Electronic signature - simply, long-term, safely and in accordance with Commission Decision 2011/130/EU Peter Rybár National Security Authority Information.

Slides:



Advertisements
Similar presentations
Universal Electronic Signatures Tarvi Martens ESTONIA.
Advertisements

An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
A Framework for Distributed OCSP without Responders Certificate
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
M.Sc. Hrvoje Brzica Boris Herceg, MBA Financial Agency – FINA Ph.D. Hrvoje Stancic, assoc. prof. Faculty of Humanities and Social Sciences Long-term Preservation.
European Signatures versus Global SignaturesRome, 7 April, 2003 EESSI open specifications and interoperability The state of the art in Italy Giovanni Manca.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Trusted Archive Protocol (TAP) Carl Wallace
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Archive Time-Stamps-Syntax Dr. Ulrich Pordesch
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
1 Update on draft-ietf-smime-cades Current Status Completed last call. Under review by IESG. Comments to be incorporated: –From Pavel Smirnov (during.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Digital Signatures and e-Identity. Getting the best out of DSS / DSS-X services. Andreas Kuehne – DSS-X member.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT By Alexander Beck Jens Graupmann Frank Ortmeier.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Evaluating trusted electronic documents Petr Švéda Security and Protection of Information ‘03 © 2003 Petr Švéda, FI MU.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Evidence Record Syntax <draft-ietf-ltans-ers-00.txt>
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
XML Evidence Record Syntax
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
DIGITAL SIGNATURE.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
TAG Presentation 18th May 2004 Paul Butler
Proposal of ISO/NP Part3 (the profiles for PAdES) from Japan (JISC)
Trust Anchor Management Problem Statement
TAG Presentation 18th May 2004 Paul Butler
Security in ebXML Messaging
Resource Certificate Profile
Digital Certificates and X.509
PKI (Public Key Infrastructure)
National Trust Platform
Presentation transcript:

Electronic signature - simply, long-term, safely and in accordance with Commission Decision 2011/130/EU Peter Rybár National Security Authority Information Security and Electronic Signature Department Budatinska 30, Bratislava 57, Slovak Republic TRUST & SECURITY ON DIGITAL SINGLE MARKET 12th Edition of the Conference, June 04-06th, 2012 Międzyzdroje, Poland

Interoperability - signatures according to CD 2011/130/EU e.g. included in ASiC-S container Electronic document It can contain information in any formats like text, picture, animations, video, sound or specific data. The type of document processing and interpretations is protected in locked AdES fields when the signature is intended for signing more than one of electronic document type. Signature – locked hash by signer’s key in AdES fields Hash of document is locked by private key – signature is created by signer key and stored in fields defined by CMS, XML, PDF AdES. Unlock the hash – fingerprint by public key of a signer e.g. key from certificate Fingerprint - HASH of electronic document Compare two hashes: Equal – document is OK Unequal –fake or bad key

Variety of specific signature formats which are not according to CD 2011/130/EU e.g. as defined in ASiC-E or when the Manifest is used.the Manifest Electronic document Hash of doc 1 Hash of doc 2 … It contains only HASH values of other electronic documents. Signature – locked hash by signer’s key Hash of document is locked by private key – Signature is created by signer’s key. Unlock the hash – fingerprint by public key of a signer e.g. key from certificate Fingerprint - HASH of electronic document Compare two hashes: Equal – document is OK Unequal –fake or bad key Electronic document 1 Electronic document 2 Fingerprint - HASH of electronic document is not checked in standard signature applications

The certificate validity period Rec. ITU-T X.509 | ISO/IEC :2008 Certificate: validity? Usage interval is (notBefore - notAfter) -possible revocation. There is an interval of the CA/RA responsibility and liability of the user’s registration data archiving. This data can be used e.g. in the legal actions. After the certificate(s) for a public key have expired, a signature verifier cannot rely on compromises being notified via CRLs. Time Certificate NotBefore Certificate NotAfter Possible revocation CA is responsible and liable for the user’s registered data in the time interval. Certificate usage interval (validity)

Certificate - What do we expect in the long-term validation? 1.Integrity protection public key, hash value protected with e.g. archive time-stamp or Positive OCSP response 2.Public key connected with identity How long is CA responsible and liable for identify connection in certificate? How long can we rely on CA registration database containing identity information usable in e.g. legal proceedings? For 10 years?

ITU-T Rec. X.509: Private key usage period extension PrivateKeyUsagePeriod ::= SEQUENCE { notBefore [0] GeneralizedTime OPTIONAL, notAfter [1] GeneralizedTime OPTIONAL } This field indicates the period of use of the private key corresponding to the certified public key. It is applicable only for digital signature keys.

