De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de



Similar documents
PrivaSphere Gateway Certificate Authority (GW CA)

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Using etoken for Securing s Using Outlook and Outlook Express

The Security Experts Welcome to my presentation Christian Heutger Internet Security Days

As simple as and as secure as postal mail.

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Processo Civile Telematico (On-line Civil Trial)

Secure Client Applications

Technical Guideline TR Electronic Identities and Trust Services in E-Government

Exchanging Medical Records Online with Direct

Data Privacy in the Cloud E-Government Perspective

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Gateway

SSLPost Electronic Document Signing

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

Options for encrypted communication with AUDI AG Version of: 31 May 2011

SECURE User Guide

EXAM - ST Symantec PGP Universal Server 3.2 Technical Assessment. Buy Full Product.

D.I.M. allows different authentication procedures, from simple confirmation to electronic ID.

Secure Frequently Asked Questions

Secure communications via IdentaDefense

Office Standardization. Encryption Gateway. A Brief Guide for External Communication Partners.

Government Service Bus

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

Instructions Microsoft Outlook Express Page 1

RightFax Internet Connector Frequently Asked Questions

Security-Product by IT SOLUTIONS. security at the highest level JULIA. Security. Cloud Security

What is an SSL Certificate?

Webmail Using the Hush Encryption Engine

Encryption of Traffic

1. How to Register Forgot Password Login to MailTrack Webmail Accessing MailTrack message Centre... 6

Sending s without the risk! Secure Communications with Rohde & Schwarz

Security Solutions

GlobalSign Enterprise Solutions

CLOUDSERVICES

Secured Global Communication version 4.6

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

The Direct Project Reference Implementation Architecture

CERTIFICATION PRACTICE STATEMENT UPDATE

Chapter 6 Electronic Mail Security

E Mail Encryption End User Guide

HIPAA: Briefing for Healthcare IT Security Personnel. Market Overview: HIPAA: Privacy Security and Electronic Transaction Standards

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

RPost Outlook Quick Start Guide

SHORT MESSAGE SERVICE SECURITY

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Glossary of Key Terms

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

FTA Computer Security Workshop. Secure

National Healthcare Safety Network (NHSN) NHSN Enrollment

End-User Reference Guide

End-User Reference Guide

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information

Making Digital Signatures Work across National Borders

CHAPTER 1 INTRODUCTION

Fact sheet: sa Certipost nv. Certipost Panel Presentation European Commission. Company. Activities based on 2 pillars: Clients.

GlobalSign Solutions. Using a GlobalSign PersonalSign Certificate to Apply Digital Signatures in Microsoft Office Documents

Arizona Health Information Exchange Marketplace. Requirements and Specifications Health Information Service Provider (HISP)

How To Understand And Understand The Security Of A Key Infrastructure

A Noval Approach for S/MIME

How to Send an Encrypted via KDADS' Outlook Client or Outlook Web Application

iq.suite Crypt - Server-based encryption - Efficient encryption for Lotus Domino

April PGP White Paper. PGP Universal 2.0 Technical Overview

Pilot WEDI Review

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

1 Product. Open Text is the leading fax server vendor in the world. *

POP3 Connector for Exchange - Configuration

Sending s without the risk! Secure Communications with Rohde & Schwarz

A Guide to Secure

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Secure Cloud Identity Wallet

Sicherheitsaspekte des neuen deutschen Personalausweises

ELECTRONIC DOCUMENT LAW

Ciphire Mail. Abstract

Network Security Protocols

PineApp TM Mail Encryption Solution TM

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

BUYER S CHECKLIST Criteria for selecting an archiving solution

Secure User Guide

DJIGZO ENCRYPTION. Djigzo white paper

Business and Technical Description of Commercial Systems The scope of the technical solution is further described below.

WEB SERVICES SECURITY

Device Log Export ENGLISH

Exploring ADSS Server Signing Services

Optus SMS for MS Outlook and Lotus Notes

Clearswift Information Governance

Certification Practice Statement

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Installing your Digital Certificate & Using on MS Out Look 2007.

