Advertisement

Legal and Security Aspects

  • Stefano Ferilli
Part of the Advances in Pattern Recognition book series (ACVPR)

Abstract

The characteristics of digital documents that are desirable for normal tasks pose severe security problem in official documents, which must be tackled and solved in order to foster digital document adoption in formal environments. This chapter deals with security and legal aspects concerning digital documents and their production, exchange and exploitation. This is a hot topic as long as digital documents are progressively taking the place of classical paper ones also in the administration context, where issues such as property, non-withdrawal, certification, protection of content cannot be ignored. Hence, the current trends in cryptography and digital signature technologies to solve these issues are proposed, along with the legal initiatives in various countries to enforce digital document exploitation.

Keywords

Digital Signature Access Point Secret Message Certificate Authority Electronic Signature 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Data Encryption Standard. Tech. rep. FIPS Pub. 46-1, National Bureau of Standards, Washington, DC, USA (1987) Google Scholar
  2. 2.
    Secure Hash Standard (SHS). Tech. rep. FIPS PUB 180, National Institute of Standards and Technology (1993) Google Scholar
  3. 3.
    Secure Hash Standard (SHS). Tech. rep. FIPS PUB 180-1, National Institute of Standards and Technology (1995) Google Scholar
  4. 4.
    Digital Signature Standard (DSS). Tech. rep. FIPS PUB 186-1, National Institute of Standards and Technology (1998) Google Scholar
  5. 5.
    Merriam-Webster’s Collegiate Dictionary, 10th edn. Merriam-Webster Inc. (1999) Google Scholar
  6. 6.
    Secure Hash Standard (SHS)—amended 25 February 2004. Tech. rep. FIPS PUB 180-2, National Institute of Standards and Technology (2002) Google Scholar
  7. 7.
    Secure Hash Standard (SHS). Tech. rep. FIPS PUB 180-3, National Institute of Standards and Technology (2008) Google Scholar
  8. 8.
    Digital Signature Standard (DSS). Tech. rep. FIPS PUB 186-3, National Institute of Standards and Technology (2009) Google Scholar
  9. 9.
    Abdul-Rahman, A.: The PGP trust model. EDI-Forum (1997) Google Scholar
  10. 10.
    Callas, J., Donnerhacke, L., Finney, H., Shaw, D., Thayer, R.: OpenPGP message format. Tech. rep. RFC 4880, IETF (2007) Google Scholar
  11. 11.
    Carnelutti, F.: Studi sulla sottoscrizione. Rivista di Diritto Commerciale, p. 509 ss. (1929) (in Italian) Google Scholar
  12. 12.
    Cocks, C.C.: A note on ‘non-secret encryption’. Tech. rep., GCHQ (1973) Google Scholar
  13. 13.
    Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, T.: Internet X.509 Public Key Infrastructure certificate and Certificate Revocation List (CRL) profile. Tech. rep. RFC 5280, Internet Engineering Task Force (IETF) (2008) Google Scholar
  14. 14.
    Department for Culture, Media and Sport, Department for Business, Innovation and Skills: Digital Britain—final report. Tech. rep., UK Government (2009) Google Scholar
  15. 15.
    Diffie, W.: An overview of public key cryptography. IEEE Communications Society Magazine 16, 24–32 (1978) CrossRefGoogle Scholar
  16. 16.
    Diffie, W.: The first ten years of public-key cryptography. Proceedings of the IEEE 76(5), 560–577 (1988) CrossRefGoogle Scholar
  17. 17.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976) MathSciNetCrossRefGoogle Scholar
  18. 18.
    Diffie, W., Hellman, M.: Privacy and authentication: an introduction to cryptography. Proceedings of the IEEE 67, 397–427 (1979) CrossRefGoogle Scholar
  19. 19.
    Ellis, J.H.: The possibility of secure non-secret digital encryption. Tech. rep., GCHQ (1970) Google Scholar
  20. 20.
    Feistel, H.: Cryptography and computer privacy. Scientific American 128(5) (1973) Google Scholar
  21. 21.
    Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly (1994) Google Scholar
  22. 22.
    Gattuso, A.: Processo telematico. Mondo Professionisti I(13), III–VI (2007) (in Italian) Google Scholar
  23. 23.
    Kaliski, B.: Pkcs #7: Cryptographic message syntax. Tech. rep. RFC 2315, IETF (1998) Google Scholar
  24. 24.
    Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires IX, 5–38 (1883) Google Scholar
  25. 25.
    Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires IX, 161–191 (1883) Google Scholar
  26. 26.
    Lai, X.: On the Design and Security of Block Ciphers. ETH Series in Information Processing, vol. 1. Hartung-Gorre (1992) Google Scholar
  27. 27.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996) CrossRefGoogle Scholar
  28. 28.
    Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical Recipes: The Art of Scientific Computing, 3rd edn. Cambridge University Press, Cambridge (2007) MATHGoogle Scholar
  29. 29.
    Rivest, R.: The MD5 message-digest algorithm. Tech. rep. RFC 1321, Network Working Group (1992) Google Scholar
  30. 30.
    Singh, S.: The Code Book. Doubleday, New York (1999) Google Scholar
  31. 31.
    Sorkin, A.: Lucifer a cryptographic algorithm. Cryptologia 8(1), 22–24 (1984) CrossRefGoogle Scholar
  32. 32.
    Stallings, W.: Cryptography and Network Security. Principles and Practice, 3rd edn. Prentice Hall, New York (2002) Google Scholar
  33. 33.
    Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., Weger, B.D.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology. Lecture Notes in Computer Science, vol. 5677, pp. 55–69. Springer, Berlin (2009) Google Scholar
  34. 34.
    Tosi, E.: Il codice del Diritto dell’Informatica e di Internet, VI edn. (2007) I codici vigenti. La Tribuna (in Italian) Google Scholar
  35. 35.
    Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, New York (1995) Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Dipartimento di InformaticaUniversità di BariBariItaly

Personalised recommendations