SlideShare a Scribd company logo
Enhancing
System Security
Using
PUBLIC KEY
INFRASTRUCTURE
SecureMetric Technology Inc.
www.securemetric.com
What is PKI?
Public Key Infrastructure
Public Key
Private Key
What is a Certificate Authority?
SECRET	
 Β 
MARY’S	
 Β 
Public	
 Β Key	
 Β 
IDEAL WORLD
MESSAGE	
 Β 
+	
 Β 
ENCRYPTED	
 Β 
MESSAGE	
 Β 
REAL WORLD
SECRET	
 Β 
Fake	
 Β 
MARY’S	
 Β 
Public	
 Β Key	
 Β 
MESSAGE	
 Β 
+	
 Β 
ENCRYPTED	
 Β 
MESSAGE	
 Β 
MARY’S	
 Β 
Public	
 Β Key	
 Β 
MODIFIED	
 Β 
ENCRYPTED	
 Β 
MESSAGE	
 Β 
+	
 Β 
HOW TO SOLVE PROBLEM?
SECRET	
 Β 
MESSAGE	
 Β 
+	
 Β 
ENCRYPTED	
 Β 
MESSAGE	
 Β 
MARY’S	
 Β 
Public	
 Β Key	
 Β 
We are
going round
in circle!
PROBLEM
SOLVED
CPS & CP
CERTIFICATE	
 Β 
AUTHORITY	
 Β 
Why PKI?
4 Trust Requirements
The Philippines:
Ready for PKI?
Public	
 Β  Key	
 Β  Infrastructure	
 Β 
Public	
 Β  Key	
 Β 
Core	
 Β Technology	
 Β 
Public	
 Β Key	
 Β Cryptography	
 Β 
(Asymmetric	
 Β Cryptography)	
 Β 
Very	
  first	
 Β Asymmetric	
 Β Algorithm	
 Β (RSA)	
 Β was	
 Β 
published	
 Β in	
 Β 1977	
 Β 
Public	
 Β  Key	
 Β  Infrastructure	
 Β 
Infrastructure	
 Β 
InformaPon	
 Β 
Technology	
 Β 
LegislaPon	
 Β 
Enforcement	
 Β 
Policy	
 Β 
Procedures	
 Β 
LegislaPon	
 Β 
LegislaPon	
 Β 
Disclaimer	
 Β 
β€’β€― I	
 Β am	
 Β not	
 Β a	
 Β legal	
 Β pracPPoner	
 Β 
β€’β€― I’m	
 Β just	
 Β a	
 Β guy	
 Β with	
 Β experience	
 Β in	
 Β 
the	
 Β PKI	
 Β industry	
 Β and	
 Β is	
 Β passionate	
 Β 
enough	
 Β about	
 Β PKI	
 Β to	
 Β have	
 Β 
researched	
 Β on	
 Β the	
 Β Electronic	
 Β 
commerce	
 Β and	
 Β Digital	
 Β Signature	
 Β 
Acts	
 Β of	
 Β a	
 Β few	
 Β countries.	
 Β 
Do	
 Β not	
 Β take	
 Β what	
 Β I	
 Β say	
 Β as	
 Β 
legal	
 Β advice!	
 Β 
EO 801
eCommerce Act 2000
Electronic	
 Β Commerce	
 Β Act	
 Β 2000	
 Β 
β€’β€― β€œElectronic”	
 Β Signatures	
 Β becomes	
 Β acceptable	
 Β in	
 Β court	
 Β 
(Sect	
 Β 8-­‐11).	
 Β 
β€’β€― Sec	
 Β 5.E	
 Β β€œElectronic	
 Β signature”	
 Β refers	
 Β to	
 Β any	
 Β disPncPve	
 Β 
mark,	
 Β characterisPc	
 Β and/or	
 Β sound	
 Β in	
 Β electronic	
 Β form,	
 Β 
represenPng	
 Β the	
 Β idenPty	
 Β of	
 Β a	
 Β person	
 Β and	
 Β a_ached	
 Β to	
 Β 
or	
 Β logically	
 Β associated	
 Β with	
 Β the	
 Β electronic	
 Β data	
 Β 
message	
 Β or	
 Β electronic	
 Β document	
 Β or	
 Β any	
 Β methodology	
 Β 
or	
 Β procedures	
 Β employed	
 Β or	
 Β adopted	
 Β by	
 Β a	
 Β person	
 Β and	
 Β 
executed	
 Β or	
 Β adopted	
 Β by	
 Β such	
 Β person	
 Β with	
 Β the	
 Β intenPon	
 Β 
of	
 Β authenPcaPng	
 Β or	
 Β approving	
 Β an	
 Β electronic	
 Β data	
 Β 
message	
 Β or	
 Β electronic	
 Β document.	
 Β 
	
