SlideShare a Scribd company logo
1 of 14
Download to read offline
RedOffice Document Security
Guan Zhi ★ Peking Univ.
About RedOffice
RedOffice is the proprietary office suit based on OpenOffice.org
provided by the company RedFlag2000 in China.
The features of RedOffice include
better chinese language and localization support
chinese style documents support and etc.
OpenOffice Document Security
The current OpenOffice security mechanisms include:
Password based encryption, defined in “Open Document
Format for Office Applications (OpenDocument) v1.0
Specification” section 16.3.
Digital signature based on PKI, provided in OpenOffice.org
3.0, menu:file:digital signatures ...
Our Aim is ...
To enhance RedOffice/OpenOffice documents security with
cryptography.
What is Required
Compared with PDF document, OpenOffice document lacks:
Certificate based document encryption.
GUI supported key/certificate generation and management.
Graphical digital signature display.
And even more ...
Password Generator
In password based encryption, users always choose very weak
passwords, which makes the encrypted documents easily broken.
Password generator is a program/extension which helps the user
to generate more secure and easily remembered passwords.
Certificate Based Encryption
With certificate based encryption an Office author can encrypt a
document with multiple recipient’s certificates.
For a group of users to share documents, certificate based
encryption is much more easier and secure than password based
encryption.
Key/Certificate Management
Current OpenOffice.org requires the user to import certificates
and private keys for digital signature generation, while does not
provide certificate management functionalities.
Certificate Extension: Certificate and key pair generation utilities
for RedOffice/OpenOffice.org.
Crypto Framework Extension
A cryptographic framework extension for RedOffice/
OpenOffice.org.
The cryptographic API is based on the PKCS #11: Cryptographic
Token Interface Standard, supported on both Windows and
Linux.
Third party cryptographic algorithms, modules and hardware
tokens such as smart card and USB key can be integrated into
RedOffice/OpenOffice.org.
Advance Cryptography
Identity based encryption, for simplicity of public key
management.
Attribute based encryption, for simplicity of document sharing
and access control based on document encryption.
Paper Based Security
When a document is printed on the paper, all the security
attributes are disappeared.
With printed 1-D or 2-D barcode, the security attributes can be
reserved on the printed paper documents.
Key Management Service
Basically, it is a PKI Certificate Authority with additional
functionalities.
Generation, distribution, management of keys and certificates.
Supporting advanced cryptography and key policies.
Document Security Service
An ordinary office user only know who is the document recipient,
without the detailed knowledge of how to protect the document.
Document security service is an online service to provide
RedOffice/OpenOffice.org documents with automated public key
encryption, digital signature and other security attributes.
The service will choose what kind of security mechanisms and
policies should be applied to the document, and executes the
corresponding security operations.
END
for more details, connect <guanzhi@infosec.pku.edu.cn>

More Related Content

Similar to Red Office Documents Security Proposal

LibreOffice/OpenOffice.org - non coding extensions
LibreOffice/OpenOffice.org - non coding extensionsLibreOffice/OpenOffice.org - non coding extensions
LibreOffice/OpenOffice.org - non coding extensions
Kálmán "KAMI" Szalai
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
mohammadirfan136964
 

Similar to Red Office Documents Security Proposal (20)

Lobodms Integration
Lobodms IntegrationLobodms Integration
Lobodms Integration
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
Liferay Integration
Liferay IntegrationLiferay Integration
Liferay Integration
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
Alfresco Integration
Alfresco  IntegrationAlfresco  Integration
Alfresco Integration
 
Presentation
PresentationPresentation
Presentation
 
Thawte Code Signing Certificate Feature and Benefits
Thawte Code Signing Certificate Feature and BenefitsThawte Code Signing Certificate Feature and Benefits
Thawte Code Signing Certificate Feature and Benefits
 
LincDoc Enterprise Edition brochure
LincDoc Enterprise Edition brochureLincDoc Enterprise Edition brochure
LincDoc Enterprise Edition brochure
 
LibreOffice/OpenOffice.org - non coding extensions
LibreOffice/OpenOffice.org - non coding extensionsLibreOffice/OpenOffice.org - non coding extensions
LibreOffice/OpenOffice.org - non coding extensions
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
 
