Electronic Signatures

Download Report

Transcript Electronic Signatures

1
Electronic Signatures
Risks of data manipulation and theft
Average route travelled by an email sent via the Internet from A to B
Helsinki
Potential
risks
Cape Town
Paris
Rome
New York
A's provider
B's provider
B
A
Berlin
Washington DC
Sydney
Gateway
Electronic Signatures
Areas of application for electronic signatures
Communicating with public authorities
• eg individuals completing, signing, encrypting and emailing electronic tax returns
• eg building contractors signing, encrypting and emailing electronic bids in response to invitations to tender
Communicating with judicial bodies
• eg lawyers writing, signing, encrypting (safeguarding clients' secrets) and emailing
electronic claims and actions to the competent courts
Communicating in the private sector
• eg customers communicating with companies, for instance for banking purposes
• eg strangers communicating via the Internet
• eg signing emails
Anywhere where legally binding declarations of will require a signature and where
– trustworthy communications,
– reliable identification, and
– integrity of electronic data
are a key factor,
can legally compliant electronic signatures be used.
Electronic Signatures
2
3
Which components does a user need?
• PC and smart card reader
• Smart card with signature key
Smart card reader
Smart
card
• Communication link
• Appropriate software
Electronic Signatures
(Internal/external)
4
What does an electronic signature do?
An electronic signature is the electronic equivalent of a handwritten signature;
in other words, it can be used to
•
reliably verify that an electronic document
has not been modified,
•
reliably identify the person who has signed
an electronic document, and
•
INTEGRITY
IDENTITY
verify both the INTEGRITY of an electronic
document and the IDENTITY of the person
VERIFIABILITY
who has signed it on a long term basis.
Electronic signatures cannot ensure the confidentiality of electronic
documents.
Electronic Signatures
INTEGRITY
IDENTITY
VERIFIABILITY
The INTEGRITY of a document is ensured in two stages:
1.
A digital fingerprint, called a "HASH VALUE", is calculated from the electronic data in
the document.
The key characteristics of HASH VALUES are that
2.
a.
each hash value calculated from the same document will always be the
same, however many times it is recalculated, and
b.
each different document will invariably have a different hash value.
The HASH VALUE is attached to the document from which it was calculated.
Electronic Signatures
5
INTEGRITY
IDENTITY
VERIFIABILITY
Verification
How to verify whether or not a document has been modified:
1.
The original HASH VALUE is separated from the document.
2.
A new HASH VALUE, called the "reference HASH VALUE", is calculated from the electronic
data in the document.
If the original HASH VALUE and the
If the document has been manipulated, then
reference HASH VALUE are the same,
the original HASH VALUE and the reference
then the document has not been modified.
HASH VALUE will not be the same.
INTEGRITY = OK
INTEGRITY = violated
Electronic Signatures
6
INTEGRITY
IDENTITY
VERIFIABILITY
Electronic signature
A HASH VALUE is not personalised; in other words,
•
the same documents will always have the same HASH VALUE, even if they have been
produced by different people.
Personalising a HASH VALUE, or "electronically signing" a document, means
•
mathematically calculating a new value from the HASH VALUE using a secret (private) key;
the secret key is unique to one person, which means that the personalised HASH VALUE is
also unique to that one person.
The secret key is called the "SIGNATURE KEY".
A HASH VALUE personalised using a SIGNATURE KEY is also called an
ELECTRONIC SIGNATURE.
Electronic Signatures
7
INTEGRITY
IDENTITY
VERIFIABILITY
Certificate
An ELECTRONIC SIGNATURE is uniquely bound to one natural person by a "CERTIFICATE",
the digital equivalent of an identity card:
The CERTIFICATE contains
details of the identity of the holder of the
SIGNATURE KEY,
details of the period of validity of the
certificate, and
a reference to the service provider issuing
the certificate.
Electronic Signatures
CERTIFICATE
Surname, forename
Pseudonym (optional)
Valid from:
Valid until:
Issued by:
Certification service provider xy
8
INTEGRITY
IDENTITY
VERIFIABILITY
Signature verification key
A CERTIFICATE also contains details of
the SIGNATURE KEY bound to the person named in the CERTIFICATE.
CERTIFICATE
This is done using a
public SIGNATURE VERIFICATION KEY
belonging to the SIGNATURE KEY.
Surname, forename
Pseudonym (optional)
Valid from:
Valid until:
Issued by:
Certification service provider xy
The issuing service provider electronically signs the
CERTIFICATE to protect it against manipulation.
Electronic Signatures
SIGNATURE VERIFICATION KEY
9
INTEGRITY
IDENTITY
VERIFIABILITY
Root certification authority
A body issuing a CERTIFICATE is called a "CERTIFICATION SERVICE PROVIDER".
In electronic commerce CERTIFICATES are the (official) documents confirming the identity of a
SIGNATURE KEY holder.
This means that the CERTIFICATION SERVICE PROVIDERS have particular importance and
