Top Banner
©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E- Transactions Alexander NTOKO, Head, E-Strategy Unit Telecommunication Development Bureau (BDT) [email protected] http://www.itu.int/ITU-D Regional Seminar on E- Commerce for CEE, CIS and Baltic States Bucharest, Romania 14-17 May 2002
28

© 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Mar 27, 2015

Download

Documents

Nathan Keating
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1

Security and Trust for E-Transactions

Alexander NTOKO, Head, E-Strategy UnitTelecommunication Development Bureau (BDT)[email protected] http://www.itu.int/ITU-D

Regional Seminar on E-Commerce for CEE, CIS and Baltic States

Bucharest, Romania14-17 May 2002

Page 2: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 2

There is a Growing Need for Security…

Page 3: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 3

…due to lack of confidence…

“On the Internet, nobodyknows you’re a dog…”

Identification isthe Challenge

…but in e-transactions, it is important to Know if you are dealing with a dog.

Page 4: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 4

But what are the Security Threats?

o Eavesdropping: where intermediaries “listen” in on private conversations

o Manipulation: where intermediaries intercept and change information in a private communication

o Impersonation: where a sender or receiver uses a false identity for communication

Page 5: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 5

What are the Requirements?Building confidence in e-transactions

o Confidentiality• Information accessed only by those authorized

o Integrity• No information added, changed, or taken out

o Authentication• Parties are who they pretend to be

o Non-repudiation• Originator cannot deny origin

o Infrastructure of trust• Automating the checking of identities

Page 6: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 6

How can we Enhance trust?

Confidentiality EncryptionWho am I dealing with? AuthenticationMessage integrity Message DigestNon-repudiation Digital SignatureThird party evidence of authenticity CertificateTrusted certificate Certification Authorities

Page 7: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Symmetric key encryption system

Same key is used to both encrypt and decrypt data

Examples of encryption systems: DES, 3DES, RC2, RC4, RC5DES: Data Encryption Standard, US Gov 1977, developed at IBM

Page 8: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 8

Symmetric key encryption system

o AdvantagesFast, secure, widely understood

o Disadvantages

Requires secret sharing

Requires large number of keys

No authentication

No non-repudiation

Page 9: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 9

Public key encryption system

o Concept introduced in 1976 by Diffie and Hellman

o RSA, the most popular, was invented in 1977 by Rivest, Shamir, and Adleman

o RSA (www.rsa.com) was founded in 1982

o Everyone has a private key and a public keyo Sender uses the receiver’s public key to encrypt

messageo Only receiver’s private key can decrypt messageo Discovering private key kept by one person is

more difficult than discovering shared secret key

Page 10: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Public key encryption system

Each user has 2 keys: what one key encrypts,only the other key in the pair can decrypt.Public key can be sent in the open.Private key is never transmitted or shared.

Recipient’s Public Key Recipient’s Private Key

Page 11: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 11

Public key encryption system

o Example: RSAo Advantages

No secret sharing riskProvides authentication, non-repudiationInfeasible to determine one key from the other

o DisadvantagesComputationally intense (in software, DES is at least 100 times faster than RSA)Requires authentication of public keys

Page 12: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Sender Authentication

Using Public Key Encryption “backwards” provides authentication of the sender

Sender’s Public KeySender’s Private Key

Page 13: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Message Digest

Hash Algorithm

Digest

- Used to determine if document has changed- Usually 128-bit or 160-bit “digests”- Infeasible to produce a document matching

a digest- A one bit change in the document affects

about half the bits in the digest

Plaintext

Page 14: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 14

Message Digest

o Common hash algorithms• MD2 (128-bit digest)• MD4 (128-bit digest)• MD5 (128-bit digest)• SHA-1 (160-bit digest)

Page 15: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Digital Signature

Signer’s Private Key

SignedDocument

EncryptedDigestHash

Algorithm

Digest

Page 16: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Verifying the Digital Signaturefor Authentication and Integrity

Hash Algorithm

Digest

Digest??

Signer’sPublic Key

Integrity: One bit change in the content changes the digest

Page 17: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 17

Digital Signature

Guarantees:o Integrity of document

One bit change in document changes the digest

o Authentication of senderSigner’s public key decrypts digest sent and decrypted digest matches computed digest

o Non-repudiationOnly signer’s private key can encrypt digest that is decrypted by his/her public key and matches the computed digest. Non-repudiation prevents reneging on an agreement by denying a transaction.

Page 18: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 18

Digital Certificate

Page 19: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 19

Digital Certificate

o A digital certificate or Digital ID is a computer-based record that attests to the binding of a public key to an identified subscriber.

o Certificate issued by Certification Authority (CA).o Certified digital signature attests to message

content and to the identity of the signer.o Combined with a digital time stamp, messages can

be proved to have been sent at certain time.

Page 20: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

Digital Envelope

Combines the high speed of DES (symmetric encryption) and the key management convenience of RSA (public key encryption)

“DigitalEnvelope”

One timeencryption Key

Recipient’sPublic Key

Page 21: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 21

ITU-T X.509 Certificate

o Standard certificate virtually everyone uses.o Includes: serial number, name of individual

or system (X.500 name - e.g., CN=John Smith, OU=Sales,

O=XYZ, C=US), issuer (X.500 name of CA), validity period, public key, cryptographic algorithm used, CA digital signature, etc., plus flexible extensions in Version 3.

o Certificate is signed by the issuer to authenticate the binding between the subject name and the related public key.

Page 22: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 22

ITU-T X.509 Certificate Version 3

o Version 3 standard extensions include subject and issuer attributes, certification policy information, key usage restrictions, e-mail address, DNS name, etc.

o Example of special extensions: account number, postal address, telephone number, photograph (image data), birthday to block users younger than specified age to access certain contents of a Web server, preferred language, etc.

Page 23: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 23

Security Technologies – Which One?

Page 24: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 24

Components of PKI

Page 25: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 25

Using tokens to secure B2B e-marketplace

Page 26: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 26

Signing and encrypting Email

Page 27: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 27

Securing Access to E-Mail using PSE

Page 28: © 1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 1 Security and Trust for E-Transactions Alexander.

©1998-2002 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit. All Rights Reserved. Page - 28

Thank you

for your attention