ODFKit
ODFKitODFKit
ODFKit
 
2016 Readium LCP workshop at EPUB Summit
2016 Readium LCP workshop at EPUB Summit2016 Readium LCP workshop at EPUB Summit
2016 Readium LCP workshop at EPUB Summit
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
 
Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
 
Badusha_Profile
Badusha_ProfileBadusha_Profile
Badusha_Profile
 

More from Zhi Guan

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
Zhi Guan
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
Zhi Guan
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
Zhi Guan
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
Zhi Guan
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump Session
Zhi Guan
 
A Survey of Identity-Based Encryption
A Survey of Identity-Based EncryptionA Survey of Identity-Based Encryption
A Survey of Identity-Based Encryption
Zhi Guan
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
Zhi Guan
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
Zhi Guan
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
Zhi Guan
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
Zhi Guan
 

More from Zhi Guan (11)

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
 
Easy CPK
Easy CPKEasy CPK
Easy CPK
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
 
CPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump SessionCPK in Eurocrypt 2007 Rump Session
CPK in Eurocrypt 2007 Rump Session
 
A Survey of Identity-Based Encryption
A Survey of Identity-Based EncryptionA Survey of Identity-Based Encryption
A Survey of Identity-Based Encryption
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Red Office Documents Security Proposal

  • 1. RedOffice Document Security Guan Zhi ★ Peking Univ.
  • 2. About RedOffice RedOffice is the proprietary office suit based on OpenOffice.org provided by the company RedFlag2000 in China. The features of RedOffice include better chinese language and localization support chinese style documents support and etc.
  • 3. OpenOffice Document Security The current OpenOffice security mechanisms include: Password based encryption, defined in “Open Document Format for Office Applications (OpenDocument) v1.0 Specification” section 16.3. Digital signature based on PKI, provided in OpenOffice.org 3.0, menu:file:digital signatures ...
  • 4. Our Aim is ... To enhance RedOffice/OpenOffice documents security with cryptography.
  • 5. What is Required Compared with PDF document, OpenOffice document lacks: Certificate based document encryption. GUI supported key/certificate generation and management. Graphical digital signature display. And even more ...
  • 6. Password Generator In password based encryption, users always choose very weak passwords, which makes the encrypted documents easily broken. Password generator is a program/extension which helps the user to generate more secure and easily remembered passwords.
  • 7. Certificate Based Encryption With certificate based encryption an Office author can encrypt a document with multiple recipient’s certificates. For a group of users to share documents, certificate based encryption is much more easier and secure than password based encryption.
  • 8. Key/Certificate Management Current OpenOffice.org requires the user to import certificates and private keys for digital signature generation, while does not provide certificate management functionalities. Certificate Extension: Certificate and key pair generation utilities for RedOffice/OpenOffice.org.
  • 9. Crypto Framework Extension A cryptographic framework extension for RedOffice/ OpenOffice.org. The cryptographic API is based on the PKCS #11: Cryptographic Token Interface Standard, supported on both Windows and Linux. Third party cryptographic algorithms, modules and hardware tokens such as smart card and USB key can be integrated into RedOffice/OpenOffice.org.
  • 10. Advance Cryptography Identity based encryption, for simplicity of public key management. Attribute based encryption, for simplicity of document sharing and access control based on document encryption.
  • 11. Paper Based Security When a document is printed on the paper, all the security attributes are disappeared. With printed 1-D or 2-D barcode, the security attributes can be reserved on the printed paper documents.
  • 12. Key Management Service Basically, it is a PKI Certificate Authority with additional functionalities. Generation, distribution, management of keys and certificates. Supporting advanced cryptography and key policies.
  • 13. Document Security Service An ordinary office user only know who is the document recipient, without the detailed knowledge of how to protect the document. Document security service is an online service to provide RedOffice/OpenOffice.org documents with automated public key encryption, digital signature and other security attributes. The service will choose what kind of security mechanisms and policies should be applied to the document, and executes the corresponding security operations.
  • 14. END for more details, connect <guanzhi@infosec.pku.edu.cn>