PKI Industry growth in Bangladesh

PKI Industry Growth in
Bangladesh
Al Faruq Ibna Nazim
Computer Services Ltd.
AGENDA
• PKI Glossary
• PKI Necessity
• PKI Basics
• PKI Services
• PKI in Bangladesh
• PKI Business in Bangladesh
• Advantages of Local PKI
• Limitation
PKI GLOSSARY
• Public Key Crypto – key pairs used to encrypt/decrypt or sign/verify
• Certificate – a digital method of binding a key pair or pairs to a
specific identity
• Certificate Authority – the system that securely creates the
certificates
• Public Key Infrastructure – the whole system of creating, issuing,
managing, utilizing and revoking certificates
PKI NECESSITY
Homer and Marge want to exchange data in a digital world.
There are Confidence and Trust Issues …
Internet
Intranet
Extranet
Homer Marge
PKI NECESSITY – CONFIDENCE & TRUST ISSUE
• In the Identity of an Individual or Application
AUTHENTICATION
• That the information will be kept Private
CONFIDENTIALITY
• That information cannot be Manipulated
INTEGRITY
• That information cannot be Disowned
NON-REPUDIATION
Internet
Intranet
Extranet
Homer Marge
PKI BASICS – OPERATION
Cryptography
It is the science of making the cost of acquiring or altering data greater
than the potential value gained.
Cryptosystem
It is a system that provides techniques for mangling a message into an
apparently intelligible form and than recovering it from the mangled
form.
Plaintext Encryption Decryption PlaintextCiphertext
Key Key
Hello World &$*£(“!273 Hello World
PKI BASICS – ALGORITHM
All cryptosystems are based only on three Cryptographic Algorithms:
MESSAGE DIGEST (MD2-4-5, SHA, SHA-1, …)
- Maps variable length plaintext into fixed length cipher text
- No key usage, computationally infeasible to recover the plaintext
SECRET KEY (Blowfish, DES, IDEA, RC2-4-5, Triple-DES, …)
- Encrypt and decrypt messages by using the same Secret Key
PUBLIC KEY (DSA, RSA, …)
- Encrypt and decrypt messages by using two different Keys: Public Key, Private Key
(coupled together)
PKI BASICS - Algorithms based on Private Key
Pros
• Efficient and fast Algorithm
• Simple model
- Provides Integrity, Confidentiality
Cons
• The same secret key must be shared by all the entities involved in the data exchange
• High risk
• It doesn’t scale (proliferation of secrets)
- No Authentication, Non-Repudiation
Plaintext Encryption Decryption PlaintextCiphertext
Private Key Private Key
PKI BASICS - Algorithms based on Public Key
Pros
• Private key is only known by the owner: less risk
• The algorithm ensures Integrity and Confidentiality by encrypting
with the Receiver’s Public key
Internet
Intranet
Extranet
Homer Marge
Plaintext Encryption Decryption PlaintextCiphertext
Homer’s Public Key Marge’s Private Key
PKI BASICS - Algorithms based on Public Key
Pros
• The algorithm ensures Non-Repudiation by encrypting with the
Sender’s Private key
Internet
Intranet
Extranet
Homer Marge
Plaintext Encryption Decryption PlaintextCiphertext
Homer’s Private Key Marge’s Public Key
PKI BASICS - Algorithms based on Public Key
Cons
• Algorithms are 100 – 1000 times slower than secret key ones
They are initially used in an initial phase of communication and then secrets keys
are generated to deal with encryptions
• How are Public keys made available to the other people?
• There is still a problem of Authentication!!!
Who ensures that the owner of a key pair is really the person whose real life
name is “Marge”?
Internet
Intranet
Extranet
Homer Marge
PKI BASICS – CERTIFICATE SIGNING & VERIFICATION
PKI SERVICES
• Secure Email – sign and/or encrypt messages
• Secure browsing – SSL – authentication and encryption
• Secure code – Authenticode
• Secure wireless – PEAP & EAP-TLS
• Secure documents – Rights Management
• Secure networks – segmentation via IPSEC, RPKI
• Secure files – Encrypted File System(EFS)
