European Electronic Signature Standardization

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Bundesamt für Sicherheit in der Informationstechnik EESSI - WS May , 2000, Paris, Folie 1/18Klaus J. Keus, BSI Electronic Signatures in Germany,
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Telia Research AB György Endersz European Electronic Signature Standardisation Initiative EESSI Workshop Barcelona, György Endersz,
Telia Research AB György Endersz European Electronic Signature Standardisation Initiative EESSI Budapest Seminar at the Hungarian Communication.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Summary of ETSI/ESI activities Andrea Caccia ETSI/ESI TB member Note: This document expresses only the views of its author.
Jaroslav Pinkava May 2001 Certification Authority in Praxis. Security Aspects. Conference Security and Protection of Information Ing. Jaroslav Pinkava,
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
M.Sc. Hrvoje Brzica Boris Herceg, MBA Financial Agency – FINA Ph.D. Hrvoje Stancic, assoc. prof. Faculty of Humanities and Social Sciences Long-term Preservation.
EESSI European Electronic Signature Standardisation Initiative
1 Review of the Electronic Transactions Ordinance Information Infrastructure Advisory Committee 9 April 2002.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
EESSI Overview - 1August 2002 EESSI European Electronic Signature Standardisation Initiative Implementing Electronic Signature.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
European Signatures versus Global SignaturesRome, 7 April, 2003 EESSI open specifications and interoperability The state of the art in Italy Giovanni Manca.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
PKI Services for the Public Sector of the EU Member States Dr. Dimitrios Lekkas Dept. of Products & Systems Design Engineering University of the Aegean.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure Ammar Hasayen ….
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
National Smartcard Project Work Package 8 – Security Issues Report.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
8 Nob 06 / CEN/ISSS ETSI STF 305: Procedures for Handling Advanced Electronic Signatures on Digital Accounting CEN/ISSS Workshop.
Niall Curran E-Commerce Division Department of Public Enterprise
"certification service provider" Electronic Signatures
E-Signatures The Community framework on e-signatures (Directive 1999/93/EC) Dr Ioannis Iglezakis Visiting Lecturer University of Thessaloniki, Greece.
IBT- Electronic Commerce The Legal Infrastructure Victor H. Bouganim WCL, American University.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
Riccardo Genghini - Ws E-Sign Chairman – IETF PKIX San Francisco March Electronic Signature infrastructure for Europe Riccardo Genghini Cen/Isss.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant.
CONFERENCE IMPLEMENTATION OF MARKETS IN FINANCIAL INSTRUMENTS DIRECTIVE -MiFID- Split, June 2007 OPENING SPEECH Ante Samodol President of the Board.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
OASIS Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity OASIS Digital Signature Services and ETSI standards Juan Carlos.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
TAG Presentation 18th May 2004 Paul Butler
OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.
66 items – 70% of circulated products
TeleTrusT Initiatives for PKI Solutions
TAG Presentation 18th May 2004 Paul Butler
S/MIME T ANANDHAN.
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
PKI Services for the Public Sector of the EU Member States
Dashboard eHealth services: actual mockup
Hans Dufourmont Eurostat Unit E4 – Structural Funds
Hans Dufourmont Eurostat Unit E4 – Structural Funds
Presentation transcript:

European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, S Patrick van Eecke, ICRI, University of Leuven, B Nick Pope, Security & Standards, UK Denis Pinkas, Bull, F For more information: www.ict.etsi.org

EESSI: European Electronic Signature Standardization Industry Initiative led by ICT Standards Board (CEN, ETSI, ...) Based on a mandate from European Commission Support the requirements of the EU Directive AND The requirements for standards from users and industry First phase: Inventory and work programme Supported by an expert team, reported on July 1 Next phase: Implementation of work programme

Agenda for today The EU Directive and its implications for standardization A standardization framework for electronic signature Standards for CSPs Standards for signature creation and verification products Interoperability standards Proposed work programme and how to participate

The EU Directive and its implications for Standardization Presented by Patrick Van Eecke, ICRI K.U.Leuven This presentation is not a formal interpretation of the Directive on Electronic Signatures and thus does not represent the position of the European Commission

Status of the directive 13 May 1998: Proposal of draft directive by the Commission 23 October 1998: Publication of draft directive in O.J. 13 January 1999: European Parliament opinion in First Reading 22 April 1999: Political agreement on the Common Position by Telecommunications Council 24 June 1999: Common position of the Council Autumn 1999: Second reading by the Parliament and Council End 1999: Final adoption Implementation: within 18 months after adoption (2001)

Definitions Electronic signature Certification service provider (CSP) Advanced electronic signature Signature creation/verification data Signature creation/verification device Qualified certificate “Qualified Signature”