 Β 
β€œElectronic	
 Β Signature”	
 Β 
Sec.	
 Β 8.	
 Β Legal	
 Β Recogni/on	
 Β of	
 Β Electronic	
 Β 
Signatures.	
 Β An	
 Β electronic	
 Β signature	
 Β on	
 Β the	
 Β 
electronic	
 Β document	
 Β shall	
 Β be	
 Β equivalent	
 Β to	
 Β the	
 Β 
signature	
 Β of	
 Β a	
 Β person	
 Β on	
 Β a	
 Β wri_en	
 Β document	
 Β if	
 Β 
that	
 Β signature	
 Β is	
 Β proved	
 Β by	
 Β showing	
 Β that	
 Β a	
 Β 
prescribed	
 Β procedure,	
 Β not	
 Β alterable	
 Β by	
 Β the	
 Β 
parPes	
 Β interested	
 Β in	
 Β the	
 Β electronic	
 Β document	
 Β 
Rules	
 Β on	
 Β Electronic	
 Β Evidence	
 Β issued	
 Β by	
 Β the	
 Β Supreme	
 Β 
court	
 Β in	
 Β 2001	
 Β men/ons	
  specifically	
 Β Asymmetric	
 Β or	
 Β 
Public	
 Β Cryptosystem	
 Β (PKI).	
 Β 
Electronic	
 Β Commerce	
 Β Act	
 Β 2000	
 Β 
SEC.	
 Β 27.	
 Β Government	
 Β Use	
 Β of	
 Β Electronic	
 Β Data	
 Β 
Messages,	
 Β Electronic	
 Β Documents	
 Β and	
 Β Electronic	
 Β 
Signatures.	
 Β All	
 Β departments,	
 Β bureaus,	
 Β offices	
 Β and	
 Β 
agencies	
 Β of	
 Β the	
 Β government,	
 Β as	
 Β well	
 Β as	
 Β all	
 Β 
government-­‐owned	
 Β and-­‐controlled	
 Β corporaPons	
 Β 
shall	
 Β within	
 Β 2	
 Β years,	
 Β accept	
 Β electronic	
 Β documents	
 Β 
signed	
 Β with	
 Β β€œElectronic”	
 Β Signatures.	
 Β 
	
