250 likes | 642 Views
E-Procurement: Digital Signatures and Role of Certifying Authorities. Jagdeep S. Kochar CEO, (n)Code Solutions. E-Procurement in India. Central Government State Governments: Andhra, Karnataka, Gujarat Public Sector Units Some Organizations: NIC for Central Government DGS&D
E N D
E-Procurement:Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions
E-Procurement in India • Central Government • State Governments: Andhra, Karnataka, Gujarat • Public Sector Units • Some Organizations: • NIC for Central Government • DGS&D • Northern Railway • IFFCO • GNFC
The ‘PAIN’ of Online Transactions (I)ntegrity (P)rivacy / Confidentiality Modification Interception Has my communication been altered? Is my communication private? (A)uthentication (N)on-repudiation ? Claims NotSent NotReceived Fabrication Who am I dealing with? Who sent/received it and when?
Where do Digital Signatures come in? • Passwords are a weak method of authentication • Passwords donot ensure integrity • Passwords can be broken, guessed, leaked, extracted, etc. • A Digital Signature can not be duplicated, guessed, broken, etc. • No legal protection for disputes in case of other authentication methods In short ; Digital Signatures are an effective remedy against ‘PAIN’ of e-Transactions
Where does buyer use PKI ? • Secure Login • Tender floating • Corrigendum • Secure communications with vendors • Tender opening • Clarifications and negotiations • Digitally signed PO/WO • Digitally Signed Archives
Where does Vendor use PKI ? • Secure Login • Secure storage of content • Tender submission • Encryption using buyer’s public key • Clarifications and negotiations
Electronic Data Electronic Data Hash Function Digital Signature Signing Function Hash Result Private of A Digital Signing of the Data Signed Data Only Private Key holder can sign
Electronic Data Hash Function Hash Result Hash Result Digital Signature Verify Function Public of A Digital Signature Verification So the receiver can compare hashes to verify the signature Valid compare Yes / No ? Signed Data Anyone can verify
Digital Signature & the Law • The IT Act 2000 provides : • Legal and regulatory framework for promotion of e-Commerce and e-Governance • Legal validity for Electronic transactions / contracts and records • For appointment of Certifying Authorities to issue Digital Certificates • The legal framework for electronic filing of documents • For prevention of computer crime, forgery, falsification of identity in e-Commerce transactions
Structure of PKI in India CCA India / ROOT CA ( Ministry of Information Technology ) Licensed Certifying Authority Licensed Certifying Authority Licensed Certifying Authority Subscriber Subscriber Subscriber
Relying Party Application Registration Authority Web Server Internet Repository Certification Authority Certificate Holder Components of PKI • Certification Authorities (CAs) (Issuers) • Registration Authorities (RAs)(Authorize the binding between Public Key & Certificate Holder) • Certificate Holders (Subscribers) • Relying Parties (Validate signatures & certificate paths) • Repositories (Store & distribute certificates & status: expired, revoked, etc.)
Functions of a Certifying Authority • Trusted Third Party • Digital Certificates • Registration and Issuance • Revocation • Maintain • Provide Certificate Revocation Lists • Provide Support
Expectations of a CA • Education and evangelism • Support issues: Support vendors on Certificates and application • 11th hour delivery of Certificates to users • PKI enablement of application
How can a CA add value • Secure Issuance of Digital Certificates • RA / LRA obligations to the CA • Verification of the users/documents • Provide the highest class / high assurance certificates • Provide consulting for secure application design
How can a CA add value (cont.) • SSL enabled site • Secure Application Design: • Digitally signed content at the client end • Digitally signed / encrypted content during data transfer • Data integrity / confidentiality to be taken care of during • changing data by vendor / buyer • Transfer of data from client/server • Storage of data at the server
Types of certificates • Email Signing certificates • ( Popularly known as Class I Certificates ) • Document / Component signing certificates without personal verification • (Popularly known as Class II Certificates ) • Document / Component signing certificates with personal verification • (Popularly known as Class III Certificates )
Which certificate should be used ? • The IT Act Guidelines for CA quotes : • Class 3 Certificate: • This certificate will be issued to individuals as well as organizations. As these are high assurance certificates, primarily intended for e-commerce applications, they shall be issued to individuals only on their personal (physical) appearance before the Certifying Authorities.
Why Class 3 ? • The biggest frauds have been based on documents. • If the banks had opened DMAT accounts on the basis of personal presence the recent IPO scam could have been averted. • A Class 3 asks for the physical appearance at the CA offices. • This reduces the chances of identity frauds
Why use an e-Token ? • Amendment to the IT Act 2000 • G.S.R. 735(E) dated 29th October, 2004 • A secure digital signature shall be deemed to be secure for the purpose of the ACT if a cryptographic smartcard / token is used to create the key pair and the key pair remains the in the cryptographic token / Smartcard.
Case Studies • IFFCO • Northern Railway • Govt. of Gujarat • KSPHC • How (n)Code helped e-procurement succeed
Thank you Jagdeep S Kochar jskochar@ncodesolutions.com