Scope of the Directive

CSP issuing qualified certificates Internal market 1. Authorisation (obligatory) 2. Accreditation (voluntary) forbidden allowed 3. Supervision CSP issuing qualified certificates to the public Obligation for Member States to control via supervision E.g. self-declaration scheme with subsequent control by governmental body or private institution

Legal Recognition Electronic signatures General principle (art. 5.2): Legal effect for all electronic signatures Second principle (art.5.1): certain electronic signatures get the same legal effect as hand-written signature Electronic signatures Advanced electronic signatures Qualified signature: advanced electronic signature + qualified certificate + secure signature creation device Qualified signatures

The Annexes Requirements Recommendations Annex I: Qualified certificate Annex II: Certification Service Providers issuing qualified certificates Annex III: Secure Signature Creation Device Recommendations Annex IV: Signature Verification

Liability Only for CSP fulfilling Annex II and issuing/guaranteeing qualified certificates to the public Liability causes Incorrect contents of the certificate Person identified in certificate does not hold corresponding signature creation data Incorrect matching of signature creation and verification data (if CSP provides these data) Malfunctioning of the CRL Exemptions CSP can prove he has not acted negligently Certificate is used contrary to the limits on the use of the certificate

International aspects Foreign certificates = Qualified certificates if: Foreign CA fulfils same requirements + accreditation by Member State or A European CA guarantees for the foreign CA Recognition by treaty with EU

Electronic signature committee Representatives of the Member States and chaired by a representative of the Commission Clarifying the requirements of the annexes; Establishing the criteria for the designation of national bodies which determine the conformity of secure signature creation devices with Annex III (see Article 3.2b); Determining the generally recognised standards for electronic signature products which would comply with the requirements laid down in point (e) of Annex II and Annex III (see Article 3.3). EESSI recommendation: Adding an advisory group to the Committee consisting of industry experts

A Standardization Framework for Electronic Signature Presented by Hans Nilsson iD2 Technologies

Types of Electronic Signatures

Levels of standardization and regulation EU Directive National implementation National Legislation Signature Law Directive Level 1 Ordinance Annexes National Decree (high-level reqs) Level 2 Supervision Technical Rules International functional and quality standards Level 3 Conformity assessment Standards International interoperability standards Level 4

International Conformity Assessment Accreditation body for Certification bodies EN 45010 Assessment of Certification bodies Certification body Certification body for products for management systems EN 45011 EN 45012 Certification of Certification of Products Management Systems Manufacturer/ Manufacturer/ Supplier Supplier

Formal certification vs Manufacturer’s Declarations New Approach directives only “essential requirements” Detailed standards published in Official Journal Conformity assessment “modules”: Formal evaluation by Notified Body, or Manufacturer’s Declaration The ES Directive is not strictly a New Approach directive ! Formal evaluation required for Secure signature creation devices (Annex III) Trustworthy systems used by CSPs (Annex Iie) Industry would like to see the use of both Formal evaluations and Manufacturer’s Declarations!

Technical Framework for Qualified Electronic Signatures Although “technology neutral”, the Directive implicitly defines a technical framework We need to define a “first sets of components” that can be used A proposed first set that can be used: Asymmetric cryptography (digital signatures) Certificate based verification using X.509 Public Key Infrastructure with CAs and Directories Smart cards and other hardware tokens for private key protection Reasons for this selection: Generally accepted, existing standards Urgent need for standardized use of these technologies! Other sets of components can be introduced as soon as there is a need and basis for standardization

Quality & Functional Standards for Certification Service Providers Presented by Nick Pope Security & Standards Consultancy Ltd

Certification Service Provider (CSP) Services Certification Authority Registration Authority Directory Time-stamping Attribute Authority Trusted Archive Notarisation

General Requirements Security Management of CSPs Technology / service independent requirements Reliability Personnel, management administration Policy documentation e.g BS 7799, ISO TR 13335 (GMITS)

CSP Issuing Qualified Certificates Annex II - Requirements Reliability Revocation & timing of revocations Verify subject identity / attributes Personnel and management Trustworthy systems, cryptographic modules Financial / liability Protect against forgery, confidentiality Record relevant information Keep keys secret

CSP Issuing Qualified Certificates Minimum Policy Requirements Security Management Technical Requirements “Qualified” Certificate Policy Internet RFC 2527 Framework for Certificate Policies

CSP Issuing Qualified Certificates Trustworthy systems & cryptographic modules Standard for Trusted Systems e.g. Common Criteria Protection Profile CS-2 Standard for Cryptographic Security e.g. Equivalent to FIPS 140-1

Certification Service Provider (CSP) Services CSP Service Relating to Qualified Certificates Certification Authority Registration Authority Directory Other CSP Services Time-stamping Attribute Authority Trusted Archive Notarisation

CSP Issuing Time Stamps Security Management Requirements Technical Requirements Use of Trusted Systems

