SlideShare a Scribd company logo
Elektroniskā paraksta integrācija informācijas sistēmāsPamatjēdzieni
Saturs Parakstīšana Šifrēšana Publiskās atslēgas infrastruktūra (PKI) Elektronisko dokumentu likums
Parakstīšana  Lasītāji (daudzi) Parakstītājs (Alise)  Ceļā Slepenā atslēga Publiskā atslēga Publiskā atslēga 2929A8C02C Asimetriskais šifrēšanas algoritms 2929A8C02C Asimetriskais šifrēšanas algoritms Sakrīt? Hash algo 2929A8C02C F(&#)&(&?MF Mēs neuzbruksim! Mēs neuzbruksim! Hash algo Mēs neuzbruksim! Ziņojums un paraksts
Demo Parakstīšana
Sertifikāta izvēle (lietotājs izvēlas) Lietots sertifikātu direktorijs «Personal» Apskatīti tikai lietotāja sertifikāti         private X509Certificate2 GetCertificate()        {            X509Certificate2 result = null;            X509Store store = new X509Store(StoreName.My, StoreLocation.CurrentUser);            try            {                store.Open(OpenFlags.ReadOnly);                X509Certificate2Collection selectedCertificates = X509Certificate2UI.SelectFromCollection(                    store.Certificates, "Sertifikātu izvēle", "Izvēlieties sertifikātu", X509SelectionFlag.SingleSelection);                if (selectedCertificates.Count == 1)                {                    result = selectedCertificates[0];                }            }            finally { store.Close(); }            return result;        }
Dokumenta parakstīšana FileInfo objekts, kas norāda uz parakstāmo failu             //sign document by calculating hash and then encrypting it            byte[] signature = null;byte[] hash = new SHA1Managed().ComputeHash(documentInfo.OpenRead());            using (RSACryptoServiceProvider cryptoProvider = GetPrivateKey(signingCertificate))            {                signature = cryptoProvider.SignHash(hash, CryptoConfig.MapNameToOID("SHA1"));            }         private RSACryptoServiceProvider GetPrivateKey(X509Certificate2 signerCert)        {            RSACryptoServiceProvider rsa = signerCert.PrivateKey as RSACryptoServiceProvider;            if (rsa == null)                throw new ArgumentNullException("Certificate with key not supplied or key is not RSA");            if (rsa.CspKeyContainerInfo.ProviderName == "Gemplus GemSAFE Card CSP")            {                // when private key on the GemSafe device, we need to construct                // a new rsa provider using information from the provider.                // this extracts more precise information from the hardware.                CspKeyContainerInfo containerInfo = rsa.CspKeyContainerInfo;                CspParameters csp = new CspParameters(containerInfo.ProviderType, containerInfo.ProviderName, containerInfo.UniqueKeyContainerName);                csp.KeyNumber = (int)KeyNumber.Signature; //existing signature key will be used from appropriate container in SSCD                return new RSACryptoServiceProvider(csp);            }            else            {                return rsa;            }        } X509Certificate2 objekts, kurā iepriekš izvēlētais parakstīšanas sertifikāts Piekļuve atslēgai e-me kartes gadījumā
Parakstīšana Pieeja: ,[object Object]
Nodrošina apskati visiem interesentiem
Drošība atkarība no:
Hash drošības (kolīziju neiespējamības)
Asimetriskā algoritma drošības,[object Object]
PKCS#7
XML Dsig – Open Office XML formāti
XAdES (BES, T, C, …) – eDoc, digiDoc
PDF Native
PAdES
…,[object Object]
Atsaukšana kā visu publiskās atslēgas saņēmēju apzvanīšana,[object Object]
Publiskās atslēgas izplatīšana Alise No - Līdz LKHSF)(Q)*# Publiskā atslēga Sertifikāta pieprasījums Paraksts ar LVRTC slepeno atslēgu Sertifikāts Alise F(&#)&(&?MF Paraksts ar slepeno atslēgu Publiskā atslēga
Publiskās atslēgas izplatīšana Publicē jaunu atsaukto atslēgu sarakstu  Uzticama trešā puse (LVRTC) 1: Bobs 2: Džons 3: Alise LAHF*(#KHA LVRTC slepenā atslēga Informē, ka slepenā atslēga atklāta Paraksts ar LVRTC slepeno atslēgu  Lasītāji (daudzi) Parakstītājs (Alise) Noskaidro atsaukto atslēgu sarakstu, pārbaudot parakstu LVRTC publiskā atslēga Slepenā atslēga Publiskā atslēga
Publiskās atslēgas izplatīšana 1: Bobs 2: Džons 3: Alise LAHF*(#KHA LVRTC slepenā atslēga Paraksts ar LVRTC slepeno atslēgu CertificateRevocationList
Droša atslēgu izplatīšana/atsaukšana Uzticama trešā puse: ,[object Object]
Publiskās atslēgas izplatīšana
Publiskās atslēgas centralizēta atsaukšana,[object Object]
nodrošina parakstītāja personas identifikāciju
radīts ar drošiem elektroniskā paraksta radīšanas līdzekļiem
saistīts ar elektronisko dokumentu tā, lai vēlākas izmaiņas šajā dokumentā būtu pamanāmas