PKI IN BANGLADESH – ROOT CA
PKI service is regulated by the government body as
Office of the Controller of Certifying Authorities (CCA)
www.cca.gov.bd
Objectives
• Paperless Government Correspondence
• e-Government
• e-Procurement
• e-Commerce
• Electronic Document Signing
• Internet Banking using digital signature
• Device and Server Signing
• Preventing Cyber Crimes
Activities
• Controlling Activities of Certifying Authority (CA)
• Issuing, suspending and repealing CA license according to ICT Act 2006
(Amendment 2013) and ICT (CA) Rules 2010.
• Leading and Maintaining of Public Key Infrastructure (PKI) activities.
• Making Rules, guideline and regulation for PKI and controlling its
standard.
• Submitting investigation report before the Cyber Tribunal after
investigating Cyber crimes under ICT Act, 2006.
• Constituting Audit firm for auditing IT.
• Prescribing rate of Digital Signature Certificate according to IT (CA)
rules, 2010.
PKI IN BANGLADESH – MODEL
Issued by Sub-CA
Issued by Licensed CA
Accredited by CCA
Office of the CCA Root CA
Licensed CAs (Public/Private)
Sub CA
(Internal/External)
Subscribers
PKI IN BANGLADESH – Licensed CAs
 Mango Teleservices Ltd. (www.mangoca.com)
 Dohatec New Media. (www.dohatec-ca.com.bd)
 Data Edge Ltd. (www.dataedgeid.com)
 Banglaphone Ltd. (www.banglaphone.net.bd)
 Computer Services Ltd. (www.ca.computerservicesltd.com)
 Bangladesh Computer Council. (www.bcc.gov.bd)
PKI BUSINESS IN BANGLADESH
PKI BUSINESS IN BANGLADESH
Service Provided:
• SSL certificate for TT service & Foreign
Remittance
• Class 2 certificates
Purpose:
• Multifactor login from a dedicated system of
distant branch. Secure communication
channel between server & branch.
PKI BUSINESS IN BANGLADESH
Service Provided:
• SSL certificate
Purpose:
• To Secure communication channel between
server & client.
PKI BUSINESS IN BANGLADESH
Service Provided:
• SSL certificate
Purpose:
• Secure communication channel between
server & client.
PKI BUSINESS IN BANGLADESH
Service Provided:
• Class 2 certificates
Purpose
• Secure communication among 4 personnel of
finance team.
PKI BUSINESS IN BANGLADESH
Service Provided:
• Class 1 certificate
• Class 2 certificate
• Class 3 certificate
Purpose:
• Issuing digitally signed registration cards &
admit cards.
PKI BUSINESS IN BANGLADESH
Service Provided:
• Class 2 certificate
• Cryptographic hardware token
Purpose:
• Document authorization, to use in e-file
management system.
PKI BUSINESS IN BANGLADESH
Service Provided:
• Class 2 certificate
• SSL certificate
• Cryptographic hardware token
Purpose:
• Send & receive encrypted document within a
secure channel.
PKI BUSINESS IN BANGLADESH
Service Provide:
Class 2 certificate
SSL Certificate for JBGC
Cryptographic hardware token
Purpose:
Document authorization & secure
communication channel between server
& client.
PKI BUSINESS IN BANGLADESH
ADVANTAGES OF LOCAL PKI
• Local regulatory authorized.
• Local law governed for legal assistance.
• Accountability for service.
• Local currency exchange and remittance.
• Regulatory earning for government.
LIMITATION
The only limitation so far is Bangladesh is not recognized internationally
to PKI registry.
Internet Explorer, Chrome, Firefox, Opera etc. browsers recognition is
required.
International PKI forum association is required.
CONCLUSION
• For such technology progressive country we need data transaction
security & authenticity.
• For such services regulatory observation is highly required.
• Accountability for local organizations will allow client trust &
flexibility.
• Local financial transaction will allow local revenue earning &
government revenue.
QUESTIONS
alfaruq@bdpeer.com
???
Gratitude Declaration
Computer Services Ltd.
Data Edge Ltd.
Controller of Certifying Authority
1 of 31

