SlideShare a Scribd company logo
Electronic Signature
석사 29기 박준영
Contents
• Definition
• PKI-Electronic Signature + MITM Attack
• Public Certificate
• Certificate Formats (Components)
• Certificate Authorities
• Improved Signing Procedure
• Non-repudiation Function
• Q & A
• Signature electronically
• Certificate one’s identity
• Equivalent to handwritten signatures
Definition
PKI E-Signature
• Hash(D1) => H1
• Encrypt(KeyE, H1) => S;
• C1 = {D1, S, KeyD}
• C1 => D1, S, KeyD;
• Decrypt(KeyD, S) => H1;
• Hash(D1) => H1;
• H1 == H1;
Alice Bob
PKI E-Signature (MITM)
• Hash(D1) => H1
• Encrypt(KeyE, H1) => S;
• C1 = {D1, S, KeyD}
• C2 => D2, S, KeyD;
• Decrypt(KeyD, S) => H1;
• Hash(D2) => H2;
• H1 != H2;
• C1 => D1, S, KeyD
• D1 => D2;
• C2 = {D2, S, KeyD}
• C1 => C2
Alice
Bob
Hacker
• C2 => D2, S2, FKeyD;
• Decrypt(FKeyD, S2) => H2;
• Hash(D2) => H2;
• H2 == H2;
PKI E-Signature (MITM)
• Hash(D1) => H1
• Encrypt(KeyE, H1) => S;
• C1 = {D1, S, KeyD}
• C1 => D1, S, KeyD
• D1 => D2;
• Hash(D2) => H2;
• Encrypt(FKeyE, H2) => S2;
• C2 = {D2, S2, FKeyD}
• C1 => C2
Hacker
Alice
Bob
Public Certificate
• Electronic ID Card
• Validate Electronic Signature
• Need 3-party Certification Authority(CA)
Public Certificate
PKCS#12 Format File(.p12)
Certificate + Private Key
Using when Import / Export
Public Certificate
(.der / .pem)
DER / PEM
DER : Binary formed cert.
PEM : Base64 encoded cert.
Private Key
Keep it Secret!!
Certificate Contents (X. 509)
• Key-Usage
• Public Key
• Thumbprint Algorithm
• Thumbprint
• Serial Number
• Subject
• Signature Algorithm
• Signature
• Issuer
• Valid-From
• Valid-To
Certificate Authorities
ROOT CA
ROOT CA
SUB CA
- Korea(For e-commerce)
Certificate Authorities
SSL Certificate Market Share (August 2014)
(http://www.whichssl.com/comparisons/market-share.html)
- World
Improved Signing Procedure
Hash data
⬇
Encrypt hashed data
(Signature)
⬇
Attach Certificate
with Signature & Data
⬇
Send via network
(D-Signed data)
”Digital Signature diagram" by Acdx
Improved Signing Procedure
”Digital Signature diagram" by Acdx
Receive D-Signed data
⬇
Detach Data & Signature
⬇
Check Certificate via CA
⬇
Compare Hashed Data
and Decrypted Data
⬇
Verify
Non-repudiation
Reference
• 네이버 애플리케이션의 전자 서명 원리(http://helloworld.naver.com/
helloworld/textyle/744920)
• SSL Certificate Market Share (http://www.whichssl.com/comparisons/
market-share.html)
• Solo, David, Russell Housley, and Warwick Ford. "Internet X. 509 public
key infrastructure certificate and certificate revocation list (CRL)
profile." (2002).
• Public Certificate Sample (Hana Bank Corp.)
• Digital Signature Diagram by Acdx (Wikipedia)
Electronic Signature
Q & A

More Related Content

What's hot (20)

Ds over
Ds overDs over
Ds over
 
Dsa & Digi Cert
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi Cert
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
 

Viewers also liked

Documento informatico: profili giuridici
Documento informatico: profili giuridiciDocumento informatico: profili giuridici
Documento informatico: profili giuridiciMichele Martoni
 
G01.2012 magic quadrant for user authentication
G01.2012 magic quadrant for user authenticationG01.2012 magic quadrant for user authentication
G01.2012 magic quadrant for user authenticationSatya Harish
 