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Implementing and Managing Microsoft Exchange Server 2003

Category Run Environment Using Certificate in IE Using Certificate in Mozilla Firefox Using Certificate in Outlook

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

Instructions Android Smartphone & Tablet Page 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CIPHERMAIL ENCRYPTION. CipherMail white paper

Presentation of the ICCS Platform for the international communication of civil-status data by electronic means

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Grid Computing - X.509

New Security Features

Djigzo encryption. Djigzo white paper

Transcription:

De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1

Agenda Overview of De-Mail Implementation aspects Current status and outlook Summary 2

Agenda Overview of De-Mail Implementation aspects Current status and outlook Summary 3

De-Mail: A new approach for reliable and secure online communication Why? Note! How? Electronic communications with legal consequences Postal mail is used mostly for documents with legal consequences Email is a mass communication medium Email encryption technologies are not well accepted by users 1. Use standard email as the basis technology 2. Implement security mechanisms by trustworthy service providers 3. Ensure reliable registration 4. Define legal framework Solution! De-Mail: simple as email and secure as postal mail 4

Relevant aspects of the legal framework Compared to existing email services, no additional logging of information is claimed Opening of accounts/mail boxes is to one s own volition for citizens and legal entities Identity of each user must be verified reliably Each citizen may claim one or more pseudonym addresses For communication with legal consequences, a strong authentication method must be used Private service providers must prove the fulfillment of all requirements in an certification procedure 5

Certification aspects Functionality Interoperability Information security Privacy and data-protection 6

De-Mail services De-Mail Mail service for reliable and secure electronic communication Authentic addresses for senders and recipients, e.g. Michael.Meyer@my-provider.de-mail.de sales@my-company.de-mail.de Confidential and tamper-proofed transmission Reliable notification of transmission and delivery De-Safe Long-term storage with protection against loss or manipulation De-Ident Sending confirmed identity data on user s request, e.g. age or postal address Support of standard web browsers and email clients 7

Agenda Overview of De-Mail Implementation aspects Current status and outlook Summary 8

Accounts and addresses Accounts for citizens and legal entities Reliable initial registration for legal consequences of the communication Standardized address format for authentic addresses, e.g. Michael Meyer: Michael.Meyer@my-provider.de-mail.de Pseudonym: pn_mickeymouse@my-provider.de-mail.de My Company : sales@my-company.de-mail.de 9

Scalable security Authentication From username/password to eid card Examples for strong authentication OTP-Token, OTP-Mobile SMS, smartcard Required authentication level depends on usage Confidentiality and Integrity Optional end-to-end encryption and (qualified) electronic signature Supported by a directory for user certificates and by a verification service 10

Overview of the reliable and secure communication Citizens and legal entities Internet Citizens and legal entities Provider A Citizens and legal entities Provider B Provider C 11

Default transmission security Mutually authenticated and encrypted channel (e.g. SSL/TLS) SMTP over SSL/TLS Mutually authenticated and encrypted channel (e.g. SSL/TLS) Sender Web browser Email client Protocol depends on sender s client (http, SMTP, ) Sender s Provider Verification / Addition of metadata Integrity protection and encryption (S/MIME) Notification of transmission Recipient s Provider Notification of delivery Decryption Integrity check Protocol depends on recipient's client (http, SMTP, ) Recipient Web browser Email client 12

Linking legal entities to De-Mail Existing IT-infrastructure of the legal entity Secure communication environment Citizens and legal entities Provider A Div. I Div. II Div. III Email server email Gateway De-Mail Provider B Provider C... Internet 13

Agenda Overview of De-Mail Implementation aspects Current status and outlook Summary 14

Time schedule 2007 2008 2009 2010 Technical conception Studies for acceptance, privacy-protection, law and interoperability Market analysis Conception of certification scheme Legislation Pilot Preliminary Development, Implementation Operation now 15

Pilot partners Businesses and administrations Individuals Providers citizens lawyers notaries tax consultants public accountants craftsmen

International activities ETSI REM (Registered E-Mail) Trusted delivery of e-mail equivalent to postal services UPU.post New top level domain for worldwide postal sector with strict policy for issuing domains Guaranteeing the sender s authenticity EU EIIS (European Interoperability Infrastructure Services) within IADBC Study on potential reuse of service modules and components EU SPOCS (Simple Procedures Online for Cross-border Services) Work package 3: Interoperable delivery, esafe, secure and interoperable exchanges and acknowledgement of receipt 17

Agenda Overview of De-Mail Implementation aspects Current status and outlook Summary 18

Benefits of De-Mail Easy to use No additional technical equipment needed for users Security mechanisms implemented by trustworthy providers Authentic communication Addresses referring to reliable registered identities Scalable security Different authentication levels Support of end-to-end encryption and electronic signatures Notifications as needed De-Mail: simple as email and secure as postal mail 19

Thank you! Armin Wappenschmidt secunet SwissIT AG wappenschmidt@swiss-it.ch External consultant in the German project De-Mail 20