the authenticity behind aic’s digital signature

32
The Authenticity Behind AIC’s Digital Signature

Upload: phoebe-sykes

Post on 30-Dec-2015

28 views

Category:

Documents


0 download

DESCRIPTION

The Authenticity Behind AIC’s Digital Signature. Overview. The possibilities of new technologies The security challenges of new technology Overview of Federal, Provincial « e legislation » What’s a digital signature based on PKI technology - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Authenticity Behind AIC’s Digital Signature

The Authenticity Behind AIC’s Digital Signature

Page 2: The Authenticity Behind AIC’s Digital Signature

Overview• The possibilities of new technologies• The security challenges of new technology • Overview of Federal, Provincial « e legislation » • What’s a digital signature based on PKI technology• The challenge : linking digital signatures and professional title

Page 3: The Authenticity Behind AIC’s Digital Signature

The possibilities of “e” data exchange and

transactions• Faster• Reliable • Available • Portable• Easy• Completes the cycle of computerisation

Page 4: The Authenticity Behind AIC’s Digital Signature

The security challenges

• Authentication

• Authorization

• Non-repudiation

• Data integrity

• Privacy

Page 5: The Authenticity Behind AIC’s Digital Signature

Federal law (PIPEDA) • Electronic signatures are accepted

• A secure electronic signatures should have the following qualities :

– The electronic signature is unique to the person– The use of the electronic signature is under the sole control of the person– The technology or process can be used to identify the person– The link between the electronic signature and the document protects the document’s integrity

Page 6: The Authenticity Behind AIC’s Digital Signature

Provincial legislation overview

• “Electronic” signatures are accepted

• It’s all a question of proof i.e. :– Can the identity of the signatory be confirmed ?– Is the signatory authorized to sign and seal ?– Can the link between the digital document and

the signatory be proven?– Can the data integrity be guaranteed?

Page 7: The Authenticity Behind AIC’s Digital Signature

Not all electronic signatures are equal!

•An electronic signature is NOT a digital signature.

•A digital signatue is one form of electronic signature.

•Both are not equal…

Page 8: The Authenticity Behind AIC’s Digital Signature

What about a scanned signature?

•It’s a form of electronic signature

•It does not provide data integrity

•Anyone that has your scanned signature can use it

Page 9: The Authenticity Behind AIC’s Digital Signature

What about password protection with a scanned

signature?•It’s a form of electronic signature

•It does provides weak data integrity– For example, if you passwrod protect a pdf file, have you ever done a search on

Google with « pdf and crack »?

•Still, anyone that has the image of your signature can also password protect a document with your signature…

Page 10: The Authenticity Behind AIC’s Digital Signature

The technological solutionAsymmetric key cryptography managed

by a trusted certificate authority

Page 11: The Authenticity Behind AIC’s Digital Signature

Digital signatures explained

•Digital signatures uses asymetric key cryptography.

•It provides a garantee to a recipient that the signed data (electronic document) came from the person who signed it.

•It provides a garantee to a recipient that the signed data was not altered since it was signed.

Page 12: The Authenticity Behind AIC’s Digital Signature

Digital signatures explained

•Aymetric key works in key pair. One key is a signing key (private key), one is a public key (verification key)

Page 13: The Authenticity Behind AIC’s Digital Signature

How it works•The sender starts the process by talking a mathematical summary (called a hash) of the data with (task performed by your digital signature software signature software)

•This hash is a uniquely identifying fingerprint of the data (even a single bit of data changes, affects the hash)

Page 14: The Authenticity Behind AIC’s Digital Signature

How it works•Next the sender encrypts the hash code with their private signing key (task perfomed by the encryption software)

•The sender can then archive and send the data which is now linked with the encrypted hash code

Page 15: The Authenticity Behind AIC’s Digital Signature

How it works

•The hash code is considered a signature because only the signer, using their private key, could have generated the code.

•The next steps explains how a digital signature can be verified

Page 16: The Authenticity Behind AIC’s Digital Signature

How it works•Upon receipt of the data (electronic document) the recipient can verify that the hash code was encrypted by the sender by decrypting the hash using the sender’s verification public

Page 17: The Authenticity Behind AIC’s Digital Signature

How it works•The recipient, having possession of what presumably is the original data, uses the data to generate a new hash code

Page 18: The Authenticity Behind AIC’s Digital Signature

How it works•The new hash code and the decrypted hash code are compared. If both are the same, they have forcibly been generated by the same integral source of data.

