PKI - current and future



Similar documents
Long term electronic signatures or documents retention

Digital Signature Verification using Historic Data

Digital Signing without the Headaches

CERTIFICATION PRACTICE STATEMENT UPDATE

Signature policy for TUPAS Witnessed Signed Document

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Key Management and Distribution

CS 356 Lecture 28 Internet Authentication. Spring 2013

Neutralus Certification Practices Statement

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI All rights reserved

Public Key Applications & Usage A Brief Insight

Making Digital Signatures Work across National Borders

AD CS.

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Public-Key Infrastructure

The Estonian ID Card and Digital Signature Concept

Land Registry. Version /09/2009. Certificate Policy

Certificate Path Validation

Specifying the content and formal specifications of document formats for QES

WEB SERVICES SECURITY

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Electronic Signature. István Zsolt BERTA Public Key Cryptographic Primi4ves

Public Key Infrastructure

Certification Practice Statement

NIST s Guide to Secure Web Services

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex

This Working Paper provides an introduction to the web services security standards.

esign Online Digital Signature Service

Lecture VII : Public Key Infrastructure (PKI)

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic

Best prac*ces in Cer*fying and Signing PDFs

Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

STANDARDISIERUNG FÜR EIDAS IM MANDATE/460

Concept of Electronic Approvals

Deploying and Managing a Public Key Infrastructure

ehealth Ontario PKI Certification Policy Manual

Future directions of the AusCERT Certificate Service

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Controller of Certification Authorities of Mauritius

Ericsson Group Certificate Value Statement

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

Introduction to Network Security Key Management and Distribution

Business Issues in the implementation of Digital signatures

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager

Multiple electronic signatures on multiple documents

e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013

epki Root Certification Authority Certification Practice Statement Version 1.2

Egypt s E-Signature & PKInfrastructure

SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

e-authentication guidelines for esign- Online Electronic Signature Service

References. Difficulty of Government PKI Implementation (Japan s case) Japanese GPKI. Certification Authorities of Agencies

ING Public Key Infrastructure Technical Certificate Policy

Vodafone Group CA Web Server Certificate Policy

ETSI TS V1.1.1 ( )

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue

Key Management and Distribution

Digital Signatures in a PDF

Chapter 1: Introduction

AlphaTrust PRONTO Enterprise Platform Product Overview

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS Aristotle University of Thessaloniki PKI ( WHOM IT MAY CONCERN

BDOC FORMAT FOR DIGITAL SIGNATURES

GlobalSign Enterprise Solutions

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

How To Make A Trustless Certificate Authority Secure

SSLPost Electronic Document Signing

Key & Data Storage on Mobile Devices

XML Advanced Electronic Signatures (XAdES)

How To Understand And Understand The Security Of A Key Infrastructure

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

ETSI TS V1.1.1 ( ) Technical Specification

Registration Practices Statement. Grid Registration Authority Approved December, 2011 Version 1.00

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

ComSign Ltd. Certification Practice Statement (CPS)

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA

HKUST CA. Certification Practice Statement

Network Security: Public Key Infrastructure

TR-GRID CERTIFICATION AUTHORITY

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Forging Digital Signatures

Transcription:

PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1

Current Status of PKI in Japan Yuichi Suzuki (SECOM IS Lab) 2

Government PKI Bridge CA structure Government PKI All ministry s CAs are cross certified through BCA Private CAs are also cross certified through BCA for private sector business The private CAs must be accredited by electronic signature law Purpose of GPKI B to G, C to G electronic applications with electronic signature for e-government Electronic bidding Not for enterprise security Yuichi Suzuki (SECOM IS Lab) 3

Public citizen certification services Certificate for citizens issued by local government Started from Jan 2004 Linked to the resident register All prefectures have own CA Basic four information on certificate for a resident Name, address, date of birth, sex distinction Certificates and private key in a smart card Purpose of citizen certificates C to G (central and local government) electronic applications ex. Tax application, passport issuance, Electronic signature on application documents Yuichi Suzuki (SECOM IS Lab) 4

B A Accredited Certificate Authorities Commercial Private CAs registry CA Private sector CA Certificate Business A Electronic Applications Government PKI in Japan Prefecture B Prefecture A Internet Local Government PKI (LGPKI) BCA Local government CAs GPKI Cross Certification B A Portal Public citizen certification CAs Ministry CAs Certificate Government Posts Certificate Citizens Yuichi Suzuki (SECOM IS Lab) 5

Current PKI applications Popular PKI applications Web server and client authentication using SSL/TLS VPN for remote access S/MIME for secure e-mail? Not so popular Electronic signatures for natural persons in business area e-commerce, e-finance, Document encryptions Yuichi Suzuki (SECOM IS Lab) 6

Standards for PKI Basic PKI standards have became matured Based on ISO/ITU-T X.509 public key certificate IETF PKIX, S/MIME, TLS standards Certificate and CRL profile CP/CPS framework Time stamping S/MIME, CMS TLS W3C recommendation XML e-signature and encryption XKMS key management OASIS Web services security ETSI long term signatures Yuichi Suzuki (SECOM IS Lab) 7

