NATIONAL ELECTRONIC CONVEYANCING OFFICE

17
NATIONAL ELECTRONIC CONVEYANCING OFFICE SECURITY OF DIGITAL SIGNATURES Drew Andison 1 AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE (AGIMO) 1

description

NATIONAL ELECTRONIC CONVEYANCING OFFICE. 1. SECURITY OF DIGITAL SIGNATURES Drew Andison. AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE (AGIMO). Identifies certificate format. Identifies this certificate. Algorithm used to sign certificate. Issuer’s signature. Version Serial number - PowerPoint PPT Presentation

Transcript of NATIONAL ELECTRONIC CONVEYANCING OFFICE

Page 1: NATIONAL ELECTRONIC CONVEYANCING OFFICE

NATIONAL ELECTRONIC CONVEYANCING OFFICE

SECURITY OF DIGITAL SIGNATURES

Drew Andison

1

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE (AGIMO)

1

Page 2: NATIONAL ELECTRONIC CONVEYANCING OFFICE

DIGITAL CERTIFICATE

Issuer’s signature

Version

Serial number

Signature algorithm

Issuer name

Validity period

Subject name

Subject public key

Identifies certificate format Identifies this certificate

Name of Certification

Authority

Identifies the owner of the key

pair

Ensures cert. Data can’t be

changed

Public key value and indicator of its

algorithm

Start date and end

date

Algorithm used to sign

certificate

2

Page 3: NATIONAL ELECTRONIC CONVEYANCING OFFICE

DIGITAL SIGNATURES

• A digital signature functions for electronic documents like a handwritten signature does for printed documents.

• Digital Signatures enable "authentication" of digital messages, assuring the recipient of a digital message of both the identity of the sender and the integrity of the message

• Digital Signatures can also support confidentiality (through encryption) and non-repudiation

• See http://en.wikipedia.org/wiki/Digital_signature

33

Page 4: NATIONAL ELECTRONIC CONVEYANCING OFFICE

DIGITAL SIGNATURES4

Page 5: NATIONAL ELECTRONIC CONVEYANCING OFFICE

DEFENCE SIGNALS DIRECTORATESEE http://www.dsd.gov.au/_lib/pdf_doc/ism/ISM_Sep09_rev1.pdf The approved hashing algorithms are:• Secure Hashing Algorithm 1 (i.e. SHA-1), and• Secure Hashing Algorithm 2 (i.e. SHA-224, SHA-256, SHA-384 and SHA-512).The approved asymmetric/public key algorithms are:• Diffie-Hellman (DH) for agreeing on encryption session keys• Digital Signature Algorithm (DSA) for digital signatures• Elliptic Curve Diffie-Hellman (ECDH) for agreeing on encryption session keys• Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signatures, and• Rivest-Shamir-Adleman (RSA) for digital signatures and passing encryption

session keys or similar keys.

Most common applications use SHA-1 with RSA

5

Page 6: NATIONAL ELECTRONIC CONVEYANCING OFFICE

KEY SECURITYSTATE OF PLAY

• Private Key Security is the Subscriber’s responsibility

• CA’s require Subscribers to sign legal agreements that impose security obligations

• There are no specific standards • reasonableness test

• Subscribers in effect required to set own security standards

6

Page 7: NATIONAL ELECTRONIC CONVEYANCING OFFICE

GATEKEEPER & KEY SECURITY

• Gatekeeper cannot impose key security practices on end-users

• Gatekeeper operates indirectly through accredited Certification Authorities• their CPs must contain statements on key security

consistent with Core Obligations Policy• Also make explicit in Subscriber Agreements

• CAs cannot really enforce the right behaviour• Once keys and certificates are issued control is

effectively lost

7

Page 8: NATIONAL ELECTRONIC CONVEYANCING OFFICE

GATEKEEPER & KEY SECURITY8

Core Obligations PolicyA Subscriber (Certificate Holder) MUST• Only use Keys and Digital Certificates within the

limits specified in the CP under which the Digital Certificate was issued;

• Take all reasonable measures to protect their Private Key(s) from compromise and take all necessary precautions to prevent loss, disclosure, modification, or unauthorised use of their Private Key(s);

• Promptly notify the CA in the event that they consider or suspect there has been a compromise of their Private Keys

Page 9: NATIONAL ELECTRONIC CONVEYANCING OFFICE

KEY SECURITY GUIDANCE

European Unionhttp://docs.google.com/viewer?

a=v&q=cache:VfEfEg9Iy3sJ:www.eugridpma.org/guidelines/pkp/pk-protection-1.0-20091016.pdf+EU+end+user+storage+of+keys+and+ertificates&hl=en&gl=au&pid=bl&srcid=ADGEESgewwRLYKBIjwGX2GPc68a0RGXhajd8uYqmOs1jbOcqg_f8lTWSQ31raK7k1-GMcEND96EWzdBVNr0FVwWj8q8AdrWKPEWEs7hKxP2a7atTYnA3wtIdd6IN_29Uab-yvDskN9JH&sig=AHIEtbRC8DTYtm9uFYfQxXKQUi93SBhEgA