Recommended

Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr... by
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
3.9K views23 slides
Video Steganography by
Video SteganographyVideo Steganography
Video SteganographyJames Ridgway
24.1K views74 slides
VIDEO STEGANOGRAPHY by
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYSHAJANA BASHEER
6K views28 slides
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018 by
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018QUANT
909 views31 slides
Open Day ITIS Castelli dicembre 2012 Dipartimento di Informatica e Telecomuni... by
Open Day ITIS Castelli dicembre 2012 Dipartimento di Informatica e Telecomuni...Open Day ITIS Castelli dicembre 2012 Dipartimento di Informatica e Telecomuni...
Open Day ITIS Castelli dicembre 2012 Dipartimento di Informatica e Telecomuni...Maurizio Cozzetto
4.7K views24 slides
Digital 2019 Democratic Republic of the Congo (January 2019) v01 by
Digital 2019 Democratic Republic of the Congo (January 2019) v01Digital 2019 Democratic Republic of the Congo (January 2019) v01
Digital 2019 Democratic Republic of the Congo (January 2019) v01DataReportal
7.4K views49 slides

More Related Content

Viewers also liked

Pki for dummies by
Pki for dummiesPki for dummies
Pki for dummiesAlex de Jong
15.7K views18 slides
Marco Casassa Mont: Pki overview by
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewInformation Security Awareness Group
2.7K views52 slides
Introduction To PKI Technology by
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
5.4K views192 slides
Case study of Bangladesh IPv6 deployment by
Case study of Bangladesh IPv6 deployment Case study of Bangladesh IPv6 deployment
Case study of Bangladesh IPv6 deployment Bangladesh Network Operators Group
1.1K views25 slides
Go with the Flow by
Go with the Flow Go with the Flow
Go with the Flow Bangladesh Network Operators Group
1.1K views27 slides

Viewers also liked(20)

Pki for dummies by Alex de Jong
Pki for dummiesPki for dummies
Pki for dummies
Alex de Jong15.7K views
Introduction To PKI Technology by Sylvain Maret
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret5.4K views

Similar to PKI Industry growth in Bangladesh

Public key infrastructure by
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
376 views12 slides
Digital certificates and information security by
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
3.4K views21 slides
XML Key Management Protocol for Secure Web Service by
XML Key Management Protocol for Secure Web ServiceXML Key Management Protocol for Secure Web Service
XML Key Management Protocol for Secure Web ServiceMd. Hasan Basri (Angel)
1.3K views17 slides
Cryptography by
CryptographyCryptography
CryptographyTanviGogri
140 views33 slides
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before by
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeDigiCert, Inc.
2.3K views57 slides
PKI & SSL by
PKI & SSLPKI & SSL
PKI & SSLRitaThakkar1
102 views17 slides

Similar to PKI Industry growth in Bangladesh(20)

Public key infrastructure by Aditya Nama
Public key infrastructurePublic key infrastructure
Public key infrastructure
Aditya Nama376 views
Digital certificates and information security by Devam Shah
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
Devam Shah3.4K views
Cryptography by TanviGogri
CryptographyCryptography
Cryptography
TanviGogri140 views
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before by DigiCert, Inc.
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
DigiCert, Inc.2.3K views
Secured qr code [Pankaj Jeswani and Team] by Pank Jes
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
Pank Jes3.6K views
Web authentication by Pradeep J V
Web authenticationWeb authentication
Web authentication
Pradeep J V614 views
Implementing Public-Key-Infrastructures by Oliver Pfaff
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff1.5K views
Certificate pinning in android applications by Arash Ramez
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez696 views
IWMW 2001: PKI: the View from Down Under by IWMW
IWMW 2001: PKI: the View from Down UnderIWMW 2001: PKI: the View from Down Under
IWMW 2001: PKI: the View from Down Under
IWMW 524 views
Digital signature & eSign overview by Rishi Pathak
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
Rishi Pathak1.5K views

More from Bangladesh Network Operators Group

IPv6 Deployment in South Asia 2022 by
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022Bangladesh Network Operators Group
43 views20 slides
Introduction to Software Defined Networking (SDN) by
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Bangladesh Network Operators Group
138 views27 slides
RPKI Deployment Status in Bangladesh by
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshBangladesh Network Operators Group
45 views21 slides
An Overview about open UDP Services by
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP ServicesBangladesh Network Operators Group
217 views15 slides
12 Years in DNS Security As a Defender by
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a DefenderBangladesh Network Operators Group
111 views21 slides
Contents Localization Initiatives to get better User Experience by
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
72 views31 slides

More from Bangladesh Network Operators Group(20)