Electronic Signature law Japanese electronic signature law effective from 2001 Technical neutrality Two mandatory features of electronic signature Identity Authentication Detect alternation Only person who have a secret can sign Accreditation conditions for CA services Certificates issuance for verification of signature Terms for designated examination authority for accredited CA services Yuichi Suzuki (SECOM IS Lab) 8

e-document law Strong requirements exist to eliminate paper documents and written signature documents e-documents law: Japanese government is preparing Scan paper documents to make e-documents Ex. Tax application, Health Records, The e-documents could be original, Ok to destroy the original papers To keep the integrity of scanned data Only the trusted document officers can scan the paper documents He/her must sign digitally on the scanned documents Digital time stamp also required The law will take effect next April Requirement for long term signature validation? Yuichi Suzuki (SECOM IS Lab) 9

Electronic Signature Why electronic signature does not so popularize? High cost for strict certification Difficult to verify signature Lack of killer applications Does not support long term signature verification Influence of US federal electronic signature law? Does not mandate PKI Yuichi Suzuki (SECOM IS Lab) 10

Time Stamping Electronic signature supports Who had signed Whatwas the target Claimed signing time could not trust Time stamping supports When the signature was generated PKI based Time stamp (RFC 3161) Bind document hash and trusted time by electronic signature of TSA support contents integrity and creation time Time stamp token has fixed life time It will be desired to use strong key and long validity time Yuichi Suzuki (SECOM IS Lab) 11

PKI in the future Yuichi Suzuki (SECOM IS Lab) 12

Will become PKI as real infrastructure? To spread PKI Lower cost of certificate Easy to use Legislation support Killer applications These are chicken and egg problem More technical support might be needed Long term signature stability e-authentication and Web service security Combine PKI and PMI Easy verification environment XKMS (X-KISS) Stable cryptographic algorithm Computational to Information theory Yuichi Suzuki (SECOM IS Lab) 13

Long term signature Problem of short certificate validity period PKI does work well within certificate validity period However, after expiration of certificate No more secure the public key, even if the key does not compromise Should not use the key for verifying the signature Then, digital signature can not verify Too short the validity period Usually the period is one to three years Many legislations require to keep signature documents over 5 years, 10 years, or more than 30 years Yuichi Suzuki (SECOM IS Lab) 14

Signature verification Usual PKI environment We can not verify the signature after revocation or expiration of the certificate Before certificate expiration After certificate expiration Allow signature validation Can not confirm signature validation After more than ten years Algorithm compromise Signature Verify signature Certificate revocation Verify signature Verify signature Verify signature Loose revocation information Forge signature Yuichi Suzuki (SECOM IS Lab) 15

Standard format for long term signature Collect all evidences for verification in signature format At the first signature verification Fix signing time Time stamp on signature value Collect all certificates and revocation information on certification path Two standards have been proposed ETSI TS 101 733 (RFC 3126) (ASN.1 extension of CMS Signed Data) ETSI TS 101 903 (W3C Note) XAdES XML signature format extension ES-C ES-X ES-T Signature Policy ID Elect. Signature (ES) Signed Attributes Digital Signature Timestamp over digital signature Complete certificate and revocation references Complete certificate and revocation Data Yuichi Suzuki (SECOM IS Lab) 16

Archiving Time Stamp Time stamp based on PKI also has fixed life time ex. RFC 3161 time stamp token has digital signature Encapsulate by another new strong time stamp Archive time stamping before expiration of inner timestamp certificate and/or cryptographic algorithm compromise ES-X Time Stump Time Stump Time Stump Yuichi Suzuki (SECOM IS Lab) 17

e-authentication and PKI Authentication is most important mechanism for cyber space security Secure online services must need authentication e-authentication US government initiative Multiple assurance authentication Level (1 to 4) SAML & Liberty base Identity Federation for privacy protection PKI will play high assurance authentication Level (3, 4) Yuichi Suzuki (SECOM IS Lab) 18

Web services security Web service will emerge in many applications Loosely coupled Platform and language independence Firewall friendly XML and SOAP messaging To secure Web services application on the internet SOAP security SAML token Need digital signature security for messaging PKI will play background infrastructure Yuichi Suzuki (SECOM IS Lab) 19

Combine PKI and PMI Will become X.509 Attribute Certificate as PMI? X.509 attribute certificate is too complex to manage It only supports attribute definition and does not support privilege (access) control SAML and XACML will work well in online environment Flexible security mechanism including ID-Password to PKI It works in wide domain PMI with Id federation Supports personal information protection Attributes and privileges management might be local Yuichi Suzuki (SECOM IS Lab) 20

Trusted validation authority XKMS (X-KISS) PKI applications have to use many digital signatures Natural persons electronic signatures Message signatures by system Verification of certificate and signature Out source verification process from client to trusted verification services for interoperability XKMS (X-KISS) is a good tool for the verification, specially for web services security Yuichi Suzuki (SECOM IS Lab) 21

Summary PKI technologies have been matured Basic Infrastructure has been established However, lack of killer applications For near future Long term signature retention is necessary We have to re-verify the signature again to arbitrate the disputes Stable standards are needed for signature verification capability over long term period We have to confirm the stability and usability of these standards e-authentication and PKI Under clear policy, Id federation can protect personal information PKI supports high assurance security Web services security Many applications will reside on web services PKI will play as security mechanism for web services messaging Trusted validation authority XKMS(X-KISS) Out source validation service from client Yuichi Suzuki (SECOM IS Lab) 22

Yuichi Suzuki (SECOM IS Lab) 23