United Stateshttp://www.idmanagement.gov/fpkipa/documents/CommonPolicy.pdf http://www.abanet.org/scitech/ec/isc/pag/pag.html - see Section D.5.1.3

Physical Security Controls for Subscribers

9

Page 10: NATIONAL ELECTRONIC CONVEYANCING OFFICE

UTAH DIGITAL SIGNATURE ACT (1995)

46-3-303 Control of the private key. (1) By accepting a certificate issued by a licensed

certification authority, the subscriber identified in the certificate assumes a duty to exercise reasonable care in retaining control of the private key and keeping it confidential.

10

Page 11: NATIONAL ELECTRONIC CONVEYANCING OFFICE

IDENTRUST - Access Certificates for

Electronic Services

https://secure.identrust.com/certificates/policy/aces/revised_aces_cp_v20040506_1.pdf

The responsibilities of each applicant for an ACES Certificate are to:

• ……take reasonable precautions to prevent any compromise, modification, loss, disclosure, or unauthorized use of the private key;

11

Page 12: NATIONAL ELECTRONIC CONVEYANCING OFFICE

IDENTRUST SERVICES - ECA CERTIFICATE SUBSCRIBER AGREEMENT By requesting an ECA Certificate from IdenTrust, You:

b) State that You have kept and You will keep Your Private Key(s) private and that You will safeguard and maintain Your Private Key(s) (and any user IDs, passphrases, passwords or PINs used to activate Your Private Key(s)) in strict secrecy and take reasonable security measures to prevent unauthorized access to, or disclosure, loss, modification, compromise, or use of, Your Private Key(s) and the computer system or media on which Your Private Key(s) are stored;

12

Page 13: NATIONAL ELECTRONIC CONVEYANCING OFFICE

VeriSign Australia – Gatekeeper ABN-DSC Subscriber Agreement

Organisations must through an Authorised Officer:(a) ensure that their Key Holders comply with their obligations under this

CP and the CPS;(b) provide measures to avoid Compromise of their Key Holder’s Private

Keys;(c) immediately notify the VeriSign CA when the Organisation becomes

aware that a Key Holder’s Private Key has been Compromised, or there is a substantial risk of Compromise;

Key Holders must:(a) ensure that their Private Keys are not Compromised;(b) immediately notify the Organisation if they become aware that their

Private Key has been Compromised, or there is a substantial risk of Compromise

13

Page 14: NATIONAL ELECTRONIC CONVEYANCING OFFICE

OFFICE OF THE FEDERAL PRIVACY COMMISSIONER – PKI GUIDELINES

A significant privacy concern in relation to use of PKI is the security of the private key. The integrity of a PKI depends on the subscriber keeping the private key inaccessible to any other party.

Digital certificates and their corresponding key pairs can be stored in a number of ways – on dedicated tokens such as smart cards or directly on computer disk drives. Each storage method has a set of benefits and deficiencies. The choice of particular storage solutions is a matter for each agency in planning its PKI implementation and for clients in reaching a conclusion about using a particular digital certificate. Gatekeeper does not specify particular storage devices, nor does it make any judgment on the merits of any particular storage method.

14

Page 15: NATIONAL ELECTRONIC CONVEYANCING OFFICE

KEY SECURITY - US GUIDANCESubscribers locate their workstation in an area reasonably secure from

tampering by unauthorized personnel.Passwords and PINs should be memorized and not be written down; if a

password or PIN needs to be written down it should be stored in a locked file cabinet or container accessible only to designated personnel.

A private key stored on any unsecured medium, such a diskette, it should be stored in a locked file cabinet, secured digital archive, or locked container.

Subscribers should not leave their workstations unattended when cryptography is in an unlocked state (i.e., when the PIN or password has been entered). A workstation that contains private keys encrypted on a hard drive should be physically and logically secured or protected with an appropriate access control product.

Cryptographic tokens should be protected by holders to an extent comparable with that of valuable personal items such as credit cards or drivers’ licenses.

Documents, diskettes, or other items containing PINs or passwords should be disposed of in a manner that does not compromise the confidentiality of the sensitive data.

15

Page 16: NATIONAL ELECTRONIC CONVEYANCING OFFICE

KEY SECURITY ISSUES• SOFT CERTIFICATES VS TOKENS (SMARTCARDS, USB)

• FIREWALLS – EPL

• ANTI-VIRUS SOFTWARE - EPL

• PASSWORD STRENGTH - ISM

• USE OF BIOMETRICS – ACCESS CONTROL

ETC

16

Page 17: NATIONAL ELECTRONIC CONVEYANCING OFFICE

Thank You

QUESTIONS???

17