Private key is used for e.g. 2 years! Signed e- invoice is archived for 10 years and it can be directly validated in 10 years certificate validity period! Time Certificate NotBefore Certificate NotAfter CA is responsible and liable for the user’s registered data in the time interval. Certificate usage interval (10 years validity) Possible revocation PrivateKeyUsagePeriod notBefore PrivateKeyUsagePeriod notAfter Private Key Usage Period (1-2 years) Certificate status is provided by CA in CRL or in OCSP responses e.g. for 10 years

Revocation and Update of revocation information in CRL or OCSP CRL is issued in a regular interval e.g. 12 hours or immediately after revocation. Retrospective revocation before the time from thisUpdate CRL field is not possible. Time CRL- ThisUpdate Certificates statuses are stable in the interval. OCSP is issued immediately after requesting at ProducedAt. Retrospective revocation before the time from thisUpdate of OCSP field is not possible. Time OCSP-ThisUpdate OCSP- ProducedAt Certificate status is stable in the interval.

Long-term validation with OCSP Single Extensions - CertHash The CertHash extension (Positive Statement) is used in indirect OCSP response as a positive statement that OCSP responder knows the status of the certificate and also provides the integrity protection of the certificate if the certificate is already expired and algorithms used in the certificate could be weak. The CertHash extension (Positive Statement) adopted from Common PKI Optional SigG-Profile is designed to be included in the OCSP singleExtensions of SingleResponse(RFC 2560). Common PKI Object Identifiers: CertHash ::= SEQUENCE { hashAlgorithm AlgorithmIdentifier, -- The identifier of the algorithm that has been used -- the hash value below. certificateHash OCTET STRING -- The hash over DER-encoding of the entire PKC or AC -- (i.e. NOT a hash over tbsCertificate). }

Long-term validation with OCSP Single Extensions - ProofOfExistence The OCSP response with ProofOfExistence extension of signer’s signature can be used as a secure time-mark with the same functionality as expected from the signature time stamp. The ProofOfExistence extension is designed to be included in the singleRequestExtensions of OCSP(RFC 2560) and the same ProofOfExistence must be included in the singleExtensions of SingleResponse(RFC 2560). Object Identifiers: ProofOfExistence ::= SEQUENCE { poEType PoEType DEFAULT poESignerSignatureBinOctets, poE MessageImprint } PoEType ::= INTEGER { poESignerSignatureBinOctets(0), poEAnyDATA(1) } MessageImprint ::= SEQUENCE { -- MessageImprint is defined in RFC 3161 hashAlgorithm AlgorithmIdentifier, hashedMessage OCTET STRING }

The long-term validation The long-term validation must use only information which was updated after the time to which we validate the certificate. Information updated before that time is not stable and later could be changed. Selection of CRL or OCSP response must be according to thisUpdate time whose time value must be later than the signature verification time (signature time-stamp or signature time-mark). Any new certificate revocation time must be with a time value after thisUpdate time of the latest CRL or OCSP. It means before the time value thisUpdate of CRL or OCSP the new revocation must not be realized as a basic rule because a backward revocation is not permitted.

ThisUpdate: CRL/OCSP for validation is unstable - possible signer’s signature certificate revocation. Signature TS or time-mark Certificate status can be changed in the interval after thisUpdate of CRL/OCSP Time Possible revocation! Archive TS x or time- mark Interval PoE where is the evidence that data, certificate, or CRL/OCSP were existing! ThisUpdate of CRL/OCSP for signature validation is in the interval. ThisUpdate of unstable CRL/OCSP for TS validation Signature TS or Archive TS x Certificate status can be changed in the interval. Time Possible revocation! Archive TS x+1 Interval PoE where is the evidence that data, certificate, or CRL/OCSP were existing! ThisUpdate of CRL/OCSP for TS x or signature TS validation is in the interval. Certificate status is stable in CRL/OCSP Signature

Proof of Evidence (PoE) When the usage of the signed document and the signature is expected for the long-term perspective then there must exist a provable evidence that a particular object existed at a particular time. The object which can be used as a proof of evidence (PoE) of particular object existence in the past is e.g. an archive timestamp (ATS) or time mark where at least two types of information are present: the protection of data and the protection of time when such protection of data was realized. PoE protects from the usage of fake objects created e.g. now with algorithms broken now, claiming that the object was created in the past.