Recently uploaded

Is Entireweb better than Google by
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Googlesebastianthomasbejan
12 views1 slide
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 views64 slides
Building trust in our information ecosystem: who do we trust in an emergency by
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
98 views18 slides
WEB 2.O TOOLS: Empowering education.pptx by
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 views16 slides
information by
informationinformation
informationkhelgishekhar
8 views4 slides
PORTFOLIO 1 (Bret Michael Pepito).pdf by
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
8 views6 slides

Recently uploaded(10)

Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 views
Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat98 views
PORTFOLIO 1 (Bret Michael Pepito).pdf by brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views
UiPath Document Understanding_Day 3.pptx by UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity103 views
IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC244 views

PKI Industry growth in Bangladesh

  • 1. PKI Industry Growth in Bangladesh Al Faruq Ibna Nazim Computer Services Ltd.
  • 2. AGENDA • PKI Glossary • PKI Necessity • PKI Basics • PKI Services • PKI in Bangladesh • PKI Business in Bangladesh • Advantages of Local PKI • Limitation
  • 3. PKI GLOSSARY • Public Key Crypto – key pairs used to encrypt/decrypt or sign/verify • Certificate – a digital method of binding a key pair or pairs to a specific identity • Certificate Authority – the system that securely creates the certificates • Public Key Infrastructure – the whole system of creating, issuing, managing, utilizing and revoking certificates
  • 4. PKI NECESSITY Homer and Marge want to exchange data in a digital world. There are Confidence and Trust Issues … Internet Intranet Extranet Homer Marge
  • 5. PKI NECESSITY – CONFIDENCE & TRUST ISSUE • In the Identity of an Individual or Application AUTHENTICATION • That the information will be kept Private CONFIDENTIALITY • That information cannot be Manipulated INTEGRITY • That information cannot be Disowned NON-REPUDIATION Internet Intranet Extranet Homer Marge
  • 6. PKI BASICS – OPERATION Cryptography It is the science of making the cost of acquiring or altering data greater than the potential value gained. Cryptosystem It is a system that provides techniques for mangling a message into an apparently intelligible form and than recovering it from the mangled form. Plaintext Encryption Decryption PlaintextCiphertext Key Key Hello World &$*£(“!273 Hello World
  • 7. PKI BASICS – ALGORITHM All cryptosystems are based only on three Cryptographic Algorithms: MESSAGE DIGEST (MD2-4-5, SHA, SHA-1, …) - Maps variable length plaintext into fixed length cipher text - No key usage, computationally infeasible to recover the plaintext SECRET KEY (Blowfish, DES, IDEA, RC2-4-5, Triple-DES, …) - Encrypt and decrypt messages by using the same Secret Key PUBLIC KEY (DSA, RSA, …) - Encrypt and decrypt messages by using two different Keys: Public Key, Private Key (coupled together)
  • 8. PKI BASICS - Algorithms based on Private Key Pros • Efficient and fast Algorithm • Simple model - Provides Integrity, Confidentiality Cons • The same secret key must be shared by all the entities involved in the data exchange • High risk • It doesn’t scale (proliferation of secrets) - No Authentication, Non-Repudiation Plaintext Encryption Decryption PlaintextCiphertext Private Key Private Key
  • 9. PKI BASICS - Algorithms based on Public Key Pros • Private key is only known by the owner: less risk • The algorithm ensures Integrity and Confidentiality by encrypting with the Receiver’s Public key Internet Intranet Extranet Homer Marge Plaintext Encryption Decryption PlaintextCiphertext Homer’s Public Key Marge’s Private Key
  • 10. PKI BASICS - Algorithms based on Public Key Pros • The algorithm ensures Non-Repudiation by encrypting with the Sender’s Private key Internet Intranet Extranet Homer Marge Plaintext Encryption Decryption PlaintextCiphertext Homer’s Private Key Marge’s Public Key
  • 11. PKI BASICS - Algorithms based on Public Key Cons • Algorithms are 100 – 1000 times slower than secret key ones They are initially used in an initial phase of communication and then secrets keys are generated to deal with encryptions • How are Public keys made available to the other people? • There is still a problem of Authentication!!! Who ensures that the owner of a key pair is really the person whose real life name is “Marge”? Internet Intranet Extranet Homer Marge
