180 likes | 352 Views
Challenges in Electronic Signatures and Certification Services ITU/BDT Arab Regional Workshop on “e-Services Policies” Damascus, Syria 27-29 April 2004. Alexander NTOKO Chief, E-Strategies Unit ITU Telecommunication Development Bureau (BDT). Overview of Digital Signature.
E N D
Challenges in Electronic Signatures and Certification ServicesITU/BDT Arab Regional Workshop on “e-Services Policies”Damascus, Syria 27-29 April 2004 Alexander NTOKO Chief, E-Strategies Unit ITU Telecommunication Development Bureau (BDT)
Overview of Digital Signature Signer’s Private Key Encrypted Digest Digest Signed Document Hash Algorithm Remember, a digital signature involves services provided by Certificate Authority (CA)
Verifying the Digital Signaturefor Authentication and Integrity ? Digest Hash Algorithm Digest Signer’s Public Key And so does the process of verifying the validity of a digital signature
General Overview of Some Digital Signature and Certificate Authority Challenges • Technology and Standards • Application and Multi-vendor interoperability • Key Length and Encryption algorithms • Content Non-Repudiation and Time stamps • Policies and Legislative • CA-CA Policy-level Interoperability • PKI Domains, Jurisdictions and Accreditation • Roles of Public and Private Sector • E-signature Legislation and Technology Neutrality – Finding the right balance between being technology neutral and enforcing legislation. • Acquisition, Capacity & Business Models • Building Local Capacity • Business Case for CA Infrastructure • Liabilities and Risk assessment/management
Challenges for e-Signatures and Certification Authorities are Intricately linked. Focus on: • Acceptance of Digital Signature Across Multi-Jurisdictional PKI Domains. • Policies for Generic Identity Certificates. • Public Key Infrastructure (PKI) Domains. • CA-CA Inter-Domain Interoperability. • Relationship between Attribute Certificates and Generic Identity Certificates.
Some Initiatives for Addressing CA-CA Inter Domain Interoperability Issues…
Cross Certification • A CA issues a certificate to another CA. This is applied to Strict Hierarchy (Root CAs) • Establishment of Trust Relationship between CAs (Chain of Trust). • Could result in Trust Cascades (A>B and B>C should not imply A>C). • Trust relationship could be Mutual (Horizontal Trust relationship) or Unilateral (Vertical Trust relationship – Root CAs).
Bridge Certificate Authority • A CA acts as a bridge between CAs in different PKI domains. • Each CA establishes a Trust Relationship with the Bridge CA. • The absence of direct relationships between CAs avoids overheads related to the establishment of direct trust relationships between co-operating CAs.
Cross Recognition • No trust relationship on cross certification between CAs. • Requires a mutually trusted and recognized third party. • CA-CA Interoperability is achieved through the licensing or auditing by a mutually agreed authority.
Accreditation Certificate • A combination of cross-certification and cross recognition. • Involves the creation of an accreditation CA. • Public Key of each CA is signed by accreditation CA. • Used in Australia in the Gatekeeper Accreditation CA. • Requires high level government structure and control to create hierarchy (e.g., government-wide PKI).
Certificate Policy – Playsan important role in the implementation of some of these initiatives • Certificate Policy (CP) – A Named set of rules that indicate the applicability of a certificate to a particular community and/or class of applications of common security requirements.
ITU-T X509: CA-CA Policy Interoperability Policy Mappings Extension Allows a certification authority to indicate that certain policies in its own domain can be considered equivalent to certain other policies in the subject certification authority's domain.
ITU-T X.509: PreventingTrust Cascades Policy Constraints extension Ability for a certification authority to require that explicit certificate policy indications be present in all subsequent certificates in a certification path. Ability for a certification authority to disable policy mapping by subsequent certification authorities in a certification path.
What could be the Role of Governments? • Getting Involved in the Management of Public Internet Resources. • Internet Protocol Addresses • Domain Names (under ccTLDs) • Elaborating Policies and Legislation for the Management of Digital Identities and CAs. • Accreditation of Certification Authorities • Control and Enforcement Mechanisms • Play central role in the management of generic identities (e.g. digital Ids and Passports).
What is ITU-D doing in this Domain? • ITU-D IsAP Programme 3 • Policies:Addressing National/Regional Policies for e-Trust and public Internet resources (e.g., Azerbaijan, Cameroon, Georgia and Mongolia). • Projects:Projects on PKI (CA and RA) and PKI-enabled Applications (Africa, Asia, Latin America and Europe). • Training:Building Human Capacity in e-Security (e.g., Latin America and Pakistan). • Environment:Assistance in Legal Issues for E-Applications and in establishing an Enabling Regulatory Framework (e.g., Latin America, Cape Verde, Mongolia and Burkina Faso).
World e-Trust MoU Multi-Lateral And Inclusive Framework Self-Regulatory & Self-Funding Structure Technology Neutral/Independent Environment Platform for Partnerships in E-Services
Thank You for your attention For further information Web: http://www.itu.int/ITU-D/e-strategy Email: e-strategy@itu.int