 Β 
h?p://i.gov.ph/e-­‐government-­‐where-­‐are-­‐we-­‐now/	
 Β 
Electronic	
 Β Commerce	
 Β Act	
 Β 2000	
 Β 
SEC.	
 Β 31.	
 Β Lawful	
 Β Access.	
 Β -­‐	
 Β Access	
 Β to	
 Β an	
 Β electronic	
 Β 
file,	
 Β or	
 Β an	
 Β electronic	
 Β signature	
 Β of	
 Β an	
 Β electronic	
 Β data	
 Β 
message	
 Β or	
 Β electronic	
 Β document	
 Β shall	
 Β only	
 Β be	
 Β 
authorized	
 Β and	
 Β enforced	
 Β in	
 Β favor	
 Β of	
 Β the	
 Β individual	
 Β 
or	
 Β enPty	
 Β having	
 Β a	
 Β legal	
 Β right	
 Β to	
 Β the	
 Β possession	
 Β or	
 Β 
the	
 Β use	
 Β of	
 Β the	
 Β plaintext,	
 Β electronic	
 Β signature	
 Β or	
  file	
 Β 
and	
 Β solely	
 Β for	
 Β the	
 Β authorized	
 Β purposes.	
 Β The	
 Β 
electronic	
 Β key	
 Β for	
 Β idenPty	
 Β or	
 Β integrity	
 Β shall	
 Β not	
 Β be	
 Β 
made	
 Β available	
 Β to	
 Β any	
 Β person	
 Β or	
 Β party	
 Β without	
 Β the	
 Β 
consent	
 Β of	
 Β the	
 Β individual	
 Β or	
 Β enPty	
 Β in	
 Β lawful	
 Β 
possession	
 Β of	
 Β that	
 Β electronic	
 Β key.	
 Β 
β€’β€― AdopPon	
 Β of	
 Β a	
 Β naPonal	
 Β level	
 Β 
Public	
 Β Key	
 Β Infrastructure.	
 Β 
β€’β€― IdenPficaPon	
 Β of	
 Β Agencies	
 Β 
responsible.	
 Β 
β€’β€― Secng	
 Β up	
 Β of	
 Β framework	
 Β for	
 Β 
AccreditaPon.	
 Β 
β€’β€― Funding	
 Β and	
 Β resources.	
 Β 
β€’β€― DirecPves	
 Β for	
 Β the	
 Β Private	
 Β 
sector.	
 Β 
β€’β€― Fees.	
 Β 
β€’β€― CerPficate	
 Β Authority	
 Β hierarchy.	
 Β 
ExecuPve	
 Β Order	
 Β 810	
 Β (2009)	
 Β 
β€’β€― Philippine	
 Β AccreditaPon	
 Β Office	
 Β 
(PAO)	
 Β is	
 Β put	
 Β in-­‐charged	
 Β of	
 Β 
AccreditaPon	
 Β of	
  CerPficate	
 Β 
authoriPes	
 Β (CA)	
 Β including	
 Β 
private	
 Β sector	
 Β CAs.	
 Β 
ExecuPve	
 Β Order	
 Β 810	
 Β (2009)	
 Β 
β€’β€― InformaPon	
 Β and	
 Β CommunicaPon	
 Β 
Technology	
 Β Office	
 Β (ICTO)	
 Β under	
 Β 
DOST	
 Β is	
 Β put	
 Β in-­‐charged	
 Β of	
 Β the	
 Β IT	
 Β 
infrastructure	
 Β and	
 Β operaPons	
 Β for	
 Β 
the	
 Β NaPonal	
  CerPficate	
 Β authority	
 Β 
(CA).	
 Β 
ExecuPve	
 Β Order	
 Β 810	
 Β (2009)	
 Β 
Department	
 Β of	
 Β Science	
 Β and	
 Β Technology	
 Β 
(DOST)	
 Β 
β€’β€― Advanced	
 Β Science	
 Β and	
 Β 
Technology	
 Β InsPtute	
 Β (ASTI)	
 Β 
under	
 Β DOST	
 Β is	
 Β put	
 Β in-­‐charged	
 Β 
of	
 Β Technology	
 Β and	
 Β project	
 Β 
management	
 Β of	
 Β the	
 Β NaPonal	
 Β 
PKI	
 Β iniPaPve.	
 Β 
ExecuPve	
 Β Order	
 Β 810	
 Β (2009)	
 Β 
Advanced	
 Β Science	
 Β and	
 Β Technology	
 Β InsMtute	
 Β 
(ASTI)	
 Β 
Roles	
 Β 
β€’β€― CA=	
  CerPficate	
 Β Authority	
 Β 
β€’β€― RA=	
 Β RegistraPon	
 Β 
Authority	
 Β 
ExecuPve	
 Β Order	
 Β 810	
 Β (2009)	
 Β 
CA	
 Β 
RA	
 Β  RA	
 Β  RA	
 Β 
Policy	
 Β  Procedures	
 Β 
LegislaPon	
 Β 
Enhancing System Security Using PKI
Philippines	
 Β 
NaPonal	
 Β PKI	
 Β 
Technology	
 Β 
EncrypPon	
 Β  AuthenPcaPon	
 Β 
LegislaPon	
 Β 
Digital	
 Β 
Signature	
 Β 
In Conclusion…
Why	
 Β Should	
 Β Banks	
 Β Use	
 Β PKI?	
 Β 
Miss	
 Β World	
 Β 2013	
 Β 	
 Β 
	
