gordon w. romney, senior member, ieee, and donald w. parry information technology based higher...

17
Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International Conference on A Digital Signature Signing Engine to Protect the Integrity of Digital Assets 報報報 報報報

Upload: phoebe-clarke

Post on 02-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry

Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

Conference on

A Digital Signature Signing Engine to Protect

the Integrity of Digital Assets

報告者:鍾蕙蓮

Page 2: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

Outline

I. INTRODUCTIONII. BACKGROUNDIII. RESEARCH AND IMPLEMENTATION

OBJECTIVESIV. RESEARCH AND IMPLEMENTATIONV. FUTURE RESEARCHVI. CONCLUSION

Page 3: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

I. INTRODUCTION

The Digital Signature Signing Process (DSP) system handles batches of digital image files, one file at a time and produces a unique digital signature of each file.

The significance of the DSP is that it provides a process for the owner, or archivist, of a digital asset to preserve the exact content of the asset at a given instant in date and time ( t 0 ) by generating a digital signature of the digital file.

Page 4: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

I. INTRODUCTIONA. Sample Digital Signature of an Image and Digital

Signature Verification:

The DSP generated a digital signature, d 0 made at time t 0 . The digital signature, d 0 , appears to be simply a string of characters and is normally stored as a digital file.

The DSV process, next, was used to validate the previous digital signature, d 0 , at a later time, t1 . Fig. 3 shows the successful outcome from the verification comparison against a newly computed digital signature, d 1 at time t 1 , of an unaltered image of Fig.1. The two digital signatures are proved to be identical as d 1 = d 0 

Page 5: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

I. INTRODUCTIONB. Collaborating Researchers and Sponsor

The fundamental technology used by DSP is illustrated by 1) a Dead Sea Scrolls text image from Isaiah b found in Cave 1 at Qumran, contributed by Parry, the Ancient Biblical Manuscript Center and the Israel Antiquities Authority [2]; and 2) a satellite image of the earth previously shown in Fig.1.

In each instance, a need was identified to digitally sign 10 4-6 original images in order to facilitate detecting altered images that are illegally represented as originals.

Page 6: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

II. BACKGROUNDA. Public Key Cryptography:

Asymmetric cryptography uses a pair of cryptographic keys, a public and a private key, and is the technology used in the DSP project.

Key-pairs are securely issued and managed by a Trusted- Third-Party Certificate Authority

In its simplest form, a digital signature is a hash of a digital item that is encrypted by a client 's private key of an asymmetric key pair.

Page 7: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

II. BACKGROUNDB. Products Are Not Available in the

Marketplace:

Current technology markets have focused on digitally signing documents

Other digital assets such as photo images, audio and video have received little attention. Also, a batch processor for large quantities of digital assets, such as multi-megabyte images, has not been available.

Page 8: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

II. BACKGROUNDC. Open Source Solutions Not Available to

Academia:

Academic institutions, notably libraries, have not had an open source digitally-signing-time-stamp solution for either documents or images. DSP was designed to be an open-source solution for all forms of digital assets, but to specifically meet the needs of volume processing of large-sized digital files.

Page 9: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

III. RESEARCH AND IMPLEMENTATION OBJECTIVESA. Provide IT Students with a Real-World

Application:

Integrates skills learned in course instruction.Stretches their creativity to a higher level.Introduces the challenges of interacting with a

client.Teaches them teamwork.Uses project management and documentation

tools.Can be accomplished in two semesters of

instruction.

Page 10: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

III. RESEARCH AND IMPLEMENTATION OBJECTIVESB. Confront Technologically Challenging Issues:

Major research areas and components that were integrated for DSP are the following:

An operating Certificate Authority (CA).The security Best Practices for a CA.An operating Trusted-Third-Party Time-Date-

Service.An autonomous Digital Signature Signing

Server for multiple clients.A relational database that tracks asset

provenance and modification history.

Page 11: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

III. RESEARCH AND IMPLEMENTATION OBJECTIVESC. Provide Clients with a Turnkey Solution:

When a client, such as the Digital Signing of the Dead Sea Scrolls Images (DSDSSI) project, needs digital signing services, an operational DSP node can be established under its autonomous control. Placing the DSP node under a client’s supervision ensures the preservation of the original images under the optimum security and archival Best Practices.

Page 12: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

III. RESEARCH AND IMPLEMENTATION OBJECTIVESD. Provide a Centrally Operational CA and TDS:

The entire integrity of a DPS service depends upon the security of its key-pair, system clock and digital signature history logs and change files.

The sponsor for DSP is the BYU Sun Center of Excellence that is focused on information privacy issues.

In this role it sponsors the central operation for both CA and TDS Trusted-Third-Party functions.

Page 13: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

III. RESEARCH AND IMPLEMENTATION OBJECTIVESE. Provide an Auditable History of Digital Signatures:

As a Trusted-Third-Party, the TDS provides a legally, auditable history of all changes to a given DSP node clock.

Additionally, all historical records of clock adjustments and digital signature history logs are linked and digitally signed by the TDS server every twelve hours.

Linked digital signature logs make it virtually impossible for an image file to be deleted or an alternate substituted.

Page 14: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

IV. RESEARCH AND IMPLEMENTATION

A. DesignB. Supporting Processes Essential to DSPC. Project ManagementD. Project SpecificationE. System UsersF. Database SchemaG. Time-Date Service Database SchemaH. Major Component List for the DSP

Prototype SystemI. Any Change Produces a ‘Failed’ DSV

Page 15: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

V. FUTURE RESEARCHThe team determined that a number of areas

require additional research, testing, benchmarking and refinement such as:

Compare several different RDBMSs to MySQL, the current choice.

Evaluate the speed of different signing algorithms.Get Elliptic Curve Cryptography fully operational.

Initial benchmarks show that it is much faster than anticipated and faster than the RSA implementation in OpenSSL.

Evaluate other mass file upload technologies.Develop an improved batch scheduler for the

volume ofsmaller jobs required by signing.

Page 16: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

VI. CONCLUSION

A. Provide IT Students with a Real-World ApplicationB. Confront Technologically Challenging IssuesC. Provide Clients with a Turnkey SolutionD. Provide a Centrally Functional CA and TDSE. Provide an Auditable History of Digital Signatures

The research reported in this paper for the Digital Signature Signing Engine project has not come to a conclusion, but rather, is expanding with future research and the installation of other potential DSP nodes.

Page 17: Gordon W. Romney, Senior Member, IEEE, and Donald W. Parry Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International

The end.