the many applications of digital certificates€¦ · downloading software 4. sending email 5....

Post on 30-Sep-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

The many applicationsof digital certificates

Digital certificates appear in many unexpected places.This session discovers them, and explains their variousfunctions in terms accessible to ordinary users. Added-

value of encryption over mere log-ins, the future ofpasswords.

thomas@thomasruddy.org 1

DisclaimerThis presentation will be about technologyfrom a socio-economic persepective. Formathematical details of cryptography,please see the recent German presentationof my colleague Guenter Waller,http://www.pc-treff-bb.de/Vortraege/Zertifikate.pdf

You will find clickable links to the currentpresentation on my www.thomasruddy.eu

thomas@thomasruddy.org 2

Overview

thomas@thomasruddy.org 3

Theses

• Cryptography developed through militaryapplications like Enigma encryption.– Encryption needs authentication.

• We live in states based on law and order.• The integrity of society relies on ID management.• ID mgmt can make contracts non-repudiable.• Blockchain may make contracts self- executable.• We are under threat from corporations taking

over ID mgmt for a society that is valuingconvenience over data security.

thomas@thomasruddy.org 4

thomas@thomasruddy.org 5

Authentication

Creating a CHF, source:https://en.wikipedia.org/wiki/Crypto-graphic_hash_function

Verifyingauthentic-ity ofdown-loadedsoftware

Digital fingerprint

“Fingerprints are created byapplying a cryptographichash function to a publickey. ”https://en.wikipedia.org/wiki/Public_key_fingerprintPhoto credit: Author Saurabh R.Patilon Wikimedia

Basic uses of certificates

1. Logging-in to Websites2. Securing one’s own Websites3. Downloading software4. Sending email5. Signing documents6. Using certificates instead of passwords7. Long-term document preservation (PDF/A,

https://www.pdfa.org/topics/)

thomas@thomasruddy.org 8

http://youbroketheinternet.org/9

Samples of id. management initiatives listed in Wikipedia

thomas@thomasruddy.org 10

The Future of Digital Identity

The MyData GlobalNetwork organized by

Finns mydata.org

Mydex.org and Qiy /Sovrin / blockchain ledger(recommend Vigna/CaseyAge of Cryptocurency)

Kupplinger-Colethomas@thomasruddy.org 11

Getting beyond Google/Facebook passwords

Document signing madeconvenient

• www.signinghub.com claim: “Expert inhigh-trust, Advanced & Qualified ElectronicSignatures, Turnkey solution providing both localand remote signing plus a built-in complete PKIsystem”

• docusign.com is competitor offering fewerfeatures

• Some solutions collect user profiles (viasurveillance techniques) to secure IDs.

• Keybase.io is little project also centralizingindicators of one’s ID, but less invasively.

thomas@thomasruddy.org 12

SaaS in the Cloud

• Currently 81 entries for identity-access-

mgmt,

https://azuremarketplace.microsoft.com

• Salesforce, SAP, Citrix

• Axciom -- recent breach!

• Adobe Document Cloud, Adobe Sign,

https://acrobat.adobe.com/us/en/sign.ht

ml

thomas@thomasruddy.org 13

Trust frameworks in law

14thomas@thomasruddy.org

Identity systems have their ownrules, which fit into their respectivetrust frameworks. The later fallunder general ID mgmt law, whichin turn comprises part of generalcommercial law.Source: Makaay, Esther / Tom Smedinghoff / DonThibeau (2017): “Trust Frameworks: Their CriticalRole in Critical Role in Governing Identity Systems”,http://www.openidentityexchange.org/wp-content/uploads/2017/06/OIX-White-Paper_Trust-Frameworks-for-Identity-Systems_Final.pdf

Historical development of ID

paradigms• Phase One: Centralized Identity (administrative

control by a single authority or hierarchy)

• Phase Two: Federated Identity (administrative

control by multiple, federated authorities)

• Phase Three: User-Centric Identity (individual or

administrative control across multiple authorities

without requiring a federation, vs. server-centric)

• Phase Four: Self-Sovereign Identity (individual

control across any number of authorities) - the

Blockchain, e.g.

thomas@thomasruddy.org 15

World’s largest ID program

India is registering one billion citizensSupreme court has ruled in favour of citizenprivacy

World Bank has a program,www.worldbank.org/en/programs/id4d

Understanding digital certificates is useful, andapplying them manually is possible. However,big companies are offering mainstream signingsolutions with greater convenience for a largerpublic.

16

top related