks too. This paper explains why a majority believe digital signatures in the cloud is the way forward and why it has been so successful. Health services Legal documents Internet banking Utilities Loan applications There are obvious enormous savings for government, companies, individuals and the environment if we can communicate and not least commit and been held liable electronically rather than by paper. But it is no good simply starting with building a PKI and then to legislate you need to start with the applications that make it attractive to users. We have already seen how popular e-banking and internet shopping has become, and if you think of all the letters you get throughout the year from public authorities, e.g. on various taxes, registration for voting, pension etc, you start grasping the significance of making this digital. And to this you can add insurance, utilities, business contracts and much more. Okay, so what do we need to get started? Secure reliable communication means more than anything. There is one and only one way to secure data in the Internet: by means of cryptography. For this, you in turn need keys, private keys for digital signatures and decryption and corresponding public keys for signature verification and encryption and of course: 1. Access to your apps using your cryptographic keys 2. Secure storage of the keys 3. Secure generation of signatures 3. What are the Challenges? 3.1. WYSIWYS The main challenges are around the generation of digital signatures. In 1998 we coined the phrase What You See is What You Sign (WYSIWYS) (see [1]). The point of this is that when you read a message or document off the screen of your tablet, workstation or whatever, and you want to commit to it by digitally signing it, how do you ascertain that it really is this message and this message only you are committing to? This by far is the hardest thing to achieve, as this is a significant challenge unless you have a Trusted GUI (Graphical User Interface), which you do not! The problem is that in the digital signing process, you digitally sign, e.g. you apply your private key, to what is known as a hash of the message that you see on the screen. Without being too technical a hash, in a way, is to a message what a DNA-molecule is to a human, in the sense that no two humans will have exactly the same DNA. When you sign, you actually have no clue per se that the hash is calculated from the very message you want to sign without a Trusted User Interface to guarantee this. For more on this, please see [1]. Storing the private key on a smartcard does not in any way address this challenge, and the only way to deal with this in case there is no Trusted GUI is to use two independent channels, as it is very unlikely both channels can be successfully attacked at the same time. 2
3 3.2. Secure Storage, Access and Generation Regardless of the overall architecture, it is absolutely vital that the private keys are stored securely, and in a way which only the owner can access for signature generation and that the signature is generated within a protected environment. 5. Why the Signature Server Solutions are preferable With a central signature server, also known as signatures in the cloud, the challenge as far as the individual user is concerned is to ensure that: In the late 90s, it was generally accepted that the only viable way forward was to use smartcards for this. Indeed, so did we in Cryptomathic, so we got involved in a number of pilots and ran into a number of shortcomings or challenges of which the most significant was purchasing card readers and installing them everywhere. 1. The user is properly authenticated before he can sign a message 2. Only the owner of a particular private key can initiate the signature calculation 3. WYSIWYS However, there are means for protecting private keys that are much more resilient to various attacks on the key: so-called Hardware Security Modules (HSMs). They are already used extensively by banks all over the world. So we decided on a radically different approach, where we replaced smartcards with virtual smartcards, namely HSMs that can be accessed remotely but as securely as a smartcard in a smartcard reader. To achieve this, the most secure approach is to have two independent servers, one for authentication and one for signing. They might even be physically situated in different environments with a secure channel connecting them. In fact, the signature server might be connected to a number of different authentication servers. Each server is supported by Hardware Security Modules (HSMs), and all secure calculations and verifications are carried out entirely by and in an HSM. This is very much like when debit- and credit-card transactions are being authorised by banks. The advantage of this is that one would have a full range of various authentication mechanisms available. Below is a simplified usage example of this scenario: 4. What are the solutions Assuming the reader is familiar with PKI, we briefly recall the characteristics. Each user has a public key pair for signing and possibly another for confidentiality. Users are registered with their public keys and a CA issues and maintain certificates on these. The problem with a certificate is that although it pertains to say something about the future it really only says something about the past, such as when the certificate was generated. The certificate may have an expiry point of time at some stage in the future but how do you know it has not been revoked prematurely? To cope with this, the traditional approach is to use blacklists and/or enable online verification, like OCSP. Now, which consequences does this have if you use a Signature Server solution, rather than the originally intended smartcard approach? The user generates a message to be signed on a tablet or work station and forwards a signing request to the authentication server together with a preferred strong authentication method to identify the user. The authentication server verifies the identity of the user and, if successful, forwards for signature generation. The signature server forwards a copy of the message to the user s mobile device together with an authorisation code of say 6 characters. If the user is satisfied s/he returns the code and the signature is generated by the signature server through a secure TLS tunnel all the way into the authentication server. If the Authentication and Signature Servers are in different environments this enables two independent loggings of when the signing was initiated by the user, so the system knows exactly when this took place, in contrast to the smartcard approach. WYSIWYS is thus achieved by the ability to compare the signed versions in each channel and observing that they are identical Mobility and cost The most striking advantage of signatures in the cloud is that the user is not confined to one particular workstation or laptop, which makes it a truly flexible solution. Another advantage is that if you already have the infrastructure and the applications, it is very cost-effective to add more users as you do not need any additional hardware. 3
