SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Pragmatic view on Directive
1999/93/EC
and its implementation
Paweł Krawczyk
pawel.krawczyk@hush.com
Why projects fail?
• Incomplete Requirements
• Lack of User Involvement
• Lack of Resources
• Unrealistic Expectations
• Lack of Executive Support
• Changing Requirements & Specifications
• Lack of Planning
• Didn't Need It Any Longer
• Lack of IT Management
• Technology Illiteracy
Source: The Standish Group, „Chaos Report”, 1995
„Key success factors for eSignatures”
Source: Study on Cross-Border Interoperability of eSignatures (CROBIES), 2010
„Key success factors for eSignatures”
Source: Study on Cross-Border Interoperability of eSignatures (CROBIES), 2010
Complete requirements?
• (4) Electronic communication and
commerce necessitate "electronic
signatures" and related services
allowing data authentication
– Who said that?
Differentiated services
• (20) …national law lays down
different requirements for the
legal validity of hand-written
signatures; whereas certificates can
be used to confirm the identity of a
person signing electronically;
advanced electronic signatures based
on qualified certificates aim at a
higher level of security;
– Why is it important?
Process security requirements
A B C
Examples
• Parol agreement
• Written agreement
• …with initials on each page
• …with witness
• …at notary
Temptation for single technique?
STRENGTH
Single security mechanism
A B C
ADJUST FOR
HIGHEST SECURITY !!!
Overkill for others
A B C
OVERKILL !OVERKILL !
Raaapiiiid….
• (8) Rapid technological development
T0 1999 Directive
T+2 2001 Polish act T+3 2002 Polish technical
Raaapiiiid….
• (8) Rapid technological development
T+5 2004 CEN still
working on CWA
T+6 2005 Polish IT
(„QES only”)
T+9 2008 Forced QES
purchases
Raaapiiiid….
• (8) Rapid technological development
T+10 2009/767/EC
Single point of contact, TSL
„risk assessment” !
T+12 2011/130/EU
Reference ES format
Public consultation on 1999/93/EC
My forecast up to 2020
• (8) Rapid technological development
2012 EC completes
summary of public consultation
2020 What was
that 1999/93/EC
all about ???
2015 Reports, analyses…
At the same time
in a parallel world…
• 2001 UK Government Gateway
– No QES
• 2001 Poland electronic banking
– No QES
• 2005 Denmark OCES
– No QES
• 2009 Polish e-Taxes portal
– No QES
E-banking security
# of
banks
Sector preferences
Authentication
method
Consumer Corporate
SMS 15 Ease of use, adequate
security
Repudiation
Hardware OTP
token
11 High TCO Higher security, some
non-repudiation
Printed OTP list
(TAN)
7 Basic security Repudiation
Digital
signature (*)
2 High TCO, difficult to
use
High non-repudiation
Static
password
0 Insecure Insecure
(*) Not neccessarily QES
Source: Michał Macierzyński, „Najbezpieczniejsze banki internetowe w Polsce”, Bankier.pl, 2009
Banking security evolution
2001 2003 2005 2007 2009 2011
Banking security evolution
2001 2003 2005 2007 2009 2011
Banking security evolution
2001 2003 2005 2007 2009 2011
0
2000
4000
6000
8000
10000
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
NUmberofusers(thousands)
Year
Electronic access to public administration services (dotted)
and commercial banking services (solid)
in Poland
1. Electronic signature
act of 2001, plus technical
regulations 2002
2. Information technology
act of 2005
3. QES becomes mandatory
for companies 2008
0
2000
4000
6000
8000
10000
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
NUmberofusers(thousands)
Year
Electronic access to public administration services (dotted)
and commercial banking services (solid)
in Poland
Electronic banking
~30% population
Public
administration
~1%
Examples
• 2009 Electronic delivery (QES