 Β 
September	
 Β 28,	
 Β 2013…	
 Β 
Megan	
 Β 
Young	
 Β 
September	
 Β 29,	
 Β 2013…	
 Β 
Enhancing System Security Using PKI
Β Other	
 Β variants	
 Β of	
 Β 
malware	
 Β email…	
 Β 
Enhancing System Security Using PKI
Simple	
 Β Email	
 Β Content…	
 Β 
Enhancing System Security Using PKI
Enhancing System Security Using PKI
Β How	
 Β do	
 Β we	
 Β know	
 Β 
who	
 Β is	
 Β your	
 Β real	
 Β 
friend	
 Β in	
 Β the	
 Β 
anonymous	
 Β world	
 Β 
of	
 Β Internet?	
 Β 
Wouldn’t	
 Β it	
 Β be	
 Β nice	
 Β if…	
 Β 
Enhancing System Security Using PKI
Enhancing System Security Using PKI
Enhancing System Security Using PKI
Enhancing System Security Using PKI
How	
 Β do	
 Β you	
 Β know	
 Β if	
 Β this	
 Β actually	
 Β belong	
 Β to	
 Β a	
 Β 
legiMmate	
 Β organizaMon?	
 Β 
Give	
 Β your	
 Β POS	
 Β Terminal	
 Β an	
 Β idenMty!	
 Β 
Introducing…	
 Β 
Enhancing System Security Using PKI
JCOP	
 Β RFID	
 Β Card	
 Β with	
 Β PKI	
 Β Enabled	
 Β 
Chip	
 Β 
The	
 Β Security	
 Β of	
 Β ZiaPay	
 Β 
β€’β€― Each	
 Β ZiaPay	
 Β terminal	
 Β is	
 Β equipped	
 Β with	
 Β a	
 Β digital	
 Β 
cerPficate	
 Β 
β€’β€― Each	
 Β transacPon	
 Β is	
 Β signed	
 Β to	
 Β ensure	
 Β 
authenPcity	
 Β 
β€’β€― Each	
 Β transacPon	
 Β is	
 Β encrypPon	
 Β to	
 Β ensure	
 Β 
privacy	
 Β 
β€’β€― ConnecPon	
 Β between	
 Β each	
 Β Ziapay	
 Β terminal	
 Β and	
 Β 
the	
 Β servers	
 Β are	
 Β secured	
 Β using	
 Β SSL	
 Β 
Case Study:
ePayment  Customs
Declaration
Forwarding Agent
DAGANG NET
KDRM
Code	
 Β 20	
 Β -­‐	
 Β Approval	
 Β obtained	
 Β from	
 Β KDRM	
 Β 
Code	
 Β 25	
 Β -­‐	
 Β Pre-­‐credit	
 Β received	
 Β 	
 Β 
(3a)ConfirmationofPayment
(3) Execute Payment
Web (https)
(5) Pre-credit received
(5) Pre-credit received
(1) Customs Declaration (CUSDEC)
(1) Customs Declaration (CUSDEC)
(2) Customs Acknowledgement (Code 20)
(2) Customs Acknowledgement (Code 20)
(4a) Auto-Debit Advice
(4b) Auto-Credit Advice
(4a) Debit Advice
(4b) Credit Advice
BNM
RENTAS
Immediate on-line crediting to KDRM

More Related Content

PPTX
Future of Public Key Infrastructure
PDF
PKI in Korea
PPT
PKI and Applications
PDF
Pki and OpenSSL
PDF
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
PDF
electronic_payment_system_in_korea_eng
PPTX
Digital signature
PDF
SG(Signgate) PKI Abroad Business
Future of Public Key Infrastructure
PKI in Korea
PKI and Applications
Pki and OpenSSL
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
electronic_payment_system_in_korea_eng
Digital signature
SG(Signgate) PKI Abroad Business

What's hot (20)