4 5.2. PKI becomes transparent Even better, this solution enables you to simplify the difficulties and shortcomings of a traditional PKI solution, where everybody in principle may communicate securely with everybody. First of all, once a user is properly identified and registered, his private key pair is generated by the signature server, and the signature server can have a certificate issued at an assigned CA, which ONLY issues cer- tificates for signature servers that are associated and adhere to the same kind of solution and security level. Thus all applications for which this infrastructure is used will in principle be able to recognise if a received signature from another user has been generated on a security server rather than a smartcard or even worse, in software. This obviously requires secure storage of the public key of the CA but that will always be the case with PKI. 1 Need for signed transaction e-business APPLICATIONS 5 Signed transaction 2 Request for signature 3 Strong authentication User's private key USER 4 Signature CRYPTOMATHIC SIGNER Three-tier PKI ecosystem Certificate expiry/revocation no longer an issue Certificates are like drivers licenses: they pertain to say something about the future, but they only say something about the past. For example, It is relatively easy for a person to get an original copy of his driver s license, just go to the appropriate authority and explain you have lost it. Now you have two. If your license is revoked, just return the latest. You can still rent a car all over the world with your original license as normally no check is carried out against a central database. Likewise, if you receive a digital signature, you have to ask yourself: can I rely on it or could the private key used to generate it have been revoked either after or even before the signature was generated? The point is that all a certificate tells you as that at some point in time in the past the corresponding private key was valid. But to ascertain that the private key was still valid at the time when the signature allegedly was generated, you need to contact the CA e.g. through OCSP (Online Certificate Status Protocol) to inquire whether the key has been revoked meanwhile or wait for a blacklist generated after receipt of the signature. But even this is not enough to prevent invalid certificates being used, as we shall see below. With the central signer approach, this problem evaporates except for a very short clearing period. Indeed, with the central signer approach, the millisecond a certificate is revoked by the CA, the central signature server is informed by the CA, and requests from the user to sign with his private key are no longer honoured. 4
5 Blacklists are superfluous Another major challenge of most PKI solutions is to handle revocation and blacklists. Blacklists are obsolete as soon as they have been generated and distributed. the view of boosting user empowerment, convenience and trust in the digital world; especially for promoting the widespread use and uptake of electronic identification and trust services (eidas services) within the internal market. So if the CA used in conjunction with a central signer solution issues certificate only on public keys where the private key is stored with an authorised central signature server, you no longer need blacklists. Indeed, when you receive a digital signature generated by the central signature server, you know the private key used to generate must have been valid at the time the signature was generated! Independent Timestamping no longer required Consider the scenario where you are a user of a traditional PKI solution where every user has his private key on a smartcard in his private possession, and assume you receive a digital signature from Alice on Dec 1st 2014 where she commits to paying you 1000 on April 1st You then inquire, say on Dec 2nd, with the CA that her certificate has not been revoked. So assume in the following that it has not. April 1st arrives, but no money. You contact Alice, and she tells that Bob living next door has likely stolen her smartcard with her private key over New Year. In any event, Alice revoked her key on Jan 2nd, but there appears to be a constant stream of digital signatures generated with her private key even after, and there is nothing she can do about it. So Alice might claim that whoever the culprit is he must have generated said commitment after Dec 1st and simply back-dated the timestamp which is trivial to do. You may of course know that Alice is lying, as you may know when you actually received the signature but without additional measures, you cannot prove it! This is why independent timestamping is required in a traditional PKI solution. You either need to send all received signatures to an independent 3rd party authority for independent timestamping the most common approach proposed or have other means of proving when the signature was received. Sadly, this is still not a well-understood risk EU legislation Back in 1999, EU legislation was put in place for solutions where a digital signature could have the same legal value as a handwritten signature, provided a number of conditions were satisfied. One of these was that a Secure Signature Creation Device (SSCD) is used, and the only solution anticipated was a smartcard. But meanwhile we have learned that, not least thanks to Cryptomathic s pioneering work, central signature server solutions are much more versatile and useful. There are now nationwide solutions available in countries across Europe and the Middle East that are highly successful with more than 60% of all citizens, in some countries, that use the solution on an almost daily basis. Regulation now allows for a central signature server as a Secure Signature Creation Device (SSCD), and a standard is being developed [3] for certifying such. 6. Conclusion Signature Generation in the cloud is the most likely enabler of largescale egovernment and Electronic Commerce solutions as it is as safe or safer than the old-fashioned smartcard approach, it enables WYSIWYS and last but not least, it basically makes the underlying PKI transparent to the user. Signer Chipcard CARD READERS REQ no yes MOBILITY yes no WYSIWYS yes no LOGGING POSSIBLE yes no INSTANT REVOCATION yes no BLACKLISTS REQUIRED no yes IND. TIMESTMP REQ no yes COST PER USER very low very high Cloud signing vs. chip card signing This has been widely recognised in the European Commission. The electronic Identification And trust Services (eidas), which is driven by the European Commission Directorate General, has received a mandate to provide a comprehensive and predictable legal framework ([2]) with 5
