Ubiquitous Public Key Infrastracture



From this document you will learn the answers to the following questions:

What key is needed for a public key system?

What is the purpose of PKI Issues in our Society?

For public key systems , what is the key?

Similar documents
Public Key Infrastructure for a Higher Education Environment

Design and Evaluation of Scalable Ubiquitous Discovery System

Evolution of mobile broadband and T&M business LTE

Network Security Protocols

SGFS: Secure, Flexible, and Policy-based Global File Sharing

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Case Study: NTT DATA and JAL ONLINE Federate Business Travel Expense Reporting

Development of Real-Time Enterprise Communication Service for Ubiquitous Age

Understanding Digital Certificates and Secure Sockets Layer (SSL)

How To Use Pki On A Pc (For A Non-Profit)

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

A Students Attendance System Using QR Code

Safe payments on the Net. Chris Mitchell Information Security Group Royal Holloway, University of London

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Authentication in WLAN

Mobile Ticket to Ride!

FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II

Prototype Design of NFC-Based Electronic. Coupon Ecosystem with Object Memory Model

Authentication is not Authorization?! And what is a "digital signature" anyway?

QR Code for Digital Signature Online/Offline Payment. James Wu 1

Wireless LAN g USB Adapter

Federated Authentication Mechanism with Efficient ID management

Contents. Expertise in access control. SaaS Software as a Service, a comprehensive solution. Megaflex Officeflow

Web Machine Interface

Security Policy Revision Date: 23 April 2009

A secure mobile payment system *

CloudCycle 14: Secure and User-Friendly QR-Code Based Key Distribution

International Journal for Research in Computer Science

Lecture VII : Public Key Infrastructure (PKI)

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

A NEW FRAMEWORK FOR BRIDGING THE GAP BETWEEN IT SERVICE MANAGEMENT AND IT GOVERNANCE FROM A SECURITY PERSPECTIVE

Software Assignments for a Course in Secure E-Commerce

IQS Identity and Access Management

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Key Management (Distribution and Certification) (1)

Controller of Certification Authorities of Mauritius

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

ISO/IEC for secure mobile web applications

BYOD Adaption in Banking

CONNECTING THE RASPBERRY PI TO A NETWORK

Architecture and Technologies for HGW

CHAPTER 1 Introduction 1

CPS221 Lecture: Layered Network Architecture

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Strong Encryption for Public Key Management through SSL

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Journal of Electronic Banking Systems

2 Information and Telecommunications

The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

PKI Deployment Business Issues

Mark Certificate Verification Services (Manual)

Configuring the WT-4 for ftp (Ad-hoc Mode)

E-Business Technologies for the Future

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode)

Savitribai Phule Pune University

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Public Key Infrastructure

Wireless LANs vs. Wireless WANs

Introducing etoken. What is etoken?

Nokia Mobile Software Strategy

Asymmetric cryptosystems fundamental problem: authentication of public keys

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

SSL/TLS: The Ugly Truth

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

M2M For industrial and automotive

TrustKey Tool User Manual

Parallels Business Automation 4.3

PKI - current and future

Reducing Configuration Complexity with Next Gen IoT Networks

Project Chase Manhattan

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

Input and Output of ISM-Benchmark

Chapter 1: Introduction

Fieldservers as Real-time Monitoring Tools for Ubiquitous Sensor Networks

Longmai Mobile PKI Solution

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

Reliable Authentication Method by Using Cellular Phones in WBT

Demonstration of Barcodes to QR Codes through Text Using Document Software

Special Properties of Ad-hoc Wireless Network and Security Models

Smart Meter PKI - Make or Buy?

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS

AGAINST OUTSIDE THREATS

Mobile Access by Axis. Wireless Access Points

Early Evaluation Center

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

The e-payment Systems

Description of the Technical Component:

Higher National Unit Specification. General information for centres. Unit title: Enhancing Network Security and Configuring Remote Access Methods

mcard CPK Supported Solutions

Mobile payment systems

Operational Aspects (Encryption and Data Storage) in E-Prescription

Transcription:

Ubiquitous Public Key Infrastracture TWISC at NTUST on December 27 Ken Umeno RIKEN and NICT

Outline PKI Issues in our Society Our Proposal towards Ubiquitous PKI Discussion for Future Studies

I encrypt, and you decrypt.