  • 12. PKI BASICS – CERTIFICATE SIGNING & VERIFICATION
  • 13. PKI SERVICES • Secure Email – sign and/or encrypt messages • Secure browsing – SSL – authentication and encryption • Secure code – Authenticode • Secure wireless – PEAP & EAP-TLS • Secure documents – Rights Management • Secure networks – segmentation via IPSEC, RPKI • Secure files – Encrypted File System(EFS)
  • 14. PKI IN BANGLADESH – ROOT CA PKI service is regulated by the government body as Office of the Controller of Certifying Authorities (CCA) www.cca.gov.bd Objectives • Paperless Government Correspondence • e-Government • e-Procurement • e-Commerce • Electronic Document Signing • Internet Banking using digital signature • Device and Server Signing • Preventing Cyber Crimes Activities • Controlling Activities of Certifying Authority (CA) • Issuing, suspending and repealing CA license according to ICT Act 2006 (Amendment 2013) and ICT (CA) Rules 2010. • Leading and Maintaining of Public Key Infrastructure (PKI) activities. • Making Rules, guideline and regulation for PKI and controlling its standard. • Submitting investigation report before the Cyber Tribunal after investigating Cyber crimes under ICT Act, 2006. • Constituting Audit firm for auditing IT. • Prescribing rate of Digital Signature Certificate according to IT (CA) rules, 2010.
  • 15. PKI IN BANGLADESH – MODEL Issued by Sub-CA Issued by Licensed CA Accredited by CCA Office of the CCA Root CA Licensed CAs (Public/Private) Sub CA (Internal/External) Subscribers
  • 16. PKI IN BANGLADESH – Licensed CAs  Mango Teleservices Ltd. (www.mangoca.com)  Dohatec New Media. (www.dohatec-ca.com.bd)  Data Edge Ltd. (www.dataedgeid.com)  Banglaphone Ltd. (www.banglaphone.net.bd)  Computer Services Ltd. (www.ca.computerservicesltd.com)  Bangladesh Computer Council. (www.bcc.gov.bd)
  • 17. PKI BUSINESS IN BANGLADESH
  • 18. PKI BUSINESS IN BANGLADESH Service Provided: • SSL certificate for TT service & Foreign Remittance • Class 2 certificates Purpose: • Multifactor login from a dedicated system of distant branch. Secure communication channel between server & branch.
  • 19. PKI BUSINESS IN BANGLADESH Service Provided: • SSL certificate Purpose: • To Secure communication channel between server & client.
  • 20. PKI BUSINESS IN BANGLADESH Service Provided: • SSL certificate Purpose: • Secure communication channel between server & client.
  • 21. PKI BUSINESS IN BANGLADESH Service Provided: • Class 2 certificates Purpose • Secure communication among 4 personnel of finance team.
  • 22. PKI BUSINESS IN BANGLADESH Service Provided: • Class 1 certificate • Class 2 certificate • Class 3 certificate Purpose: • Issuing digitally signed registration cards & admit cards.
  • 23. PKI BUSINESS IN BANGLADESH Service Provided: • Class 2 certificate • Cryptographic hardware token Purpose: • Document authorization, to use in e-file management system.
  • 24. PKI BUSINESS IN BANGLADESH Service Provided: • Class 2 certificate • SSL certificate • Cryptographic hardware token Purpose: • Send & receive encrypted document within a secure channel.
  • 25. PKI BUSINESS IN BANGLADESH Service Provide: Class 2 certificate SSL Certificate for JBGC Cryptographic hardware token Purpose: Document authorization & secure communication channel between server & client.
  • 26. PKI BUSINESS IN BANGLADESH
  • 27. ADVANTAGES OF LOCAL PKI • Local regulatory authorized. • Local law governed for legal assistance. • Accountability for service. • Local currency exchange and remittance. • Regulatory earning for government.
  • 28. LIMITATION The only limitation so far is Bangladesh is not recognized internationally to PKI registry. Internet Explorer, Chrome, Firefox, Opera etc. browsers recognition is required. International PKI forum association is required.
  • 29. CONCLUSION • For such technology progressive country we need data transaction security & authenticity. • For such services regulatory observation is highly required. • Accountability for local organizations will allow client trust & flexibility. • Local financial transaction will allow local revenue earning & government revenue.
  • 31. Gratitude Declaration Computer Services Ltd. Data Edge Ltd. Controller of Certifying Authority