PDF
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PPTX
Digital certificates and information security
PPTX
Electronic signature
PDF
Understanding Digital Certificates & Secure Sockets Layer
PPTX
Digital signatures
PPTX
Digital signature
PPT
Marco Casassa Mont: Pki overview
PPTX
Esign or Electronic Signature
PPTX
Seminar presentation on digital signature ppt
PPTX
Electronic signature
PDF
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
PPTX
Digital signature(Cryptography)
PPTX
Digital signature certificate
PPT
Implementing Public-Key-Infrastructures
PDF
Digital certificates & its importance
Β 
PPTX
Digital Certificates and Secure Web Access
PPTX
Digital signatures and e-Commerce
PPT
Overall cryptography and pki introduction
PPT
Digital Signature
PDF
What are the duties of the subscriber of Digital Signature Certificate? [#48]
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
Digital certificates and information security
Electronic signature
Understanding Digital Certificates & Secure Sockets Layer
Digital signatures
Digital signature
Marco Casassa Mont: Pki overview
Esign or Electronic Signature
Seminar presentation on digital signature ppt
Electronic signature
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Digital signature(Cryptography)
Digital signature certificate
Implementing Public-Key-Infrastructures
Digital certificates & its importance
Β 
Digital Certificates and Secure Web Access
Digital signatures and e-Commerce
Overall cryptography and pki introduction
Digital Signature
What are the duties of the subscriber of Digital Signature Certificate? [#48]
Ad

Viewers also liked (20)

PPTX
Cryptography and PKI
PPT
Information Security Lesson 9 - Keys - Eric Vanderburg
PPTX
Towards the Cross-Domain Interoperability of IoT Platforms - EuCNC, 30 Jun 20...
PPTX
AssureBridge - SSO to Many B2B Service Providers - Marketing presentation
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
PPTX
Tutorial membuat Public Key Infrastructure
PPTX
IoT Day 2016: Cloud Services for IoT Semantic Interoperability
PPTX
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
PPTX
Engineering Cryptographic Applications: Symmetric Encryption
PPTX
A CONTEMPLATION OF OPENIG DEEP THOUGHTS
PDF
IoT Interoperability: a Hub-based Approach
PDF
OpenSSL Basic Function Call Flow
PPTX
Securing Access Through a Multi-Purpose Credential and Digital ID
PDF
Interoperability with Standardless IoT (Global IoT Day Wien)
PPTX
Webinar: OpenAM 12.0 - New Featurs
PPTX
Ecosystems, Platforms and Interoperability in IoT - 22/11/2013
PPTX
OpenIDM: An Introduction
PPTX
Identity Manager Opensource OpenIDM Architecture
PDF
Crypto With OpenSSL
Cryptography and PKI
Information Security Lesson 9 - Keys - Eric Vanderburg
Towards the Cross-Domain Interoperability of IoT Platforms - EuCNC, 30 Jun 20...
AssureBridge - SSO to Many B2B Service Providers - Marketing presentation
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Tutorial membuat Public Key Infrastructure
IoT Day 2016: Cloud Services for IoT Semantic Interoperability
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
Engineering Cryptographic Applications: Symmetric Encryption
A CONTEMPLATION OF OPENIG DEEP THOUGHTS
IoT Interoperability: a Hub-based Approach
OpenSSL Basic Function Call Flow
Securing Access Through a Multi-Purpose Credential and Digital ID
Interoperability with Standardless IoT (Global IoT Day Wien)
Webinar: OpenAM 12.0 - New Featurs
Ecosystems, Platforms and Interoperability in IoT - 22/11/2013
OpenIDM: An Introduction
Identity Manager Opensource OpenIDM Architecture
Crypto With OpenSSL
Ad

Similar to Enhancing System Security Using PKI (20)

PPT
open house electronic environment IT Act
PPT
Information-Technology-Act 2000- An overview-sethassociates
PPT
The Hong Kong Public Key Infrastruture 2010
PDF
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
PPT
Information technology-act 2000- an overview-sethassociatesppt
PPT
Information technology-act2000-120112080011-phpapp02 2
PPT
Information technology-act 2000- an overview-sethassociatesppt
PPT
It act law ppt
PPTX
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
PPT
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
PPT
IT ACT 2000.ppt
PPTX
Cyber law
PDF
Mulin Holstein PKI-strategy
Β 
PPT
Role of Certification Authority in E-Commerce
DOC
IT Act,2000
PPTX
Public key infrastructure
PPT
Information Technology Act 2000 An Overview
PDF
PKI Industry growth in Bangladesh
PPT
IWMW 2001: PKI: the View from Down Under
Β 
PPT
IT ACT, 2000 (Information Technology Act, 2000)
open house electronic environment IT Act
Information-Technology-Act 2000- An overview-sethassociates
The Hong Kong Public Key Infrastruture 2010
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act2000-120112080011-phpapp02 2
Information technology-act 2000- an overview-sethassociatesppt
It act law ppt
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
IT ACT 2000.ppt
Cyber law
Mulin Holstein PKI-strategy
Β 
Role of Certification Authority in E-Commerce
IT Act,2000
Public key infrastructure
Information Technology Act 2000 An Overview
PKI Industry growth in Bangladesh
IWMW 2001: PKI: the View from Down Under
Β 
IT ACT, 2000 (Information Technology Act, 2000)

