SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Electronic Signature
석사 29기 박준영
Contents
• Definition
• PKI-Electronic Signature + MITM Attack
• Public Certificate
• Certificate Formats (Components)
• Certificate Authorities
• Improved Signing Procedure
• Non-repudiation Function
• Q & A
• Signature electronically
• Certificate one’s identity
• Equivalent to handwritten signatures
Definition
PKI E-Signature
• Hash(D1) => H1
• Encrypt(KeyE, H1) => S;
• C1 = {D1, S, KeyD}
• C1 => D1, S, KeyD;
• Decrypt(KeyD, S) => H1;
• Hash(D1) => H1;
• H1 == H1;
Alice Bob
PKI E-Signature (MITM)
• Hash(D1) => H1
• Encrypt(KeyE, H1) => S;
• C1 = {D1, S, KeyD}
• C2 => D2, S, KeyD;
• Decrypt(KeyD, S) => H1;
• Hash(D2) => H2;
• H1 != H2;
• C1 => D1, S, KeyD
• D1 => D2;
• C2 = {D2, S, KeyD}
• C1 => C2
Alice
Bob
Hacker
• C2 => D2, S2, FKeyD;
• Decrypt(FKeyD, S2) => H2;
• Hash(D2) => H2;
• H2 == H2;
PKI E-Signature (MITM)
• Hash(D1) => H1
• Encrypt(KeyE, H1) => S;
• C1 = {D1, S, KeyD}
• C1 => D1, S, KeyD
• D1 => D2;
• Hash(D2) => H2;
• Encrypt(FKeyE, H2) => S2;
• C2 = {D2, S2, FKeyD}
• C1 => C2
Hacker
Alice
Bob
Public Certificate
• Electronic ID Card
• Validate Electronic Signature
• Need 3-party Certification Authority(CA)
Public Certificate
PKCS#12 Format File(.p12)
Certificate + Private Key
Using when Import / Export
Public Certificate
(.der / .pem)
DER / PEM
DER : Binary formed cert.
PEM : Base64 encoded cert.
Private Key
Keep it Secret!!
Certificate Contents (X. 509)
• Key-Usage
• Public Key
• Thumbprint Algorithm
• Thumbprint
• Serial Number
• Subject
• Signature Algorithm
• Signature
• Issuer
• Valid-From
• Valid-To
Certificate Authorities
ROOT CA
ROOT CA
SUB CA
- Korea(For e-commerce)
Certificate Authorities
SSL Certificate Market Share (August 2014)
(http://www.whichssl.com/comparisons/market-share.html)
- World
Improved Signing Procedure
Hash data
⬇
Encrypt hashed data
(Signature)
⬇
Attach Certificate
with Signature & Data
⬇
Send via network
(D-Signed data)
”Digital Signature diagram" by Acdx
Improved Signing Procedure
”Digital Signature diagram" by Acdx
Receive D-Signed data
⬇
Detach Data & Signature
⬇
Check Certificate via CA
⬇
Compare Hashed Data
and Decrypted Data
⬇
Verify
Non-repudiation
Reference
• 네이버 애플리케이션의 전자 서명 원리(http://helloworld.naver.com/
helloworld/textyle/744920)
• SSL Certificate Market Share (http://www.whichssl.com/comparisons/
market-share.html)
• Solo, David, Russell Housley, and Warwick Ford. "Internet X. 509 public
key infrastructure certificate and certificate revocation list (CRL)
profile." (2002).
• Public Certificate Sample (Hana Bank Corp.)
• Digital Signature Diagram by Acdx (Wikipedia)
Electronic Signature
Q & A

Contenu connexe

Tendances

Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Ganesh Kothe
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
Abhishek Kesharwani
 

Tendances (20)

Ds over
Ds overDs over
Ds over
 
Dsa & Digi Cert
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi Cert
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
 

En vedette

ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
Market Engel SAS
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentation
brettlieberman
 

En vedette (17)

PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
 
Documento informatico: profili giuridici
Documento informatico: profili giuridiciDocumento informatico: profili giuridici
Documento informatico: profili giuridici
 
G01.2012 magic quadrant for user authentication
G01.2012 magic quadrant for user authenticationG01.2012 magic quadrant for user authentication
G01.2012 magic quadrant for user authentication
 
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
 
Electronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesElectronic Document & Electronic Signatures
Electronic Document & Electronic Signatures
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentation
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers
 
What is documentation and its techniques
What is documentation and its techniquesWhat is documentation and its techniques
What is documentation and its techniques
 
Documentation Types
Documentation TypesDocumentation Types
Documentation Types
 
Document Management System
Document Management SystemDocument Management System
Document Management System
 
Document Management With Workflow Presentation
Document Management With Workflow PresentationDocument Management With Workflow Presentation
Document Management With Workflow Presentation
 
Principles of Documentation
Principles of  DocumentationPrinciples of  Documentation
Principles of Documentation
 
Document Management System (DMS)
Document Management System (DMS)Document Management System (DMS)
Document Management System (DMS)
 
Electronic document management perspectives
Electronic document management perspectivesElectronic document management perspectives
Electronic document management perspectives
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practice
 