required)
– Chojnice region – 6 documents
– Kraków – 4 documents
– Radom – 0 documents
• Ministry of Finance
– 2009 90’000 (no QES)
– 2010 355’000 (no QES)
– 2011 953’375 (no QES, 3.4m QES)
E-inclusion
• Haven’t we just seen 99% exclusion?
„Firstly, in the legislative process, it supports the
solutions which are favourable to the disfavoured
groups. The examples may be found in the legal
frameworks of eGovernment.” (MSWiA 2009)
• Ok, what’s in reality???
Source: „eInclusion public policies in Europe”, final report, EC 2009
Summary
• Monumentalism, theory of everything
– Remember pseudonym certificates?
• First came up with a tool
– Then wondered how to use it
– FAIL!
• Result of 1999/93/EC for Poland
– Delay of e-inclusion by 13 years
• And growing
• Now technology…
Source: CWA 14170:2004, section 5.6
Is this up-to-date?
„A typical environment for the first
case might be the home or the
office, where the individual or the
company has direct control of the
SCS” (CWA 14170:2004, section 5.6)
• Ever heard of computer networks?
Legal fiction
• Polish technical requirements
– „trusted channel”, „trusted path” (4.4)
– But only for „public software” (2.9)
• „Software used at home or office” is not
„public”
– So what’s left???
«Botnet» – a network of home and office PCs that
have been compromised by malware and turned
into „zombies” (MarkRatledge.com)
Electronic signature tools
• What became „insecure”?
– Microsoft Office, Open Office, Adobe
Acrobat…
• Security embedded into native format,
automatic verification, integrated signining
– Support ES, but no QES
• What was nominated „secure”?
– Applications written by QCAs
– Usability at Windows 3.1 standards
– Sign-a-binary-file
Devaluation of „secure”
• 2005
• Proof of concept
• Malware interferes between SCA and
SSCD
Source: G DATA press release, 4 Oct 2005, Bankier.pl
Secure becomes „secure”
Source: Certum press release, Certum.pl 3 Oct 2005
Secure becomes „secure”
Source: Certum press release, Certum.pl 3 Oct 2005
Reminder…
„A typical environment for the first
case might be the home or the
office, where the individual or the
company has direct control of the
SCS” (CWA 14170:2004, section 5.6)
Interoperability
• (5) The interoperability of electronic-
signature products should be
promoted
Signature formats in Poland
(2005)
No Fil ext File
format
Sig
format
Usage Vendor
1 SIG CMS CMS General Certum
2 SIG PKCS#7 PKCS#7 General KIR
3 SIGNET XAdES XAdES General Signet
4 SDOC CAB PKCS#7 MS Word Sigillum
Electronic signature formats in Poland (2008)
No File ext File format Sig format Usage Vendor
1 EML S/MIME PKCS#7 universal Certum
2 ZSI XML XML-DSig UPO Zeto Białystok
3 signPro S/MIME PKCS#7 universal Sigillum
4 XML XML XML-DSig UPO Certum
5 XML XAdES XAdES universal Sigillum
6 SDOC CAB PKCS#7 DOC Sigillum
7 SIG CMS CMS universal Certum
8 SIG CMS CMS universal Sigillum
9 SIG PKCS#7 PKCS#7 universal KIR
10 SIG XAdES XAdES universal itBCG
11 P7 PKCS#7 PKCS#7 universal Sigillum
12 XAdES XAdES XAdES universal KIR
13 PDF PDF XAdES UPO Min. of Finance
14 EBF EBF XAdES Forms ebStream
Summary
• Inadequate security requirements
– Confusion on user market
• No interoperability
– Mess caused fully by vendors
• No real objectives
– Something indented to do everything is
really not useful for anything
• No functional thinking
– Technical extremism
– Legal extremism
Why projects fail?
• Incomplete Requirements
• Lack of User Involvement
• Lack of Resources
• Unrealistic Expectations
• Lack of Executive Support
• Changing Requirements & Specifications
• Lack of Planning
• Didn't Need It Any Longer
• Lack of IT Management
• Technology Illiteracy
Source: The Standish Group, „Chaos Report”, 1995