More from Chin Wan Lim (12)

PDF
SecureMetric's SecureMAG Volume 8
PPTX
How To Rob A Bank In The 21st Century - PKI Version
PDF
SecureMag 2015 :: Volume 7
PDF
What Miss World 2013 Can Teach A Bank About PKI
PDF
SecureMAG Volume 6 - 2014
PDF
PKI-In-A-Box
PDF
SecureMAG Vol. 5 2012
PDF
SecureMAG Vol 4.
PDF
SecureMAG Vol 3
PDF
Utilizing PKI to Reduce Risk & Cost
PPTX
AEP Netwrorks Keyper HSM & ICANN DNSSEC
PDF
SecureMetric Newsletter: SecureMag Volume 2
SecureMetric's SecureMAG Volume 8
How To Rob A Bank In The 21st Century - PKI Version
SecureMag 2015 :: Volume 7
What Miss World 2013 Can Teach A Bank About PKI
SecureMAG Volume 6 - 2014
PKI-In-A-Box
SecureMAG Vol. 5 2012
SecureMAG Vol 4.
SecureMAG Vol 3
Utilizing PKI to Reduce Risk & Cost
AEP Netwrorks Keyper HSM & ICANN DNSSEC
SecureMetric Newsletter: SecureMag Volume 2

Recently uploaded (20)

PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
Β 
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
DOCX
Unit-3 cyber security network security of internet system
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Funds Management Learning Material for Beg
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
innovation process that make everything different.pptx
PDF
Testing WebRTC applications at scale.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
Paper PDF World Game (s) Great Redesign.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
522797556-Unit-2-Temperature-measurement-1-1.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
Β 
INTERNET------BASICS-------UPDATED PPT PRESENTATION
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Unit-3 cyber security network security of internet system
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Decoding a Decade: 10 Years of Applied CTI Discipline
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Funds Management Learning Material for Beg
QR Codes Qr codecodecodecodecocodedecodecode
innovation process that make everything different.pptx
Testing WebRTC applications at scale.pdf
Sims 4 Historia para lo sims 4 para jugar
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Introuction about WHO-FIC in ICD-10.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Cloud-Scale Log Monitoring _ Datadog.pdf

