Non-repudiation

advertisement
Non-repudiation
Robin Burke
ECT 582
Midterm scores
Ave: 69
 Std. dev: 23
 Median: 75
 Max: 100
 Min: 35

Approximate grade
Mid 80s and up: As
 High 60s and to mid80s: Bs
 50s to 60s: Cs
 40s: Ds

Midterm

Answers
Law and Business

Legal systems make business possible


(sorry libertarians)
Law establishes




conditions for contract validity
venues for disinterested mediation and
dispute resolution
remedies for breach of contract
mechanisms of enforcement
Law and E-Commerce
E-Commerce also needs legal
systems
 Complexities

global scope / jurisdiction
 evolving technology landscape
 automation / liability

Evidence

Legal systems require evidence
evidentiary statutes predate digital era
 slowly catching up


Non-repudiation

maintaining digital evidence for ecommerce transactions
Legal structures

Common law


long-established precedents in US and UK
Concepts






writing
signing
notary
competence
presence
negotiability
Problems for e-commerce

Is a digital contract "written"?


Is a digital signature a "signature"?


must be qualified with respect to key
purpose, policy, etc.
Who bears liability?



digital media impermanent
private key compromise
service disruption
Who will archive and how?


digital media volatile
archives must be secure
Example

Financial services law

banks must retain canceled checks
• or facsimiles thereof (microfilm)


pre-dates digital era
If we define "digital representation"
as equivalent to physical facsimile
 then banks can store electronic scans
of canceled checks

Example

Jurisdiction
location where suit can be brought
 party must have "minimum contacts"
with a jurisdiction to be summoned
there

• US Constitutional law

Does the availability of web site
constitute "minimum contacts"?
Legal framework
US Federal

Federal law
Federal E-Sign act
 provisions

• Technology-neutral
• Electronic signatures have same status
as written ones
• limits
• applies mostly to sale and lease contracts,
will, trusts and other transactions explicitly
excluded)
Legal Framework
US State Law

Uniform Electronic Transactions Act
 More specific than Federal law
 Enacted by 43 states
 Still technology-neutral
• Doesn't mention certificates, PKI, etc.

Uniform Computer Information Transactions Act
 Extremely controversial
 Enacted by 3 states: Maryland, Virginia, Iowa
 Major concern
• imposition of onerous license terms: self-help, reverse
engineering, prevention of archiving, fair-use, etc.
UETA Provisions

Electronic Signature


Effect of Electronic Signature: A


"Means a record created, generated, sent, communicated, received, or stored
by electronic means."
Effect of Electronic Record




"signature may not be denied legal effect or enforceability solely because it
is in electronic form."
"If a law requires a signature, an electronic signature satisfies the law."
Electronic Record


"an electronic sound, symbol. or process attached to or logically associated
with a record and executed or adopted by a person with the intent to sign the
record."
A record "may not be denied legal effect or enforceability solely because it is
in electronic form."
If a law requires a record to be in writing, an electronic record satisfies the
law."
A contract may not be denied legal effect or enforceability solely because an
electronic record was used in its formation."
Effect of Electronic Agents

"The actions of machines ("electronic agents") programmed and used by
people will bind the user of the machine, regardless of whether human review
of a particular transaction has occurred."
Digital Signature Law

Utah Digital Signature Act (1995)

Very specific
• Mentions public key cryptography, certificates,
CRLs, etc.
• Licensing and regulation of CAs
• Liabilities of users and CAs


Not widely emulated
"Digital Signature Guidelines" (1999)


American Bar Association
Guidelines for the deployment of PKI
• Expectations and liability associated with CAs,
RAs, and users
International Laws

UN Model Law on Electronic
Commerce


similar to UETA
EU Directive on Digital Signatures
similar to Utah law
 specific requirements for PKI

State of law

Complex and unsettled


Different laws in different states /
countries
Catch-22
Slow adoption of PKI is tied to legal
uncertainties
 Lack of legal precedents / guidelines
due to slow adoption

Break
Non-repudiation
System property
 Protocol

provides for the retention of evidence
 that can be used to resolve disputes
 regarding transactions

Non-repudiation

Strong and substantial evidence of
the identity of the signer of a
message and of message integrity,
sufficient to prevent a party from
successfully denying the origin,
submission or delivery of the
message and the integrity of its
contents.
– ABA Digital Signature Guidelines
Disputes

"I never said that."