responsibility in electronic commerce.
The trustworthiness of a CERTIFICATION SERVICE PROVIDER is attested in a CERTIFICATE.
The CERTIFICATES for CERTIFICATION SERVICE PROVIDERS are issued by
RegTP, the "ROOT CERTIFICATION AUTHORITY".
Electronic Signatures
10
INTEGRITY
IDENTITY
VERIFIABILITY
Verification
How to verify an electronically signed document:
DOCUMENT
CERTIFICATE
Signer
ISSUER
Certification
service
provider xy
INTEGRITY
SIGNATURE
VERIFICATION KEY
The SIGNATURE VERIFICATION KEY in the CERTIFICATE of the signer is used to verify the
INTEGRITY of the document.
Electronic Signatures
11
INTEGRITY
IDENTITY
VERIFIABILITY
Verification
How to verify an electronically signed document:
DOCUMENT
CERTIFICATE
Signer
ISSUER
Certification
service
provider xy
CERTIFICATE
Certification
service
provider xy
ISSUER
RegTP
INTEGRITY
INTEGRITY
SIGNATURE
VERIFICATION KEY
The SIGNATURE VERIFICATION KEY of the CERTIFICATION SERVICE PROVIDER in the
CERTIFICATE of the issuer is used to verify the INTEGRITY of the CERTIFICATE.
Electronic Signatures
12
INTEGRITY
IDENTITY
VERIFIABILITY
Verification
How to verify an electronically signed document:
DOCUMENT
CERTIFICATE
Signer
ISSUER
Certification
service
provider xy
CERTIFICATE
Certification
service
provider xy
ISSUER
RegTP
INTEGRITY
SIGNATURE
VERIFICATION KEY
INTEGRITY
IDENTITY
As the CERTIFICATE binds the SIGNATURE VERIFICATION KEY to the signer, confirming the
INTEGRITY of the CERTIFICATE also confirms the IDENTITY of the signer.
Electronic Signatures
13
INTEGRITY
IDENTITY
VERIFIABILITY
Verification
The trustworthiness of CERTIFICATES is similarly verified:
CERTIFICATE
Signer
ISSUER
Certification
service
provider xy
CERTIFICATE
Certification
service
provider xy
ISSUER
RegTP
CERTIFICATE
RegTP
ISSUER
RegTP
INTEGRITY
INTEGRITY
SIGNATURE
VERIFICATION KEY
IDENTITY
IDENTITY
The IDENTITY of the CERTIFICATION SERVICE PROVIDER is verified using RegTP's
CERTIFICATE.
Electronic Signatures
14
INTEGRITY
IDENTITY
VERIFIABILITY
Verification
The trustworthiness of CERTIFICATES is similarly verified:
CERTIFICATE
Signer
ISSUER
Certification
service
provider xy
CERTIFICATE
Certification
service
provider xy
ISSUER
RegTP
CERTIFICATE
RegTP
ISSUER
RegTP
INTEGRITY
INTEGRITY
INTEGRITY
IDENTITY
IDENTITY
IDENTITY
RegTP's CERTIFICATE, called the "ROOT CERTIFICATE", can be verified directly.
Electronic Signatures
15
INTEGRITY
IDENTITY
VERIFIABILITY
Valid document
A document has a valid signature where the INTEGRITY of the
DOCUMENT
CERTIFICATE
Signer
ISSUER
Certification
service
provider xy
CERTIFICATE
Certification
service
provider xy
ISSUER
RegTP
CERTIFICATE
RegTP
ISSUER
RegTP
INTEGRITY
INTEGRITY
INTEGRITY
INTEGRITY
IDENTITY
IDENTITY
IDENTITY
has been verified. These checks are made automatically.
Electronic Signatures
16
INTEGRITY
IDENTITY
VERIFIABILITY
Trust centre directory service
A list is kept of all the CERTIFICATES needed to verify an electronically signed document.
A list, called a "CERTIFICATE REVOCATION LIST", is also kept of all the CERTIFICATES that
have been revoked.
A CERTIFICATE can be revoked if, for instance, the SIGNATURE KEY of the holder identified in
the CERTIFICATE has been stolen. As soon as a CERTIFICATE has been revoked, it cannot be
used to create a valid electronic signature.
The list of CERTIFICATES and the CERTIFICATE REVOCATION LIST together form the
DIRECTORY SERVICE. The DIRECTORY SERVICE is available to anyone at any time
(24 hours a day) for information for validity checks.
The DIRECTORY SERVICE and the technical components used by a CERTIFICATION
SERVICE PROVIDER to produce certificates are located in a particularly secure environment,
called a "TRUST CENTRE".
Electronic Signatures
17
INTEGRITY
IDENTITY
VERIFIABILITY
Infrastructure
All the elements contributing to the VERIFIABILITY of ELECTRONIC SIGNATURES
are termed "CERTIFICATION INFRASTRUCTURE" and include:
ROOT
Country XY
ROOT CA
Germany
National
ROOT CERTIFICATION
AUTHORITY
– State –
issues certificates for
CA 1
...
CA n
CERTIFICATION
SERVICE PROVIDERS
– Private –
issue certificates for
USERS
– Institutions, companies,
private individuals –
Electronic Signatures
18
INTEGRITY
IDENTITY
VERIFIABILITY
Long term signatures
In order to create the equivalent of handwritten signatures, electronically signed documents must
remain VERIFIABLE over long periods of time (decades):
This means that the DIRECTORY SERVICE of each CERTIFICATION SERVICE PROVIDER
must operate reliably over a period of years and must be interoperable with other DIRECTORY
SERVICES in the same INFRASTRUCTURE.
In addition, all the procedures and technical components used must have been comprehensively
verified in order to guarantee a high level of security for electronically signed documents on a
long term basis.
The new Electronic Signatures Act takes full account of these special circumstances by creating
a framework that ensures the security of electronic signatures.
RegTP's TRUST CENTRE was the first to meet the stringent security requirements of the Act. It
forms the core of Germany's CERTIFICATION INFRASTRUCTURE for electronic signatures.
Electronic Signatures
19