SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
DNI ELECTRÓNICO

Isaac Castro Fuentes
PARA QUÉ VALE
Autenticación
O cidadán asegura ante o
provedor do sevizo que é
quen di ser.

Sinatura
O cidadán ratifica a súa
conformidade cun documento,
como se o asinase en papel.
O TEMA LEGAL
๏

Directiva Europea 1998/93/CE

๏

Lei 59/2003 de sinatura electrónica

๏

Lei Orgánica 15/1999 de Protección de
Datos de Carácter Persoal

๏

Real Decreto 1553/2005

๏

Real Decreto 1586/2009
QUÉ HAI NA TARXETIÑA
O MICROCHIP
Zona Pública

Zona Privada

Zona Segura

๏Certificado

๏Certificado de

๏Datos de

๏Certificado de

๏Fotografía

público da CA
que asinou o
DNIe

๏Chaves DiffieHellman

๏Certificado

para autenticar a
tarxeta

autenticación
sinatura

filiación

๏Sinatura

manuscrita
A CRIPTOGRAFÍA
๏Xeneración de chaves RSA
๏Xeneración de hashes SHA1
๏Xeneración de sinaturas electrónicas
๏Intercambio de chaves
๏Cifrado 3DES CBC
PKI
• 4 AC
• 3 asinan DNIs e outra únicamente

AC RAIZ DNIE
22 29 f0 56 d3 4d 1c b6 3e 98
6f 26 b2 d0 8a b9 4f f0 8e 4d

certifica as subordinadas

AC DNIE 001

AC DNIE 02

AC DNIE 03

41 cf 9e c0 73 3d
58 e4 39 97 a6 c6
5d f7 97 c3 ee 99
40 7b

50 2b d0 07 8e 6d
a2 35 c4 5f 52 1c
63 ef 54 9d f0 19
8f dd

fb c0 71 d0 a4 81
11 bd df 77 76 d0
9e 42 bc 53 4e 24
48 70

• 2 CRL (Certificate Revocation List)
• FNMT e Ministerio de Hacienda
• Actualizadas como máximo cada 24 horas
AUTENTICACIÓN
•Establece unha canle segura entre

cliente e servidor
•Permite ao prestador do servizo
asegurar que o usuario é quen di ser

•O

cidadán fai unha
petición de conexión
segura autenticada.
•O organismo envía
unha mensaxe
autenticada.
•Xenérase a chave
de cifrado.
•O cidadán valida a
mensaxe
de
intercambio co seu
certificado.
•O o r g a n i s m o
verifica a mensaxe.
SINATURA
•Garante a integridade e o non repudio en orixe.
•Ten a mesma validez que a sinatura manuscrita
1. Realízase un hash do documento.
2. Cífrase o hash coa chave privada do cidadán.
3. O receptor valídao coa chave pública do
emisor, facendo un hash e vendo que son iguais.
ATAQUE
•O DNIe ten a mala costume de solicitar o PIN

incontables veces.
•Os usuarios meten o PIN sempre que se solicita.
Un software que cree unha
ventana similar á de
solicitude de PIN pode
obter o mesmo e lanzar un
proceso para interactuar co
DNI lexítimamente
BIBLIOGRAFÍA

www.dnielectronico.es

www.securitybydefault.com
GRAZAS!

Contenu connexe

En vedette

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

En vedette (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Presentación básica sobre DNIe

  • 2. PARA QUÉ VALE Autenticación O cidadán asegura ante o provedor do sevizo que é quen di ser. Sinatura O cidadán ratifica a súa conformidade cun documento, como se o asinase en papel.
  • 3. O TEMA LEGAL ๏ Directiva Europea 1998/93/CE ๏ Lei 59/2003 de sinatura electrónica ๏ Lei Orgánica 15/1999 de Protección de Datos de Carácter Persoal ๏ Real Decreto 1553/2005 ๏ Real Decreto 1586/2009
  • 4. QUÉ HAI NA TARXETIÑA
  • 5. O MICROCHIP Zona Pública Zona Privada Zona Segura ๏Certificado ๏Certificado de ๏Datos de ๏Certificado de ๏Fotografía público da CA que asinou o DNIe ๏Chaves DiffieHellman ๏Certificado para autenticar a tarxeta autenticación sinatura filiación ๏Sinatura manuscrita
  • 6. A CRIPTOGRAFÍA ๏Xeneración de chaves RSA ๏Xeneración de hashes SHA1 ๏Xeneración de sinaturas electrónicas ๏Intercambio de chaves ๏Cifrado 3DES CBC
  • 7. PKI • 4 AC • 3 asinan DNIs e outra únicamente AC RAIZ DNIE 22 29 f0 56 d3 4d 1c b6 3e 98 6f 26 b2 d0 8a b9 4f f0 8e 4d certifica as subordinadas AC DNIE 001 AC DNIE 02 AC DNIE 03 41 cf 9e c0 73 3d 58 e4 39 97 a6 c6 5d f7 97 c3 ee 99 40 7b 50 2b d0 07 8e 6d a2 35 c4 5f 52 1c 63 ef 54 9d f0 19 8f dd fb c0 71 d0 a4 81 11 bd df 77 76 d0 9e 42 bc 53 4e 24 48 70 • 2 CRL (Certificate Revocation List) • FNMT e Ministerio de Hacienda • Actualizadas como máximo cada 24 horas
  • 8. AUTENTICACIÓN •Establece unha canle segura entre cliente e servidor •Permite ao prestador do servizo asegurar que o usuario é quen di ser •O cidadán fai unha petición de conexión segura autenticada. •O organismo envía unha mensaxe autenticada. •Xenérase a chave de cifrado. •O cidadán valida a mensaxe de intercambio co seu certificado. •O o r g a n i s m o verifica a mensaxe.
  • 9. SINATURA •Garante a integridade e o non repudio en orixe. •Ten a mesma validez que a sinatura manuscrita 1. Realízase un hash do documento. 2. Cífrase o hash coa chave privada do cidadán. 3. O receptor valídao coa chave pública do emisor, facendo un hash e vendo que son iguais.
  • 10. ATAQUE •O DNIe ten a mala costume de solicitar o PIN incontables veces. •Os usuarios meten o PIN sempre que se solicita. Un software que cree unha ventana similar á de solicitude de PIN pode obter o mesmo e lanzar un proceso para interactuar co DNI lexítimamente