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
 
Yubico case-study-gov.uk
Yubico case-study-gov.ukYubico case-study-gov.uk
Yubico case-study-gov.ukWJN
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
Blockchain in Trade Finance
Blockchain in Trade FinanceBlockchain in Trade Finance
Blockchain in Trade FinanceAurobindo Nayak
 
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Hai Nguyen
 
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...Gerson Rolim
 

Was ist angesagt? (7)

Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
 
Yubico case-study-gov.uk
Yubico case-study-gov.ukYubico case-study-gov.uk
Yubico case-study-gov.uk
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
Blockchain in Trade Finance
Blockchain in Trade FinanceBlockchain in Trade Finance
Blockchain in Trade Finance
 
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
 
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
 
Election System Based on Blockchain Technology
Election System Based on Blockchain TechnologyElection System Based on Blockchain Technology
Election System Based on Blockchain Technology
 

Andere mochten auch

Paweł Krawczyk - Ekonomia bezpieczeństwa
Paweł Krawczyk - Ekonomia bezpieczeństwaPaweł Krawczyk - Ekonomia bezpieczeństwa
Paweł Krawczyk - Ekonomia bezpieczeństwaPawel Krawczyk
 
Are electronic signature assumptions realistic
Are electronic signature assumptions realisticAre electronic signature assumptions realistic
Are electronic signature assumptions realisticPawel Krawczyk
 
Leszek Miś "Czy twoj WAF to potrafi"
Leszek Miś "Czy twoj WAF to potrafi"Leszek Miś "Czy twoj WAF to potrafi"
Leszek Miś "Czy twoj WAF to potrafi"Pawel Krawczyk
 
Presentation from CyberGov.pl 2015
Presentation from CyberGov.pl 2015 Presentation from CyberGov.pl 2015
Presentation from CyberGov.pl 2015 Pawel Krawczyk
 
Zaufanie W Systemach Informatycznych
Zaufanie W Systemach InformatycznychZaufanie W Systemach Informatycznych
Zaufanie W Systemach InformatycznychPawel Krawczyk
 
Filtrowanie sieci - Panoptykon
Filtrowanie sieci - PanoptykonFiltrowanie sieci - Panoptykon
Filtrowanie sieci - PanoptykonPawel Krawczyk
 
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)Dlaczego przejmować się bezpieczeństwem aplikacji (pol)
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)Pawel Krawczyk
 
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"Pawel Krawczyk
 

Andere mochten auch (9)

Paweł Krawczyk - Ekonomia bezpieczeństwa
Paweł Krawczyk - Ekonomia bezpieczeństwaPaweł Krawczyk - Ekonomia bezpieczeństwa
Paweł Krawczyk - Ekonomia bezpieczeństwa
 
Are electronic signature assumptions realistic
Are electronic signature assumptions realisticAre electronic signature assumptions realistic
Are electronic signature assumptions realistic
 
Leszek Miś "Czy twoj WAF to potrafi"
Leszek Miś "Czy twoj WAF to potrafi"Leszek Miś "Czy twoj WAF to potrafi"
Leszek Miś "Czy twoj WAF to potrafi"
 
Presentation from CyberGov.pl 2015
Presentation from CyberGov.pl 2015 Presentation from CyberGov.pl 2015
Presentation from CyberGov.pl 2015
 
Zaufanie W Systemach Informatycznych
Zaufanie W Systemach InformatycznychZaufanie W Systemach Informatycznych
Zaufanie W Systemach Informatycznych
 
Filtrowanie sieci - Panoptykon
Filtrowanie sieci - PanoptykonFiltrowanie sieci - Panoptykon
Filtrowanie sieci - Panoptykon
 
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)Dlaczego przejmować się bezpieczeństwem aplikacji (pol)
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)
 
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
 
Vendor Audits
Vendor AuditsVendor Audits
Vendor Audits
 

Ähnlich wie Pragmatic view on Electronic Signature directive 1999 93

Smartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conferenceSmartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conferenceFilipe Mello
 
2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS 2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS Kyos
 
SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010Dinand Tinholt
 
Using eID for business startup in Europe
Using eID for business startup in EuropeUsing eID for business startup in Europe
Using eID for business startup in EuropeDinand Tinholt
 
The Future of Secure Documents
The Future of Secure DocumentsThe Future of Secure Documents
The Future of Secure DocumentsDarren Corbett
 
introduction-to-e-commerce.pdf
introduction-to-e-commerce.pdfintroduction-to-e-commerce.pdf
introduction-to-e-commerce.pdfpetermulei3
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesmarketingkobil
 
PLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskim
PLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskimPLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskim
PLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskimPROIDEA
 
FOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyFOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyLibreItalia
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
 