You encrypt, and I decrypt.

No. of Keys for Encryption in N Users Environment: N(N-1)/2 symmetric keys for one-toone secure communications. 2 N -2 symmetric keys for one-to-others secure communications. Symmetric key encryption systems are not scalable.

Why Public Key Infrastractures?

I encrypt, and you decrypt. For public key systems, I encrypt with your public key and you decrypt with your private key. A pair of your public key and private key is generated at your hand and you can distribute your public key.

You encrypt, and I decrypt. For public key systems, You encrypt with my public key and I decrypt with my private key. A pair of my public key and private key is generated at my hand and I can distribute my public key.

No. of Keys for Encryption in N Users Environment: PKI N public keys for one-to-one secure communications. N public keys for one-to-others secure communications. Public key encryption systems are scalable and suitable for large scale networks.

PKI and our Society PKI is a pillar of our e-society such as E-Government System, e-commerce, e-health (for protecting your medical data and Health insurance data) (USB memory used for ikey (Australia, USA)) For business, authentication server systems for ensuring server s public key as a trusted third party, called CA(Certificate Authority) is rapidly growing.

Current Issues of PKI: Why you don t have my public key?

Finland s Case National Initiative of PKI Program: 5,274,820 Population: Issues of National PKI: Extra Device (Smart Card Solution) Costs is High for installing private key and public key.

So far, We have seen that internet access costs had been virtually free. Cf. Free Internet Caffe at Airports like Singapore Hub airport. For users, service is vitally important. Business model for Internet was drastically changed.

From now on, We will see that wireless internet access will also become free and wireless internet access will be ubiquitous with communications terminals such as mobile phones, PDA, vital sensors,.e.t.c. in 5-10 years (soon).

Security of Ubiquitous Networks (Real Issues) For ensuring security of large scale ubiquitous networks connecting users and mobile phones and various sensors, PKI implementation is virtually unavoidable for any kind of services because of the terminal authentication mechanism of PKI. How to implement PKI for ubiquitous network environment?

Mobile Phone = Digital Camera Currently, most mobile phone have cameras and digital camera makers will equipe digital camera with wireless internet access. Most mobile phone with cameras can read QR code (two-dimensional code).

What is QR code? My QR code:

QR codes in Japan More than 30.6 million 3G mobile phone of NTT docomo can read QR codes. There are three operators (NTT docomo, KDDI, Softbank). Almost all mobile phone can read QR codes and they are currently used for the gateway code for wireless internet access.

QR Codes Specification Maximal Capacity: 2953 byte

Our Proposal to Implementation of Ubiquitous PKI To use two-dimensional code such as QR code which is readable by mobile phones with cameras and is printable as public key.

What is Merit? My public key is printable and I can distribute my public key by distributing name cards or other papers with printed public keys. Your public key can be read with my mobile phone anytime, anywhere.

QPKI (Quadrature PKI) card exchange= public key exchange Alice Bob

History of QR Code Standardization QR Code Standardization October, Approved as AIM International (Automatic 1997 Identification Manufacturers International) standard (ISS - QR Code) March, 1998 Approved as JEIDA (Japanese Electronic Industry January, 1999 June, 2000 November, 2004 Development Association) standard (JEIDA-55) Approved as JIS (Japanese Industrial Standards) standard (JIS X 0510) Approved as ISO international standard (ISO/IEC18004) Micro QR Code is Approved as JIS (Japanese Industrial Standards) standard (JIS X 0510)

Ubiquitous PKI Service Image C.f. www.cipheron.net (ProtoType System) Key server registration use from web application use for encryption

Current Issues No standard for two-dimensional bar codes except QR code and No stadard protocol between two-dimensional codes and public keys. No standard software development platform in mobile phone ( in a limited computing resource)

Our porposal for possible collaboration is: To set up a unique interoperable twodimensional codes system which can be readable by mobile phone in 3G by doing research and develop of codes suitable for public key storing, and to standardize it towards establishing security in our ubiquitous network society. To develope ubiquitous wireless terminals which can read the above code.

Thank you.