OASIS Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity OASIS Digital Signature Services and ETSI standards Juan Carlos.

Slides:



Advertisements
Similar presentations
17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Telia Research AB György Endersz European Electronic Signature Standardisation Initiative EESSI Workshop Barcelona, György Endersz,
Telia Research AB György Endersz European Electronic Signature Standardisation Initiative EESSI Budapest Seminar at the Hungarian Communication.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Mountain View 25, 26 Sept 2007 The importance of incorporating XAdES extensions into ongoing XML-Sig work W3C Workshop on Next Steps for XML Signature.
S.1 Using a Global Validation Service to Unite Communities Jon Shamah EMEA Head of Sales, BBS eSecurity.
Lecture 23 Internet Authentication Applications
Summary of ETSI/ESI activities Andrea Caccia ETSI/ESI TB member Note: This document expresses only the views of its author.
Jaroslav Pinkava May 2001 Certification Authority in Praxis. Security Aspects. Conference Security and Protection of Information Ing. Jaroslav Pinkava,
© ETSI 2012 All rights reserved EUROPEAN UNION MANDATE/460 Kloster Banz Presented by Arno Fiedler, Member of European Telecommunications Standards.
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
21 mai 2015 Bridges between Certification Authorities.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
M.Sc. Hrvoje Brzica Boris Herceg, MBA Financial Agency – FINA Ph.D. Hrvoje Stancic, assoc. prof. Faculty of Humanities and Social Sciences Long-term Preservation.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
European Signatures versus Global SignaturesRome, 7 April, 2003 EESSI open specifications and interoperability The state of the art in Italy Giovanni Manca.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Web services security I
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
OASIS OASIS Digital Signature Services Juan Carlos Cruellas Juan Carlos Cruellas Andreas Kuehne Stefan Drees Ernst Jan van Nigtevecht.
8 Nob 06 / CEN/ISSS ETSI STF 305: Procedures for Handling Advanced Electronic Signatures on Digital Accounting CEN/ISSS Workshop.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Digital Signatures and e-Identity. Getting the best out of DSS / DSS-X services. Andreas Kuehne – DSS-X member.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate revocation list
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
OpenEvidence and ESS Peter Sylvester, EdelWeb IETF - N° 57, Wien S/MIME working group.
Riccardo Genghini - Ws E-Sign Chairman – IETF PKIX San Francisco March Electronic Signature infrastructure for Europe Riccardo Genghini Cen/Isss.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
DIGITAL SIGNATURE.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
ICC eTerms Repository Supporting the PKI infrastructure and secure electronic commerce Janjaap Bos Dublin, June 2000.
Presented by : Piero Milani ( InfoCamere - Italy)Piero Milani InfoCamere - Italy VCD Signature & VCD Verification strategy as seen by InfoCamere ( WP1.
TAG Presentation 18th May 2004 Paul Butler
OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.
Training for developers of X-Road interfaces
DIGITAL SIGNATURE SERVICE
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
S/MIME T ANANDHAN.
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Security in ebXML Messaging
Dashboard eHealth services: actual mockup
Presentation transcript:

OASIS Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity

Contents n ETSI and ESI TC l Introduction to ETSI and ETSI ESI TC l ESI standardization work overview n DSS and DSS-X OASIS TC l DSS concept l DSS TC standardization work overview l DSS-X overview n ESI and DSS-X standards relationship n Questions and Answers

ETSI and ESI TC

Introduction to ETSI and ETSI ESI TC n European Telecommunications Standars Insitute (ETSI) website reports that ETSI: l Is recognised as an official European Standards Organisation by the European Commission. l Produces globally applicable standards for Information and Communications Technologies (including internet) l Websites: and

Introduction to ETSI and ETSI ESI TC n Electronic Signatures and Infrastructures (ESI) TC: l Is responsible for Electronic Signatures and Infrastructures standardisation within ETSI. l Develops generic standards, guides and reports related to electronic signatures and supporting infrastructures.

Introduction to ETSI and ETSI ESI TC n Liases with both internal and external bodies to ETSI related to electronic signatures in order to harmonize specifications at the international level. n Website:

ESI standardisation work overview n Standardisation work background: l Publication in 1999 of the European Directive that allows use digital signatures for legally binding transactions and defines the Advanced Electronic Signature.

ESI standardisation work overview n ESI TC standardises in different electronic signature related areas: l Electronic Signature Formats l Infrastructure, including: n Specification of new architectural elements n Profiling of architectural elements l Policies, including: n Signature Policy formats n Policies for Trusted Service Providers

ESI standardisation work overview l Guidance material, including: n Guidance on algorithms and parameters for electronic signatures.

ESI standardisation work overview l Electronic signatures formats. n Technical Specification TS : “XML Advanced Electronic Signatures (XAdES)” n TS : “CMS Advanced Electronic Signatures (CAdES)” n These specifications: Build on XMLDSig and CMS formats respectively. Standardise a set of properties that may be incorporated to XMLDSig-based electronic signatures fulfilling a number of common requirements (such as the long term validity of the signature)

ESI standardisation work overview Identify a set of different combinations of properties (Signature Forms), each one offering its own set of features relevant in specific contexts and phases of the signatures life cycle. n They have been further profiled by: TS : “Profiles of XML Advanced Electronic Signatures based on TS ” TS : “Profiles of CMS Advanced Electronic Signatures based on TS ” They define an electronic signatures baseline profile and profiles for e-Government and e-Invoicing.