Telecom Italia's vision on future business drivers and IT implications
Telecom Italia's vision on future business drivers and IT implicationsTelecom Italia's vision on future business drivers and IT implications
Telecom Italia's vision on future business drivers and IT implicationsOscar Cicchetti
 
ePassport reloaded goes mobile
ePassport reloaded goes mobileePassport reloaded goes mobile
ePassport reloaded goes mobileJeroen van Beek
 
Prezentare spocs feb._2012_mcsi
Prezentare spocs feb._2012_mcsiPrezentare spocs feb._2012_mcsi
Prezentare spocs feb._2012_mcsiMonica ANGHEL
 
WSO2Con EU 2015: Implementing National Interoperability Platform
WSO2Con EU 2015: Implementing National Interoperability PlatformWSO2Con EU 2015: Implementing National Interoperability Platform
WSO2Con EU 2015: Implementing National Interoperability PlatformWSO2
 
Session 2. CEF – digital service infrastructures, Joao Rodrigues Frade
Session 2. CEF – digital service infrastructures, Joao Rodrigues FradeSession 2. CEF – digital service infrastructures, Joao Rodrigues Frade
Session 2. CEF – digital service infrastructures, Joao Rodrigues Fradee-SENS project
 
Email Interception For The Good Guys | CloudFest 2021
Email Interception For The Good Guys | CloudFest 2021Email Interception For The Good Guys | CloudFest 2021
Email Interception For The Good Guys | CloudFest 2021Axigen
 

Ähnlich wie Pragmatic view on Electronic Signature directive 1999 93 (20)

Smartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conferenceSmartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conference
 
2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS 2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS
 
SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010
 
Using eID for business startup in Europe
Using eID for business startup in EuropeUsing eID for business startup in Europe
Using eID for business startup in Europe
 
Introduction to-e-commerce
Introduction to-e-commerceIntroduction to-e-commerce
Introduction to-e-commerce
 
The Future of Secure Documents
The Future of Secure DocumentsThe Future of Secure Documents
The Future of Secure Documents
 
introduction-to-e-commerce.pdf
introduction-to-e-commerce.pdfintroduction-to-e-commerce.pdf
introduction-to-e-commerce.pdf
 
Europe | Electronic IDs
Europe | Electronic IDs Europe | Electronic IDs
Europe | Electronic IDs
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
PLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskim
PLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskimPLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskim
PLNOG 7: Kamil Ciukszo - Modele biznesowe na rynku operatorskim
 
FOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyFOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital Sovereignty
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 
Telecom Italia's vision on future business drivers and IT implications
Telecom Italia's vision on future business drivers and IT implicationsTelecom Italia's vision on future business drivers and IT implications
Telecom Italia's vision on future business drivers and IT implications
 
ePassport reloaded goes mobile
ePassport reloaded goes mobileePassport reloaded goes mobile
ePassport reloaded goes mobile
 
Prezentare spocs feb._2012_mcsi
Prezentare spocs feb._2012_mcsiPrezentare spocs feb._2012_mcsi
Prezentare spocs feb._2012_mcsi
 
WSO2Con EU 2015: Implementing National Interoperability Platform
WSO2Con EU 2015: Implementing National Interoperability PlatformWSO2Con EU 2015: Implementing National Interoperability Platform
WSO2Con EU 2015: Implementing National Interoperability Platform
 
Session 2. CEF – digital service infrastructures, Joao Rodrigues Frade
Session 2. CEF – digital service infrastructures, Joao Rodrigues FradeSession 2. CEF – digital service infrastructures, Joao Rodrigues Frade
Session 2. CEF – digital service infrastructures, Joao Rodrigues Frade
 
Email Interception For The Good Guys | CloudFest 2021
Email Interception For The Good Guys | CloudFest 2021Email Interception For The Good Guys | CloudFest 2021
Email Interception For The Good Guys | CloudFest 2021
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 

Mehr von Pawel Krawczyk

Top DevOps Security Failures
Top DevOps Security FailuresTop DevOps Security Failures
Top DevOps Security FailuresPawel Krawczyk
 
Authenticity and usability
Authenticity and usabilityAuthenticity and usability
Authenticity and usabilityPawel Krawczyk
 