Other CSP Services Attribute Authorities Trusted Archive Notarisation Needs better understanding of requirements

Requirement for CSP Quality & Functional Standards CSP Security Management Security Management & Certificate Policy for CSPs Issuing Qualified Certificates Use of Trusted Systems for CSPs Issuing Qualified Certificates Security Management & Policy for CSPs Issuing Time Stamps

Presented by Hans Nilsson iD2 Technologies Functional and Quality Standards for Signature Creation and Verification Products Presented by Hans Nilsson iD2 Technologies

Secure Signature Creation Devices (Annex III) “Practically occur once, secrecy reasonably assured” high quality key generation and key protection strong algorithms, sufficient key length PIN/password, resistant to dictionary attacks and exhaustive search Signature created inside device, key never leaves device? no backup copy, or copy of device? => smart card or other hardware device! Security requirement standard needed Germany, Italy: ITSEC security target US, Canada: FIPS 140-1 cryptographic module Eurosmart Common Criteria Protection Profiles: Smartcard Integrated Circuit Smartcard IC with embedded software

Secure signature creation process and environment Not required in the Directive, but guidelines are still needed for: User interface User urged to verify the information before signing Willful act: PIN every time? Mouse-click enough? Handling of signing device and PIN (in contract with CSP) …… Operating environment and management Secure or unsecure card reader Protection against malicious software

Signature verification (Annex IV) Only recommendations in the Directive, but guidelines needed for: Human and computer-based verification Short-term authentication: All information used for verification shall be “displayed” Certificate chain shall be verified Revocation checks shall be performed Long-term validation of electronic signatures: evidence for independent adjudicator requires time-stamping

Presented by Denis Pinkas Bull Interoperability standardization requirements for Electronic Signatures Presented by Denis Pinkas Bull

Syntax and encoding Specification of the syntax and encoding format of an Electronic Signature, including support for multiple signatures and roles Enhance CMS – S/MIME and add “ time-stamping ” to support long term validation (*). ETSI TC Security is working in this area. Standard for the use of X.509 public key certificates as qualified certificates Support of the on-going work in IETF PKIX and after its completion, consider if any item is missing (*) For long term Electronic Signature validation see: http://www.id2tech.com/news/pdf/ES_validation.pdf http://www.openmaster.com/whitepapers/es_validation.pdf

Syntax and encoding (continued) Profile for Certificates Revocation Lists (CRLs), Authority Revocation Lists (ARLs), OSCP responses and Time Stamps. ETSI TC Security should address this requirement. Standard for storing private keys and other PKI objects on smart cards The PKCS#15 standard may provide the starting point, but this might be continued by ISO/ JTC1/ SC17. Standard for description of the constituents of a signature policy understandable both by a human being and a computer. ETSI TC Security should address this requirement Standard to reference signature policies.

Additional needs Establish a repository for certificate policies, signature policies or contract types. The ICC repository being set up under the E-terms initiative could be used. Define generic roles relevant to current transactions or contracts An appropriate international organization should define them (ICC or UNICITRAL)

Studies are needed for ... Solving name forms and name collisions both from a technical and legal point of view. topic partly addressed by the PKIX WG that may have to be complemented. The handling of name and certificate policy constraints in the verification of a certification path. RFC 2459 does not fully address this concern and an extension to that document should be studied and then proposed to the PKIX working group. A better understanding of the signature policies.

Studies are also needed for (continued) ... The way to handle large numbers of revoked certificates. The way to handle suspended certificates in the context of their use in Electronic Signatures. The roles of notaries in an electronic world both from a technical perspective and a business perspective.

Protocols For access to a Time Stamping service. For access to a repository holding time-stamped certificates and scalable revocation information. To allow registration without the need to exchange a secret by out-of-bands means. To allow registration involving smart cards and in particular smart cards being able to generated key pairs. A profiling of the On Line Certificate Status protocol issued by the IETF may be needed. A profiling of the Time Stamping protocol under study by the PKIX working group may be needed, once this protocol is published by the IETF.

Application Program Interfaces (API) Define APIs to allow access to various PKI infrastructures on top of the operational and management PKIX protocols. Experiment the IDUP non repudiation APIs in conjunction with a standard format for electronic signatures in order to test both portability and interoperability.

Work programme and participation

High-priority work areas

How can YOU participate?? CEN/ISSS Workshop for Electronic Signatures Initial planning meeting: October 11, Brussels Workshop kickoff: December 16-17, Brussels Result: CEN Workshop Agreements Contact: luc.vandenberghe@cenorm.be or hans.nilsson@id2tech.com ETSI SEC: Electronic Signatures Infrastructure WG Information on October 11 ESI WG meeting: November 23 Result: ETSI Standards Contact: gyorgy.g.endersz@telia.se