Enhancing System Security Using PKI

  • 4. What is a Certificate Authority?
  • 5. SECRET Β  MARY’S Β  Public Β Key Β  IDEAL WORLD MESSAGE Β  + Β  ENCRYPTED Β  MESSAGE Β 
  • 6. REAL WORLD SECRET Β  Fake Β  MARY’S Β  Public Β Key Β  MESSAGE Β  + Β  ENCRYPTED Β  MESSAGE Β  MARY’S Β  Public Β Key Β  MODIFIED Β  ENCRYPTED Β  MESSAGE Β  + Β 
  • 7. HOW TO SOLVE PROBLEM? SECRET Β  MESSAGE Β  + Β  ENCRYPTED Β  MESSAGE Β  MARY’S Β  Public Β Key Β 
  • 13. Public Β  Key Β  Infrastructure Β 
  • 14. Public Β  Key Β  Core Β Technology Β  Public Β Key Β Cryptography Β  (Asymmetric Β Cryptography) Β  Very  first Β Asymmetric Β Algorithm Β (RSA) Β was Β  published Β in Β 1977 Β 
  • 15. Public Β  Key Β  Infrastructure Β 
  • 16. Infrastructure Β  InformaPon Β  Technology Β  LegislaPon Β  Enforcement Β  Policy Β  Procedures Β 
  • 18. Disclaimer Β  β€’β€― I Β am Β not Β a Β legal Β pracPPoner Β  β€’β€― I’m Β just Β a Β guy Β with Β experience Β in Β  the Β PKI Β industry Β and Β is Β passionate Β  enough Β about Β PKI Β to Β have Β  researched Β on Β the Β Electronic Β  commerce Β and Β Digital Β Signature Β  Acts Β of Β a Β few Β countries. Β  Do Β not Β take Β what Β I Β say Β as Β  legal Β advice! Β 
  • 20. Electronic Β Commerce Β Act Β 2000 Β  β€’β€― β€œElectronic” Β Signatures Β becomes Β acceptable Β in Β court Β  (Sect Β 8-­‐11). Β  β€’β€― Sec Β 5.E Β β€œElectronic Β signature” Β refers Β to Β any Β disPncPve Β  mark, Β characterisPc Β and/or Β sound Β in Β electronic Β form, Β  represenPng Β the Β idenPty Β of Β a Β person Β and Β a_ached Β to Β  or Β logically Β associated Β with Β the Β electronic Β data Β  message Β or Β electronic Β document Β or Β any Β methodology Β  or Β procedures Β employed Β or Β adopted Β by Β a Β person Β and Β  executed Β or Β adopted Β by Β such Β person Β with Β the Β intenPon Β  of Β authenPcaPng Β or Β approving Β an Β electronic Β data Β  message Β or Β electronic Β document. Β  Β 
  • 21. β€œElectronic Β Signature” Β  Sec. Β 8. Β Legal Β Recogni/on Β of Β Electronic Β  Signatures. Β An Β electronic Β signature Β on Β the Β  electronic Β document Β shall Β be Β equivalent Β to Β the Β  signature Β of Β a Β person Β on Β a Β wri_en Β document Β if Β  that Β signature Β is Β proved Β by Β showing Β that Β a Β  prescribed Β procedure, Β not Β alterable Β by Β the Β  parPes Β interested Β in Β the Β electronic Β document Β  Rules Β on Β Electronic Β Evidence Β issued Β by Β the Β Supreme Β  court Β in Β 2001 Β men/ons Β specifically Β Asymmetric Β or Β  Public Β Cryptosystem Β (PKI). Β 
  • 22. Electronic Β Commerce Β Act Β 2000 Β  SEC. Β 27. Β Government Β Use Β of Β Electronic Β Data Β  Messages, Β Electronic Β Documents Β and Β Electronic Β  Signatures. Β All Β departments, Β bureaus, Β offices Β and Β  agencies Β of Β the Β government, Β as Β well Β as Β all Β  government-­‐owned Β and-­‐controlled Β corporaPons Β  shall Β within Β 2 Β years, Β accept Β electronic Β documents Β  signed Β with Β β€œElectronic” Β Signatures. Β  Β  h?p://i.gov.ph/e-­‐government-­‐where-­‐are-­‐we-­‐now/ Β 
  • 23. Electronic Β Commerce Β Act Β 2000 Β  SEC. Β 31. Β Lawful Β Access. Β -­‐ Β Access Β to Β an Β electronic Β  file, Β or Β an Β electronic Β signature Β of Β an Β electronic Β data Β  message Β or Β electronic Β document Β shall Β only Β be Β  authorized Β and Β enforced Β in Β favor Β of Β the Β individual Β  or Β enPty Β having Β a Β legal Β right Β to Β the Β possession Β or Β  the Β use Β of Β the Β plaintext, Β electronic Β signature Β or  file Β  and Β solely Β for Β the Β authorized Β purposes. Β The Β  electronic Β key Β for Β idenPty Β or Β integrity Β shall Β not Β be Β  made Β available Β to Β any Β person Β or Β party Β without Β the Β  consent Β of Β the Β individual Β or Β enPty Β in Β lawful Β  possession Β of Β that Β electronic Β key. Β 