Similaire à Electronic Signature

Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security Basics
Bipin Jethwani
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
Avirot Mitamura
 
Django SEM
Django SEMDjango SEM
Django SEM
Gandi24
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 

Similaire à Electronic Signature (20)

Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security Basics
 
[Note]x509
[Note]x509[Note]x509
[Note]x509
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Us 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychainUs 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychain
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
 
Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Django SEM
Django SEMDjango SEM
Django SEM
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
Public Key Infrastructure
Public Key Infrastructure Public Key Infrastructure
Public Key Infrastructure
 
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
 
A 5 security x line platform
A 5 security x line platformA 5 security x line platform
A 5 security x line platform
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 

Plus de Joon Young Park

Plus de Joon Young Park (18)

WheelLogger_WISA
WheelLogger_WISAWheelLogger_WISA
WheelLogger_WISA
 
Power spy
Power spyPower spy
Power spy
 
MoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch SensorsMoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch Sensors
 
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious ChargersMACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
 
Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...
 
Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)
 
Delegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTDelegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoT
 
Lithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of ThingsLithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of Things
 
Internet of secure things
Internet of secure thingsInternet of secure things
Internet of secure things
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
MiTumb
MiTumbMiTumb
MiTumb
 
Linux Remote Connection
Linux Remote ConnectionLinux Remote Connection
Linux Remote Connection
 
License Plate Recognition
License Plate RecognitionLicense Plate Recognition
License Plate Recognition
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
DDD
DDDDDD
DDD
 
Baas.io
Baas.ioBaas.io
Baas.io
 
LBSNS Flatform Business
LBSNS Flatform BusinessLBSNS Flatform Business
LBSNS Flatform Business
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Electronic Signature

  • 2. Contents • Definition • PKI-Electronic Signature + MITM Attack • Public Certificate • Certificate Formats (Components) • Certificate Authorities • Improved Signing Procedure • Non-repudiation Function • Q & A
  • 3. • Signature electronically • Certificate one’s identity • Equivalent to handwritten signatures Definition
  • 4. PKI E-Signature • Hash(D1) => H1 • Encrypt(KeyE, H1) => S; • C1 = {D1, S, KeyD} • C1 => D1, S, KeyD; • Decrypt(KeyD, S) => H1; • Hash(D1) => H1; • H1 == H1; Alice Bob
  • 5. PKI E-Signature (MITM) • Hash(D1) => H1 • Encrypt(KeyE, H1) => S; • C1 = {D1, S, KeyD} • C2 => D2, S, KeyD; • Decrypt(KeyD, S) => H1; • Hash(D2) => H2; • H1 != H2; • C1 => D1, S, KeyD • D1 => D2; • C2 = {D2, S, KeyD} • C1 => C2 Alice Bob Hacker
  • 6. • C2 => D2, S2, FKeyD; • Decrypt(FKeyD, S2) => H2; • Hash(D2) => H2; • H2 == H2; PKI E-Signature (MITM) • Hash(D1) => H1 • Encrypt(KeyE, H1) => S; • C1 = {D1, S, KeyD} • C1 => D1, S, KeyD • D1 => D2; • Hash(D2) => H2; • Encrypt(FKeyE, H2) => S2; • C2 = {D2, S2, FKeyD} • C1 => C2 Hacker Alice Bob
  • 7. Public Certificate • Electronic ID Card • Validate Electronic Signature • Need 3-party Certification Authority(CA)
  • 8. Public Certificate PKCS#12 Format File(.p12) Certificate + Private Key Using when Import / Export Public Certificate (.der / .pem) DER / PEM DER : Binary formed cert. PEM : Base64 encoded cert. Private Key Keep it Secret!!
  • 9. Certificate Contents (X. 509) • Key-Usage • Public Key • Thumbprint Algorithm • Thumbprint • Serial Number • Subject • Signature Algorithm • Signature • Issuer • Valid-From • Valid-To
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Certificate Authorities ROOT CA ROOT CA SUB CA - Korea(For e-commerce)
  • 15. Certificate Authorities SSL Certificate Market Share (August 2014) (http://www.whichssl.com/comparisons/market-share.html) - World
  • 16. Improved Signing Procedure Hash data ⬇ Encrypt hashed data (Signature) ⬇ Attach Certificate with Signature & Data ⬇ Send via network (D-Signed data) ”Digital Signature diagram" by Acdx
  • 17. Improved Signing Procedure ”Digital Signature diagram" by Acdx Receive D-Signed data ⬇ Detach Data & Signature ⬇ Check Certificate via CA ⬇ Compare Hashed Data and Decrypted Data ⬇ Verify
  • 19. Reference • 네이버 애플리케이션의 전자 서명 원리(http://helloworld.naver.com/ helloworld/textyle/744920) • SSL Certificate Market Share (http://www.whichssl.com/comparisons/ market-share.html) • Solo, David, Russell Housley, and Warwick Ford. "Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile." (2002). • Public Certificate Sample (Hana Bank Corp.) • Digital Signature Diagram by Acdx (Wikipedia)