More Related Content

Featured

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

PKI pamatjēdzieni: kriptogrāfija, publiskās atslēgas, infrastruktūra, EDL

  • 1. Elektroniskā paraksta integrācija informācijas sistēmāsPamatjēdzieni
  • 2. Saturs Parakstīšana Šifrēšana Publiskās atslēgas infrastruktūra (PKI) Elektronisko dokumentu likums
  • 3. Parakstīšana Lasītāji (daudzi) Parakstītājs (Alise) Ceļā Slepenā atslēga Publiskā atslēga Publiskā atslēga 2929A8C02C Asimetriskais šifrēšanas algoritms 2929A8C02C Asimetriskais šifrēšanas algoritms Sakrīt? Hash algo 2929A8C02C F(&#)&(&?MF Mēs neuzbruksim! Mēs neuzbruksim! Hash algo Mēs neuzbruksim! Ziņojums un paraksts
  • 5. Sertifikāta izvēle (lietotājs izvēlas) Lietots sertifikātu direktorijs «Personal» Apskatīti tikai lietotāja sertifikāti         private X509Certificate2 GetCertificate()        {            X509Certificate2 result = null;            X509Store store = new X509Store(StoreName.My, StoreLocation.CurrentUser);            try            {                store.Open(OpenFlags.ReadOnly);                X509Certificate2Collection selectedCertificates = X509Certificate2UI.SelectFromCollection(                    store.Certificates, "Sertifikātu izvēle", "Izvēlieties sertifikātu", X509SelectionFlag.SingleSelection);                if (selectedCertificates.Count == 1)                {                    result = selectedCertificates[0];                }            }            finally { store.Close(); }            return result;        }
  • 6. Dokumenta parakstīšana FileInfo objekts, kas norāda uz parakstāmo failu             //sign document by calculating hash and then encrypting it            byte[] signature = null;byte[] hash = new SHA1Managed().ComputeHash(documentInfo.OpenRead());            using (RSACryptoServiceProvider cryptoProvider = GetPrivateKey(signingCertificate))            {                signature = cryptoProvider.SignHash(hash, CryptoConfig.MapNameToOID("SHA1"));            }         private RSACryptoServiceProvider GetPrivateKey(X509Certificate2 signerCert)        {            RSACryptoServiceProvider rsa = signerCert.PrivateKey as RSACryptoServiceProvider;            if (rsa == null)                throw new ArgumentNullException("Certificate with key not supplied or key is not RSA");            if (rsa.CspKeyContainerInfo.ProviderName == "Gemplus GemSAFE Card CSP")            {                // when private key on the GemSafe device, we need to construct                // a new rsa provider using information from the provider.                // this extracts more precise information from the hardware.                