"I never got your message."


origin
reception
"Check's in the mail."

submission
Types needed

Non-repudiation of origin


Non-repudiation of delivery


NRO
NRD
Non-repudiation of submission

NRS
Non-repudiation of Origin

Evidence needed
Identity of originator
 Contents of message
 Time of generation

• this may matter for establishing a
negotiation sequence

Techniques
two party
 three party

Originator Digital Signature

Alice






creates message M
dates it T
and signs it S
Alice sends M + T + S to Bob
Bob uses Alice's public key certificate to
verify signature
Bob archives


M+T+S
Alice's public key certificate and CRL used to
verify it
Features
Identity and contents are protected
 Timestamping depends on the
accuracy of Alice's clock
 Alice needs digital signature capability

TTP Signature






Trusted third-party (Vicky)
Receives Alice's transaction M
 message
Generates time stamp T
Signs M + T
 creating S'
Returns to Alice
Bob gets M + T + S'
 can verify that whole transaction matches S'
 archives the message for dispute resolution
 also Vicky's certificate and CRL used to verify it
Features

Alice doesn't need to sign


she can review message before sending
Alice doesn't need a key pair
• lower PKI overhead

Timestamp


Identity less secure


Vicky's timestamp will be more reliable than
Alice's
no digital signature from Alice
Vicky has access to message contents
TTP Digest Signature





Alice doesn't want to disclose M
Same operation with hash of M using key k
 creates hash H
Sends H to Vicky
 gets back H + T + S'
Attaches M
 encrypts M + k + H + T + S'
Bob receives message
 verifies that H is a true hash of M
 verifies Vicky's signature
 archives the transaction
Features
Alice needs encryption / hashing
capability
 Confidentiality is preserved
 Identity still a problem

In-line TTP

Receives Alice's transaction M


Generates time stamp T




Signs M + T
creating S'
Archives M + T + S'
Forwards M to Bob


message
perhaps with transaction id
Bob can contact Vicky to get evidence
Features
Vicky does archiving
 Alice and Bob don't need encryption
capability
 Content and identity guarantees

TTP Token





Receives Alice's transaction M
Generates time stamp T
Creates a secure hash H of M + T using a
cryptographic key k
Returns to Alice M + T + H
Bob gets M + T + H


Bob can contact Vicky with H
Vicky verifies that H matches message
Features
Content secure
 No PKI



Ordinary symmetric encryption
sufficient
Identity less secure
Combination of methods

Originator Signature + TTP Digest
Signature



Originator Signature + In-line TTP



if we care about disclosure
and recipient can archive
if we don't care about disclosure
and we want 3rd party archiving
In-line TTP could


archive encrypted message
Bob would need private key to access
evidence
Non-repudiation of delivery

Same information needed
Identity of recipient
 Content of message
 Timestamp


Think of NRO

but the origin message is the
acknowledgement of receipt
Signed receipt


Alice sends Bob M
Bob





generates a timestamp T
computes a hash of M = H
signs H + T = S'
sends Alice a receipt message H + T + S'
Alice



checks H against her original message
validates Bob's signature
archives the receipt message
Features

Like digital signature NRO, but in reverse


Standardized part of S/MIME



message = acknowledgement
secure receipt of email
available in MS Outlook
Other variants

TTP Signature, In-Line etc.
• all the same options available
Problem
Requires that the recipient generate
the receipt
 What about the "reluctant recipient"?


reason for NRD in the first place
Trusted Delivery Agent
Alice sends message of Vicky
 Bob must contact Vicky to access
message


Vicky generates receipt
Non-repudiation of
submission

Useful when what matters is
submitting something
a bid
 acceptance


Like NDD

but with the mail system
• or the bidding engine

doing the verification
Basic idea






Parties agree to non-repudiation
mechanism
Evidence is generated during transaction
Evidence is transmitted
Evidence is verified
Evidence is archived
If necessary


Evidence is retrieved
Evidence is presented for dispute resolution
Digital evidence

Evidence will be strong if
secure chain of custody from creation
to presentation
 properties of authenticity and integrity
 policies of the CA and TTP

Secure bidding

Suppose Alice doesn't want Bob to know
the contents of her message


Additional safeguards



a bid to be unsealed later
Alice shouldn't be able to change her mind
Bob shouldn't be able to read her bid
"Commitment protocol"

Alice commits to an answer but doesn't
reveal it
Commitment protocol

Alice encrypts M with symmetric key k



Bob gets Alice's bid C



produces ciphertext C
generates the transaction based on C
he can verify identity and timestamp
gets copy of C
When bids are revealed


Alice transmits k
Bid can be read
Homework #4

Use secure email



digital signature
encryption
Get certificate from www.thawte.com



cannot use web mail
if necessary, open a new hotmail account
Use Outlook Express or Netscape
Communicator
Download