Reading Geek Night 2019
Reading Geek Night 2019Reading Geek Night 2019
Reading Geek Night 2019Pawel Krawczyk
 
Unicode the hero or villain
Unicode  the hero or villain Unicode  the hero or villain
Unicode the hero or villain Pawel Krawczyk
 
Get rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protectionGet rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protectionPawel Krawczyk
 
Why care about application security
Why care about application securityWhy care about application security
Why care about application securityPawel Krawczyk
 
Krawczyk Ekonomia Bezpieczenstwa 2
Krawczyk   Ekonomia Bezpieczenstwa 2Krawczyk   Ekonomia Bezpieczenstwa 2
Krawczyk Ekonomia Bezpieczenstwa 2Pawel Krawczyk
 
Audyt Wewnetrzny W Zakresie Bezpieczenstwa
Audyt Wewnetrzny W Zakresie BezpieczenstwaAudyt Wewnetrzny W Zakresie Bezpieczenstwa
Audyt Wewnetrzny W Zakresie BezpieczenstwaPawel Krawczyk
 
Kryptografia i mechanizmy bezpieczenstwa
Kryptografia i mechanizmy bezpieczenstwaKryptografia i mechanizmy bezpieczenstwa
Kryptografia i mechanizmy bezpieczenstwaPawel Krawczyk
 
Real Life Information Security
Real Life Information SecurityReal Life Information Security
Real Life Information SecurityPawel Krawczyk
 
Europejskie Ramy Interoperacyjności 2.0
Europejskie Ramy Interoperacyjności 2.0Europejskie Ramy Interoperacyjności 2.0
Europejskie Ramy Interoperacyjności 2.0Pawel Krawczyk
 

Mehr von Pawel Krawczyk (13)

Top DevOps Security Failures
Top DevOps Security FailuresTop DevOps Security Failures
Top DevOps Security Failures
 
Authenticity and usability
Authenticity and usabilityAuthenticity and usability
Authenticity and usability
 
Reading Geek Night 2019
Reading Geek Night 2019Reading Geek Night 2019
Reading Geek Night 2019
 
Effective DevSecOps
Effective DevSecOpsEffective DevSecOps
Effective DevSecOps
 
Unicode the hero or villain
Unicode  the hero or villain Unicode  the hero or villain
Unicode the hero or villain
 
Get rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protectionGet rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protection
 
Why care about application security
Why care about application securityWhy care about application security
Why care about application security
 
Source Code Scanners
Source Code ScannersSource Code Scanners
Source Code Scanners
 
Krawczyk Ekonomia Bezpieczenstwa 2
Krawczyk   Ekonomia Bezpieczenstwa 2Krawczyk   Ekonomia Bezpieczenstwa 2
Krawczyk Ekonomia Bezpieczenstwa 2
 
Audyt Wewnetrzny W Zakresie Bezpieczenstwa
Audyt Wewnetrzny W Zakresie BezpieczenstwaAudyt Wewnetrzny W Zakresie Bezpieczenstwa
Audyt Wewnetrzny W Zakresie Bezpieczenstwa
 
Kryptografia i mechanizmy bezpieczenstwa
Kryptografia i mechanizmy bezpieczenstwaKryptografia i mechanizmy bezpieczenstwa
Kryptografia i mechanizmy bezpieczenstwa
 
Real Life Information Security
Real Life Information SecurityReal Life Information Security
Real Life Information Security
 
Europejskie Ramy Interoperacyjności 2.0
Europejskie Ramy Interoperacyjności 2.0Europejskie Ramy Interoperacyjności 2.0
Europejskie Ramy Interoperacyjności 2.0
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Pragmatic view on Electronic Signature directive 1999 93