Complex X.509 PKI validation Time of the validation moment of CRL or OCSP signature is according to the actual time or interval in the past before archive time- stamp (PoE). If the actual time is used then thisUpdate is the max bound of the time to which the verification was realized (possible revocation after thisUpdate). (Archiving) Time-stamp protects the data (PoE). Time of the validation moment of the signer’s certification path is according to the signature time- stamp

ETSI ESI deprecates long-term formats in chapter 8 ETSI TS V2.1.1 ( ) and requires a new one

CAdES version defines a new long- term-validation attribute to replace old validation material attributes ATS, ATSv2 and a new long-term-validation attribute are not backward compatible with CMS. When parallel CMS signatures are used then new parallel signature must be included only before adding of any ATS, ATSv2 and a new long-term-validation attribute in any parallel signature because by including a signer’s certificate the hash of archiving attributes will be destroyed. CMS validation systems are not able to locate Certificates, CRLs and OCSP responses in many attributes defined by ETSI ESI. CMS UnsignedAttributes are usually BER encoded to achieve a one-pass processing but ETSI TS V2.1.1 requires only DER what causes complicated attribute processing with dangerous limitations and forbides to use many of CAdES implementations created according to CD 2011/130EU. Requirements of ETSI TS V2.1.1 are inconsistent in some chapters. In chapter 8 (LT-Level) there is deprecated the use of old long-term attributes but in chapter 6 there is required as mandatory DER encoding for the old long-term attributes – DER is expected only for ATS. DER encoding of UnsignedAttributes is irrelevant for a new mandatory long- term-validation attribute required in ETSI TS V2.1.1 and mandatory DER requirements have dangerous impact on existing implementations. The archive attributes ATS, ATSv2 and a new long-term-validation attribute defined in CAdES version have at least the following interoperability problems and limitations:

New hash processing requires ordering but does not ensure a selection of particular attributes (intended for e.g. parallel CMS signatures) by CAdES ETSI TS V2.1.1 ( ) and ETSI TS V2.1.1 ( ).

Proposal of a new ATSv3 was registered on ETSI ESI to achieve interoperability and backward compatibility with CMS The new ATSv3 together with a new ATS attribute ATSHashIndex will fix all mistakes and dangerous limitations mentioned in previous slides of previous archiving attributes and a new ATS attribute ATSHashIndex determines the presence and the order of objects included in ATS hash computations what is a way how to achieve a backward compatibility with the present ATS and provide the evidence which objects like certificates, CRL or OCSP responses were protected by ATS in PoE interval (Proof of Existence). The new ATSv3 defines new rules where only objects of CertificateSet, RevocationInfoChoices and UnsignedAttributes are included in ATS hash calculations. There is also a proposal to include a new signature policy attribute where the machine processable signature policy will be stored for the long-term validations.

The archive-time-stamp-v3 attribute The archive-time-stamp-v3 attribute is a time-stamp token. To achieve a backward compatibility with CMS and to protect the signature when parallel signatures are used from redundant objects presence, certificates are included in SignedData-certificates, CRLs are included in SignedData-crls and OCSP responses are included in SignedData-crls-[1] where SignedData-crls- [1]otherRevInfoFormat MUST contain OID id-pkix-ocsp-basic ( ) and SignedData-crls-[1]otherRevInfo MUST contain BasicOCSPResponse. The BasicOCSPResponse is defined in RFC 2560 and when is used for the long-term validation it MUST contain at least OCSP signer’s certificate in BasicOCSPResponse-certs when the certificate is not included in SignedData-certificates. id-aa-ets-archiveTimestampV3 OBJECT IDENTIFIER ::= { itu-t(0) identified- organization(4) etsi(0) electronic-signature-standard(1733) attributes(2) 4 } ArchiveTimeStampToken ::= TimeStampToken

The ATSHashIndex unsigned attribute of ATSv3 The ATSHashIndex attribute is designed to be included in the archive time-stamp (ATS) as an unsigned attribute to allow indexing of hashed objects of SET of signedData- certificates, SignedData-crls and the unsigned attributes of the signature which is archive time-stamped. It means this attribute fixes interoperability problems concerning ordering of BER encoded SET attributes and problems with identification of objects which must not be included in ATS hash calculation (e.g. objects included after ATS). id-aa-ATSHashIndex OBJECT IDENTIFIER ::= { itu-t(0) identified-organization(4) etsi(0) electronic-signature-standard(1733) attributes(2) 5 } ATSHashIndex ::= SEQUENCE { hashIndAlgorithm AlgorithmIdentifier DEFAULT {algorithm id-sha256}, certificatesHashIndex SEQUENCE OF Hash, crlsHashIndex SEQUENCE OF Hash, unsignedAttrsHashIndex SEQUENCE OF Hash } Hash ::= OCTET STRING

One key of NSA Root CA for QES NSA Root CA as Signature Policy Authority / Certificate Policy CA Trust ? AC A Signed history of NSA Root certificates and Signature policies National Trusted List contains signed National TL is in LOTL Self-signed Cross certificate TSL and History signer Secure store in CIA contains NSA cert Long-term positive OCSP for QES

Thank you for your attention! Sources: Interoperability - National profile according to CD 2011/130/EU: Freeware application LockIt created mainly for SK NSA in English, German, Russian and… languages to sign any documents in ZIP package ASiC-S with CAdES, XML Trusted List, PDF and History List of the NSA Root CAs and Signature policies Ing. Peter Rybár