Page 19: The Authenticity Behind AIC’s Digital Signature

The certificates• How to be sure of the link between

the public key and its owner?

√ By associating the public key and its owner with a certificate!

Page 20: The Authenticity Behind AIC’s Digital Signature

The Certificate Authority• How to be sure that the information

contained in the certificate is valid?

√ By having the information in all certificates guaranteed by a certificate authority.

Page 21: The Authenticity Behind AIC’s Digital Signature

The partnership between the AIC and Notarius:

• Confirms the identity of a digital signature service subscriber

• Confirms and maintain the professional title designation with the digital signature

Page 22: The Authenticity Behind AIC’s Digital Signature

The partnership between AIC and Notarius provides

• Identity verification (in person or via documented verification)

– CONFIDENCE and TRUST are the basis and the purpose of the system: to protect the public and the Appraiser

• The confirmation of the link between the identity of the beholder of the private key

and his professional status (detaining the appropriate permit to practice) can only be made by the AIC

Page 23: The Authenticity Behind AIC’s Digital Signature

Features

• Identity (guards against identity theft)

• Authorization (Appraiser’s professional title)

• Integrity (fraud prevention)

• Non-repudiation • Confidentiality (protection against data

mining)

Page 24: The Authenticity Behind AIC’s Digital Signature

Benefits• Time Saving:

– Click/Sign (no more handwritten signatures)

– Click/Send

• Money Saving:– No printing (paper, toner, binding, handling,

courier, paper archives)– Fully compliant electronic archives

• Protects sensible information• Increases corporate security

Page 25: The Authenticity Behind AIC’s Digital Signature

CostDigital Signature

Regular rates

Between May 1st and 31st 2009

Subscription Fee Annual Service FeeBetween $145 and

$175/subscriberBetween $160 and

$200/subscriber

Subscription Fee Annual Service FeeBetween $145 and

$175/subscriber100$ for the first year of

service

Page 26: The Authenticity Behind AIC’s Digital Signature

What’s included• A complete architecture:

– Secure and available infrastructure– All the necessary resources for the management, maintenance

and upgrade of the infrastructure

• The digital signature toolkit:– Your digital certificate (electronic ID)– The cryptographic application (Entrust Enteligence)– PDF995– ConsignO

• All upgrades and updates• End user phone support (Monday – Friday 8:30 to 17:00

EST.)

Page 27: The Authenticity Behind AIC’s Digital Signature

Notarius offers• Tried and proven CA

– Operational since 1998– Trusted CA for Notaries, Appraisers,

Technicians, land surveyors, Engineers, Architects etc.

• Trusted CA– Financial institution– Governmental recognition

• Dedicated to professionals• A non profit organization (not profit

driven)• Notarius is accredited ISO 9001-2000• Notarius’s PKI is accredited ISO 27001

Page 28: The Authenticity Behind AIC’s Digital Signature

How to subscribe• Fill in a subscription form• Have your subscription form witnessed

(signed) by another member in good standing of AIC

• Transmit the subscription form and photocopy of two pieces of Valid ID’s to AIC

• Your activation codes will be delivered in a sealed envelope via Express Post

Page 29: The Authenticity Behind AIC’s Digital Signature

Easy to use

There’s nothing like a live demo

For online demos :

http://www.notarius.com/en/online_demos.html

Page 30: The Authenticity Behind AIC’s Digital Signature

Recap• Legal requirements• Professional requirements• The technological answer: digital signatures• The AIC’s mission (protection of the public)• The need to incorporate the professional

status into digital signatures• Allowing members to move from a paper

environment to a “compliant” electronic environment efficiently

• Integration with everyday use

Page 31: The Authenticity Behind AIC’s Digital Signature

Thank you for your time

Please come visit us at our booth for more information and to take advantage of

our May promotion

Page 32: The Authenticity Behind AIC’s Digital Signature

Questions? [email protected]

Toll free 1-800-567-6703or

1-888-588-0011 [email protected]