  • 1. Pragmatic view on Directive 1999/93/EC and its implementation Paweł Krawczyk pawel.krawczyk@hush.com
  • 2. Why projects fail? • Incomplete Requirements • Lack of User Involvement • Lack of Resources • Unrealistic Expectations • Lack of Executive Support • Changing Requirements & Specifications • Lack of Planning • Didn't Need It Any Longer • Lack of IT Management • Technology Illiteracy Source: The Standish Group, „Chaos Report”, 1995
  • 3. „Key success factors for eSignatures” Source: Study on Cross-Border Interoperability of eSignatures (CROBIES), 2010
  • 4. „Key success factors for eSignatures” Source: Study on Cross-Border Interoperability of eSignatures (CROBIES), 2010
  • 5. Complete requirements? • (4) Electronic communication and commerce necessitate "electronic signatures" and related services allowing data authentication – Who said that?
  • 6. Differentiated services • (20) …national law lays down different requirements for the legal validity of hand-written signatures; whereas certificates can be used to confirm the identity of a person signing electronically; advanced electronic signatures based on qualified certificates aim at a higher level of security; – Why is it important?
  • 8. Examples • Parol agreement • Written agreement • …with initials on each page • …with witness • …at notary Temptation for single technique? STRENGTH
  • 9. Single security mechanism A B C ADJUST FOR HIGHEST SECURITY !!!
  • 10. Overkill for others A B C OVERKILL !OVERKILL !
  • 11. Raaapiiiid…. • (8) Rapid technological development T0 1999 Directive T+2 2001 Polish act T+3 2002 Polish technical
  • 12. Raaapiiiid…. • (8) Rapid technological development T+5 2004 CEN still working on CWA T+6 2005 Polish IT („QES only”) T+9 2008 Forced QES purchases
  • 13. Raaapiiiid…. • (8) Rapid technological development T+10 2009/767/EC Single point of contact, TSL „risk assessment” ! T+12 2011/130/EU Reference ES format Public consultation on 1999/93/EC
  • 14. My forecast up to 2020 • (8) Rapid technological development 2012 EC completes summary of public consultation 2020 What was that 1999/93/EC all about ??? 2015 Reports, analyses…
  • 15. At the same time in a parallel world… • 2001 UK Government Gateway – No QES • 2001 Poland electronic banking – No QES • 2005 Denmark OCES – No QES • 2009 Polish e-Taxes portal – No QES
  • 16. E-banking security # of banks Sector preferences Authentication method Consumer Corporate SMS 15 Ease of use, adequate security Repudiation Hardware OTP token 11 High TCO Higher security, some non-repudiation Printed OTP list (TAN) 7 Basic security Repudiation Digital signature (*) 2 High TCO, difficult to use High non-repudiation Static password 0 Insecure Insecure (*) Not neccessarily QES Source: Michał Macierzyński, „Najbezpieczniejsze banki internetowe w Polsce”, Bankier.pl, 2009
  • 17. Banking security evolution 2001 2003 2005 2007 2009 2011
  • 18. Banking security evolution 2001 2003 2005 2007 2009 2011
  • 19. Banking security evolution 2001 2003 2005 2007 2009 2011
  • 20. 0 2000 4000 6000 8000 10000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 NUmberofusers(thousands) Year Electronic access to public administration services (dotted) and commercial banking services (solid) in Poland 1. Electronic signature act of 2001, plus technical regulations 2002 2. Information technology act of 2005 3. QES becomes mandatory for companies 2008
  • 21. 0 2000 4000 6000 8000 10000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 NUmberofusers(thousands) Year Electronic access to public administration services (dotted) and commercial banking services (solid) in Poland Electronic banking ~30% population Public administration ~1%
  • 22. Examples • 2009 Electronic delivery (QES required) – Chojnice region – 6 documents – Kraków – 4 documents – Radom – 0 documents • Ministry of Finance – 2009 90’000 (no QES) – 2010 355’000 (no QES) – 2011 953’375 (no QES, 3.4m QES)
  • 23. E-inclusion • Haven’t we just seen 99% exclusion? „Firstly, in the legislative process, it supports the solutions which are favourable to the disfavoured groups. The examples may be found in the legal frameworks of eGovernment.” (MSWiA 2009) • Ok, what’s in reality??? Source: „eInclusion public policies in Europe”, final report, EC 2009
  • 24. Summary • Monumentalism, theory of everything – Remember pseudonym certificates? • First came up with a tool – Then wondered how to use it – FAIL! • Result of 1999/93/EC for Poland – Delay of e-inclusion by 13 years • And growing • Now technology…
  • 25. Source: CWA 14170:2004, section 5.6