6 7. References [1] WYSIWYS? What you see is what you sign? Landrock, P. and Pedersen, T., Information Security Technical Report Vol. 3, No. 2 (1998), 55-61, Elsevier Science Ltd. [2] [3] Elect ronicidentificationauthenticationandsignaturepolicyias.pdf Contact us: Please contact your local Cryptomathic representative for more information on digital signatures in the cloud and virtual smartcards OR [email protected] [email protected] Disclaimer 2015, Cryptomathic A/S. All rights reserved Jægergårdsgade 118, DK-8000 Aarhus C, Denmark This document is protected by copyright. No part of the document may be reproduced in any form by any means without prior written authorisation of Cryptomathic. Information described in this document may be protected by a pending patent application. This document is provided as is without warranty of any kind. Cryptomathic may make improvements and/or changes in the product described in this document at any time. The document is not part of the documentation for a specific version or release of the product, but will be updated periodically. ABOUT CRYPTOMATHIC Cryptomathic is one of the world's leading innovators and providers of security solutions to businesses across a wide range of industry sectors, including finance, technology, government, mobile and cloud. With more than 25 years experience, Cryptomathic provides customers with systems for e-banking, PKI initiatives, epassport, EMV card issuing, mobile payments, advanced key management and managed cryptography utilizing best-of-breed security software and services. Cryptomathic prides itself on its strong technical expertise and unique market knowledge. Together with an established network of partners, Cryptomathic assists companies around the world with building security from requirement specification to implementation and delivery. Learn more at
Cryptomathic s Response to Eurosmart Paper on Server Signing
1 Background information In September 2014, Eurosmart published a position paper 1 on server signing within the eidas regulation. The eidas is driven by the European Commission Directorate General and
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
FAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST [email protected]
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)
Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
Article. Robust Signature Capture Using SigPlus Software. Copyright Topaz Systems Inc. All rights reserved.
Article Robust Signature Capture Using SigPlus Software Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure
CSE543 - Introduction to Computer and Network Security Module: Public Key Infrastructure Professor Trent Jaeger 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
White Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Electronic and Digital Signatures
Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Future directions of the AusCERT Certificate Service
Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication
Digital Signature Verification using Historic Data
Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Service Description. 3SKey. Connectivity
Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
How To Get Smart Cards From Atos
secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
The Concept of Trust in Network Security
En White Paper Date: August 2000 Version: 1.2 En is a registered trademark of En, Inc. in the United States and certain other countries. En is a registered trademark of En Limited in Canada. All other
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.
REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to
If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system. BY THORSTEN SCHERF symmetric cryptography provides a powerful and convenient means for
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
VPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Why Password- Enabled PKI
Password Enabled Public-Key Infrastructure (PKI): Virtual Smartcards vs. Virtual Soft Tokens Ravi Sandhu Chief Scientist SingleSignOn.Net & Professor, George Mason University Mihir Bellare Chief Cryptographer
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
Secure email in times of rising mobile communication
White paper Secure email in times of rising mobile communication Applied cryptography: Certificates, Gateways and End-to-End Encryption White paper Secure email in times of rising mobile communication
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
All you need to know about the electronic residence permit (eat)
All you need to know about the electronic residence permit (eat) www.bamf.de/eaufenthaltstitel Contents Contents 1 The electronic residence permit 5 2 Photo and fingerprints 7 3 Additional provisions
Wildcard and SAN: Understanding multi-use SSL Certificates
WHITE PAPER: WILDCARD AND SAN: UNDERSTANDING MULTI-USE SSL CERTIFICATES White paper Wildcard and SAN: Understanding multi-use SSL Certificates Leveraging multi-use digital certificates to simplify certificate
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
StartCom Certification Authority
StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
White Paper. EMV Key Management Explained
White Paper EMV Key Management Explained Introduction This white paper strides to provide an overview of key management related to migration from magnetic stripe to chip in the payment card industry. The
Making Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
How Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