CspKeyContainerInfo containerInfo = rsa.CspKeyContainerInfo;                CspParameters csp = new CspParameters(containerInfo.ProviderType, containerInfo.ProviderName, containerInfo.UniqueKeyContainerName);                csp.KeyNumber = (int)KeyNumber.Signature; //existing signature key will be used from appropriate container in SSCD                return new RSACryptoServiceProvider(csp);            }            else            {                return rsa;            }        } X509Certificate2 objekts, kurā iepriekš izvēlētais parakstīšanas sertifikāts Piekļuve atslēgai e-me kartes gadījumā
  • 7.
  • 10. Hash drošības (kolīziju neiespējamības)
  • 11.
  • 13. XML Dsig – Open Office XML formāti
  • 14. XAdES (BES, T, C, …) – eDoc, digiDoc
  • 16. PAdES
  • 17.
  • 18.
  • 19. Publiskās atslēgas izplatīšana Alise No - Līdz LKHSF)(Q)*# Publiskā atslēga Sertifikāta pieprasījums Paraksts ar LVRTC slepeno atslēgu Sertifikāts Alise F(&#)&(&?MF Paraksts ar slepeno atslēgu Publiskā atslēga
  • 20. Publiskās atslēgas izplatīšana Publicē jaunu atsaukto atslēgu sarakstu Uzticama trešā puse (LVRTC) 1: Bobs 2: Džons 3: Alise LAHF*(#KHA LVRTC slepenā atslēga Informē, ka slepenā atslēga atklāta Paraksts ar LVRTC slepeno atslēgu Lasītāji (daudzi) Parakstītājs (Alise) Noskaidro atsaukto atslēgu sarakstu, pārbaudot parakstu LVRTC publiskā atslēga Slepenā atslēga Publiskā atslēga
  • 21. Publiskās atslēgas izplatīšana 1: Bobs 2: Džons 3: Alise LAHF*(#KHA LVRTC slepenā atslēga Paraksts ar LVRTC slepeno atslēgu CertificateRevocationList
  • 22.
  • 24.
  • 26. radīts ar drošiem elektroniskā paraksta radīšanas līdzekļiem
  • 27. saistīts ar elektronisko dokumentu tā, lai vēlākas izmaiņas šajā dokumentā būtu pamanāmas
  • 28. apliecināts ar kvalificētu sertifikātuDrošības prasības privātās atslēgas aizsardzībai izsniedzis uzticams sertifikācijas pakalpojumu sniedzējs
  • 29. Juridiskie aspekti Elektronisko dokumentu apritē starp valsts un pašvaldību iestādēm vai starp šīm iestādēm un fiziskajām un juridiskajām personām elektroniskais dokuments uzskatāms par parakstītu, ja tam ir drošs elektroniskais paraksts un laika zīmogs Laika zīmogs: elektroniski parakstīts apstiprinājums tam, ka elektroniskais dokuments ir noteiktā datumā un laikā iezīmēts pie sertifikācijas pakalpojumu sniedzēja
  • 30. Demo LVRTC karte, sertifikāti, CRLi
  • 31.
  • 32. Simetriskā šifrēšana Saņēmējs (Bobs) Sūtītājs (Alise) Ceļā Mūsdienu pieeja – publiski algoritmi + slepena atslēga Slepenā atslēga Slepenā atslēga Simetriskais šifrēšanas algoritms Simetriskais šifrēšanas algoritms %#hD(KJ_*YHAFY*#RLHF(&#)&(&?MF Uzbrūkam no rīta! Uzbrūkam no rīta! Šifrētais ziņojums
  • 34.
  • 35.
  • 36. VPN
  • 37.
  • 39.
  • 44.
  • 46.
  • 47.
  • 49.
  • 50. Katram tikai viens atslēgu pāris
  • 51.
  • 52. Grupu saziņai katram jābūt savam atslēgu pārim
  • 53.
  • 55. Atkarīgs no skaitļošanas resursu daudzuma
  • 59.