  • 26. Is this up-to-date? „A typical environment for the first case might be the home or the office, where the individual or the company has direct control of the SCS” (CWA 14170:2004, section 5.6) • Ever heard of computer networks?
  • 27. Legal fiction • Polish technical requirements – „trusted channel”, „trusted path” (4.4) – But only for „public software” (2.9) • „Software used at home or office” is not „public” – So what’s left??? «Botnet» – a network of home and office PCs that have been compromised by malware and turned into „zombies” (MarkRatledge.com)
  • 28. Electronic signature tools • What became „insecure”? – Microsoft Office, Open Office, Adobe Acrobat… • Security embedded into native format, automatic verification, integrated signining – Support ES, but no QES • What was nominated „secure”? – Applications written by QCAs – Usability at Windows 3.1 standards – Sign-a-binary-file
  • 29.
  • 30. Devaluation of „secure” • 2005 • Proof of concept • Malware interferes between SCA and SSCD Source: G DATA press release, 4 Oct 2005, Bankier.pl
  • 31. Secure becomes „secure” Source: Certum press release, Certum.pl 3 Oct 2005
  • 32. Secure becomes „secure” Source: Certum press release, Certum.pl 3 Oct 2005
  • 33. Reminder… „A typical environment for the first case might be the home or the office, where the individual or the company has direct control of the SCS” (CWA 14170:2004, section 5.6)
  • 34. Interoperability • (5) The interoperability of electronic- signature products should be promoted
  • 35. Signature formats in Poland (2005) No Fil ext File format Sig format Usage Vendor 1 SIG CMS CMS General Certum 2 SIG PKCS#7 PKCS#7 General KIR 3 SIGNET XAdES XAdES General Signet 4 SDOC CAB PKCS#7 MS Word Sigillum
  • 36. Electronic signature formats in Poland (2008) No File ext File format Sig format Usage Vendor 1 EML S/MIME PKCS#7 universal Certum 2 ZSI XML XML-DSig UPO Zeto Białystok 3 signPro S/MIME PKCS#7 universal Sigillum 4 XML XML XML-DSig UPO Certum 5 XML XAdES XAdES universal Sigillum 6 SDOC CAB PKCS#7 DOC Sigillum 7 SIG CMS CMS universal Certum 8 SIG CMS CMS universal Sigillum 9 SIG PKCS#7 PKCS#7 universal KIR 10 SIG XAdES XAdES universal itBCG 11 P7 PKCS#7 PKCS#7 universal Sigillum 12 XAdES XAdES XAdES universal KIR 13 PDF PDF XAdES UPO Min. of Finance 14 EBF EBF XAdES Forms ebStream
  • 37. Summary • Inadequate security requirements – Confusion on user market • No interoperability – Mess caused fully by vendors • No real objectives – Something indented to do everything is really not useful for anything • No functional thinking – Technical extremism – Legal extremism
  • 38. Why projects fail? • Incomplete Requirements • Lack of User Involvement • Lack of Resources • Unrealistic Expectations • Lack of Executive Support • Changing Requirements & Specifications • Lack of Planning • Didn't Need It Any Longer • Lack of IT Management • Technology Illiteracy Source: The Standish Group, „Chaos Report”, 1995

Hinweis der Redaktion

  1. 5.6 Control and possession of Signature Creation Systems A typical environment for the first case might be the home or the office, where the individual or the company has direct control of the SCS (e.g. an SCS implemented in a mobile phone). In this case, the security requirements may be met by organisational methods put in place or managed by the signer, and the technical means to ensure achievement of the security requirements may be more relaxed. For instance, in an extreme case, the Signer can use an isolated PC that is stored in a safe that can only be opened by the signer. A typical environment for the second case is where an SCS is located in a public place such as a railway station, bank or any other SCS that is operated by a service provider that is not necessarily related to or under the control of the signer. Without further technical security measures, this type of environment can suffer a number of other types of attack - e.g. replacement with a fake SCS. The technical requirements of SCSs operated in such public environments will necessarily be more stringent. These different environments have a different impact on the security requirements of the SCS since, although the overall security requirements remain the same for all SCEs as far as the signer is concerned, those security requirements need to be met in different ways.
  2. Lots of marketing stuff about QES being „fully secure”, „impossible to fake”, „unrepudiable” etc.
  3. „Secure signature” should be really understood as „secure in legal sense”
  4. Because the SCA used is „non public” environment.