  • 24. β€’β€― AdopPon Β of Β a Β naPonal Β level Β  Public Β Key Β Infrastructure. Β  β€’β€― IdenPficaPon Β of Β Agencies Β  responsible. Β  β€’β€― Secng Β up Β of Β framework Β for Β  AccreditaPon. Β  β€’β€― Funding Β and Β resources. Β  β€’β€― DirecPves Β for Β the Β Private Β  sector. Β  β€’β€― Fees. Β  β€’β€― CerPficate Β Authority Β hierarchy. Β  ExecuPve Β Order Β 810 Β (2009) Β 
  • 25. β€’β€― Philippine Β AccreditaPon Β Office Β  (PAO) Β is Β put Β in-­‐charged Β of Β  AccreditaPon Β of Β CerPficate Β  authoriPes Β (CA) Β including Β  private Β sector Β CAs. Β  ExecuPve Β Order Β 810 Β (2009) Β 
  • 26. β€’β€― InformaPon Β and Β CommunicaPon Β  Technology Β Office Β (ICTO) Β under Β  DOST Β is Β put Β in-­‐charged Β of Β the Β IT Β  infrastructure Β and Β operaPons Β for Β  the Β NaPonal Β CerPficate Β authority Β  (CA). Β  ExecuPve Β Order Β 810 Β (2009) Β  Department Β of Β Science Β and Β Technology Β  (DOST) Β 
  • 27. β€’β€― Advanced Β Science Β and Β  Technology Β InsPtute Β (ASTI) Β  under Β DOST Β is Β put Β in-­‐charged Β  of Β Technology Β and Β project Β  management Β of Β the Β NaPonal Β  PKI Β iniPaPve. Β  ExecuPve Β Order Β 810 Β (2009) Β  Advanced Β Science Β and Β Technology Β InsMtute Β  (ASTI) Β 
  • 28. Roles Β  β€’β€― CA= Β CerPficate Β Authority Β  β€’β€― RA= Β RegistraPon Β  Authority Β  ExecuPve Β Order Β 810 Β (2009) Β  CA Β  RA Β  RA Β  RA Β  Policy Β  Procedures Β  LegislaPon Β 
  • 30. Philippines Β  NaPonal Β PKI Β  Technology Β  EncrypPon Β  AuthenPcaPon Β  LegislaPon Β  Digital Β  Signature Β  In Conclusion…
  • 31. Why Β Should Β Banks Β Use Β PKI? Β 
  • 32. Miss Β World Β 2013 Β  Β  Β 
  • 33. September Β 28, Β 2013… Β  Megan Β  Young Β 
  • 36. Β Other Β variants Β of Β  malware Β email… Β 
  • 41. Β How Β do Β we Β know Β  who Β is Β your Β real Β  friend Β in Β the Β  anonymous Β world Β  of Β Internet? Β 
  • 42. Wouldn’t Β it Β be Β nice Β if… Β 
  • 47. How Β do Β you Β know Β if Β this Β actually Β belong Β to Β a Β  legiMmate Β organizaMon? Β 
  • 48. Give Β your Β POS Β Terminal Β an Β idenMty! Β 
  • 51. JCOP Β RFID Β Card Β with Β PKI Β Enabled Β  Chip Β 
  • 52. The Β Security Β of Β ZiaPay Β  β€’β€― Each Β ZiaPay Β terminal Β is Β equipped Β with Β a Β digital Β  cerPficate Β  β€’β€― Each Β transacPon Β is Β signed Β to Β ensure Β  authenPcity Β  β€’β€― Each Β transacPon Β is Β encrypPon Β to Β ensure Β  privacy Β  β€’β€― ConnecPon Β between Β each Β Ziapay Β terminal Β and Β  the Β servers Β are Β secured Β using Β SSL Β 
  • 53. Case Study: ePayment Customs Declaration
  • 54. Forwarding Agent DAGANG NET KDRM Code Β 20 Β -­‐ Β Approval Β obtained Β from Β KDRM Β  Code Β 25 Β -­‐ Β Pre-­‐credit Β received Β  Β  (3a)ConfirmationofPayment (3) Execute Payment Web (https) (5) Pre-credit received (5) Pre-credit received (1) Customs Declaration (CUSDEC) (1) Customs Declaration (CUSDEC) (2) Customs Acknowledgement (Code 20) (2) Customs Acknowledgement (Code 20) (4a) Auto-Debit Advice (4b) Auto-Credit Advice (4a) Debit Advice (4b) Credit Advice BNM RENTAS Immediate on-line crediting to KDRM