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...Market Engel SAS
 
Electronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesElectronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesMichele Martoni
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentationbrettlieberman
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers Verbella CMG
 
What is documentation and its techniques
What is documentation and its techniquesWhat is documentation and its techniques
What is documentation and its techniquesSohail Sangi
 
Document Management System
Document Management SystemDocument Management System
Document Management SystemSidhartha Sahoo
 
Document Management With Workflow Presentation
Document Management With Workflow PresentationDocument Management With Workflow Presentation
Document Management With Workflow PresentationJohn Street
 
Principles of Documentation
Principles of  DocumentationPrinciples of  Documentation
Principles of DocumentationJEENA AEJY
 
Document Management System (DMS)
Document Management System (DMS)Document Management System (DMS)
Document Management System (DMS)Hiran Wickramainghe
 
Electronic document management perspectives
Electronic document management perspectivesElectronic document management perspectives
Electronic document management perspectivesSociusPartner
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practicePharmaceutical
 

Viewers also liked (17)

PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
 
Documento informatico: profili giuridici
Documento informatico: profili giuridiciDocumento informatico: profili giuridici
Documento informatico: profili giuridici
 
G01.2012 magic quadrant for user authentication
G01.2012 magic quadrant for user authenticationG01.2012 magic quadrant for user authentication
G01.2012 magic quadrant for user authentication
 
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
 
Electronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesElectronic Document & Electronic Signatures
Electronic Document & Electronic Signatures
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentation
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers
 
What is documentation and its techniques
What is documentation and its techniquesWhat is documentation and its techniques
What is documentation and its techniques
 
Documentation Types
Documentation TypesDocumentation Types
Documentation Types
 
Document Management System
Document Management SystemDocument Management System
Document Management System
 
Document Management With Workflow Presentation
Document Management With Workflow PresentationDocument Management With Workflow Presentation
Document Management With Workflow Presentation
 
Principles of Documentation
Principles of  DocumentationPrinciples of  Documentation
Principles of Documentation
 
Document Management System (DMS)
Document Management System (DMS)Document Management System (DMS)
Document Management System (DMS)
 
Electronic document management perspectives
Electronic document management perspectivesElectronic document management perspectives
Electronic document management perspectives
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practice
 

Similar to Electronic Signature

Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security BasicsBipin Jethwani
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Us 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychainUs 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychainAlex Radocea
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...IJCSIS Research Publications
 
Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101Gary Jan
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
Django SEM
Django SEMDjango SEM
Django SEMGandi24
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFiText Group nv
 
Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)Netwax Lab
 
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...Quentin Adam
 
A 5 security x line platform
A 5 security x line platformA 5 security x line platform
A 5 security x line platformLINE Corporation
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3Tutun Juhana
 

Similar to Electronic Signature (20)

Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security Basics
 
[Note]x509
[Note]x509[Note]x509
[Note]x509
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Us 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychainUs 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychain
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
 
Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Django SEM
Django SEMDjango SEM
Django SEM
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
Public Key Infrastructure
Public Key Infrastructure Public Key Infrastructure
Public Key Infrastructure
 
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
Remove centralization on Authorization - API Days Paris 2018 (announcement fo...
 
A 5 security x line platform
A 5 security x line platformA 5 security x line platform
A 5 security x line platform
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 

More from Joon Young Park

MoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch SensorsMoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch SensorsJoon Young Park
 
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious ChargersMACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious ChargersJoon Young Park
 
Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...Joon Young Park
 
Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)Joon Young Park
 
Delegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTDelegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTJoon Young Park
 
Lithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of ThingsLithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of ThingsJoon Young Park
 
Internet of secure things
Internet of secure thingsInternet of secure things
Internet of secure thingsJoon Young Park
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksJoon Young Park
 
License Plate Recognition
License Plate RecognitionLicense Plate Recognition
License Plate RecognitionJoon Young Park
 

More from Joon Young Park (18)

WheelLogger_WISA
WheelLogger_WISAWheelLogger_WISA
WheelLogger_WISA
 
Power spy
Power spyPower spy
Power spy
 
MoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch SensorsMoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch Sensors
 
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious ChargersMACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
 
Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...
 
Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)
 
Delegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTDelegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoT
 
Lithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of ThingsLithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of Things
 
Internet of secure things
Internet of secure thingsInternet of secure things
Internet of secure things
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
MiTumb
MiTumbMiTumb
MiTumb
 
Linux Remote Connection
Linux Remote ConnectionLinux Remote Connection
Linux Remote Connection
 
License Plate Recognition
License Plate RecognitionLicense Plate Recognition
License Plate Recognition
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
DDD
DDDDDD
DDD
 
Baas.io
Baas.ioBaas.io
Baas.io
 
LBSNS Flatform Business
LBSNS Flatform BusinessLBSNS Flatform Business
LBSNS Flatform Business
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Electronic Signature

  • 2. Contents • Definition • PKI-Electronic Signature + MITM Attack • Public Certificate • Certificate Formats (Components) • Certificate Authorities • Improved Signing Procedure • Non-repudiation Function • Q & A
  • 3. • Signature electronically • Certificate one’s identity • Equivalent to handwritten signatures Definition
  • 4. PKI E-Signature • Hash(D1) => H1 • Encrypt(KeyE, H1) => S; • C1 = {D1, S, KeyD} • C1 => D1, S, KeyD; • Decrypt(KeyD, S) => H1; • Hash(D1) => H1; • H1 == H1; Alice Bob
  • 5. PKI E-Signature (MITM) • Hash(D1) => H1 • Encrypt(KeyE, H1) => S; • C1 = {D1, S, KeyD} • C2 => D2, S, KeyD; • Decrypt(KeyD, S) => H1; • Hash(D2) => H2; • H1 != H2; • C1 => D1, S, KeyD • D1 => D2; • C2 = {D2, S, KeyD} • C1 => C2 Alice Bob Hacker
  • 6. • C2 => D2, S2, FKeyD; • Decrypt(FKeyD, S2) => H2; • Hash(D2) => H2; • H2 == H2; PKI E-Signature (MITM) • Hash(D1) => H1 • Encrypt(KeyE, H1) => S; • C1 = {D1, S, KeyD} • C1 => D1, S, KeyD • D1 => D2; • Hash(D2) => H2; • Encrypt(FKeyE, H2) => S2; • C2 = {D2, S2, FKeyD} • C1 => C2 Hacker Alice Bob
  • 7. Public Certificate • Electronic ID Card • Validate Electronic Signature • Need 3-party Certification Authority(CA)
  • 8. Public Certificate PKCS#12 Format File(.p12) Certificate + Private Key Using when Import / Export Public Certificate (.der / .pem) DER / PEM DER : Binary formed cert. PEM : Base64 encoded cert. Private Key Keep it Secret!!
  • 9. Certificate Contents (X. 509) • Key-Usage • Public Key • Thumbprint Algorithm • Thumbprint • Serial Number • Subject • Signature Algorithm • Signature • Issuer • Valid-From • Valid-To
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Certificate Authorities ROOT CA ROOT CA SUB CA - Korea(For e-commerce)
  • 15. Certificate Authorities SSL Certificate Market Share (August 2014) (http://www.whichssl.com/comparisons/market-share.html) - World
  • 16. Improved Signing Procedure Hash data ⬇ Encrypt hashed data (Signature) ⬇ Attach Certificate with Signature & Data ⬇ Send via network (D-Signed data) ”Digital Signature diagram" by Acdx
  • 17. Improved Signing Procedure ”Digital Signature diagram" by Acdx Receive D-Signed data ⬇ Detach Data & Signature ⬇ Check Certificate via CA ⬇ Compare Hashed Data and Decrypted Data ⬇ Verify
  • 19. Reference • 네이버 애플리케이션의 전자 서명 원리(http://helloworld.naver.com/ helloworld/textyle/744920) • SSL Certificate Market Share (http://www.whichssl.com/comparisons/ market-share.html) • Solo, David, Russell Housley, and Warwick Ford. "Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile." (2002). • Public Certificate Sample (Hana Bank Corp.) • Digital Signature Diagram by Acdx (Wikipedia)