ESI standardisation work overview l Infrastructure. This includes: n Profiling infrastructural elements: TS : “Qualified Certificate Profile” Defines a technical format for Qualified Certificats aligned with annexes I and II of the European Directive. TS : “X.509 v3 Certificate Profile for Certificates Issued to Natural Persons”. TS : “Time stamping profile”. Profiles IETF RFC 3161 time-stamps regarding electronic signatures time-stamping.

ESI standardisation work overview n Specifying new infrastructural elements: TS : “Provision of Harmonized Trust Service Provider status information”. Defines a way for publishing information on the status of Trusted Service Providers and the services that they provide, as assessed against certain assessment schemes. This is specially useful for supporting cross-domain and international transactions. ASN.1 and XML formats are specified.

ESI standardisation work overview n Policies. This includes: Signature Policies Formats: Technical Report TR : XML format for signature policies TR : ASN.1 format for signature policies These reports define structured formats for signature policies documents that govern the creation and verification of electronic signatures.

ESI standardisation work overview Policies that Core Trusted Services Providers must adhere. These include providers of: Public Key Certificates: TS Attribute Certificates: TS Qualified Certificates: TS Time-stamps: TS

ESI standardisation work overview n Specifications covering electronic signatures when used in specific application areas. These include: TS : “Policy requirements for trust service providers signing and/or storing data for digital accounting”. Specifies security management and policy requirements applicable to TSPs that issue fiscally relevant electronically signed documents and/or store them on behalf of taxable persons

ESI standardisation work overview On going work on Registered Electronic mail Systems (REM systems: systems that provide trusted evidences that certain facts have actually occurred), where ETSI is going to produce a new TS: “Registered Electronic Mail (REM) Architecture, Formats for signed evidences and Policies”, a multi-part document that will specify: A generic architecture for REM systems Data requirements and formats for signed evidences in REM systems. Policy requirements for trust service providers providing signed evidences in REM systems.

ESI standardisation work overview n Guidance. This includes: TS : “Algorithms and Parameters for Secure Electronic Signatures”. Multipart document: Part 1 deals with hash functions and asymmetric algorithms. Part 2 deals with secure channel protocols and algorithms for signature creation devices.

DSS and DSS-X OASIS TC

DSS concept n DSS charter reads: n Develop “a protocol for a digital signature creation web service. Providing digital signatures via such a web service facilitates policy-based control of the provision of the signatures”. n Develop “a protocol for a digital signature verification web service that can verify signatures in relation to a given policy set”. n Develop “an XML-based protocol to produce cryptographic time-stamps”.

DSS concept. Conventional approach n Deploy key to each user n Handle Interface to all PKI functions n Security depends on user

PKI Certificate Management Directory System Internal user Authentication & authorisation DSS concept. DSS approach

DSS concept. Why DSS n Avoid burden of deployment of signing on individual basis n Shared server for generation and verification of digital signatures n Support of signing as corporate function

DSS concept. Main features n DSS supports : l Creation of digital signatures l Verification of signatures l Creation / verification of time-stamps XML (Define in DSS) / Binary (RFC 3161)

DSS concept. Main features n Support range of signature formats including: l W3C XML Signatures l CMS (RFC 3852) Signatures l RFC 3161 l XML time-stamps (defined in DSS) l Advanced Electronic Signatures (ETSI TS and ETSI TS ) n Range of Document / Signature structures n Optional inputs / outputs for controlling specific features

DSS TC standardization work overview n Core protocol specification. l Defines two protocols: signing and verification. l Each protocol two messages: request and response. l Defines basic mandatory features and a number of optional features.

DSS-Sign request (document) DSS-Sign response (Signed document) (Signed document) Archive DSS Server DSS Sign Protocol

DSS Signature Creation: Advantages n Authentication of user separated from management of signature key. l Controls on who may apply “corporate” signatures l Controls on user access to own signing key l Based on existing internal security controls using existing authentication and authorisation controls within normal work flow n If user’s authorisation is revoked, organisation can stop use of signature l Immediate l No need to publish external revocation n No need for special device on user system n Strict organisational controls can be applied to handling of signing key Improved security & reduced per user cost

DSS-Verify request (Signed document) (Signed document) ArchivePublic Key Store / directory DSS Verify Protocol

DSS Signature Verification: Advantages n Verification complexities taken off user system n Common verification policy can be directly applied n Can maintain log of result of signature verification when first received for later re-checking

n Profiles of the core specification: l Extend and/or adapt the core to specific needs, use cases and environments. l Time-stamp: equivalent of RFC 3161 for XML. l Entity-seal: generation/verification of a “seal” (time-stamped signature with information of identity of the requester: proxy signature). DSS TC standardization work overview

l Advanced Electronic Signature. Supports lifecycle of CAdES and XAdES signatures l Signature Gateway: creation of signatures at a gateway, translating from an internal format to a standard form l Code-signing. Support to signing of code authorized for distribution l Asynchronous Processing. Supports deferred delivery of server responses

DSS-X Overview n New DSS-X TC “Digital Signature Services eXtended” opened in 23 rd July n DSS-X TC has joined OASIS IDTrust member section. n Charter at: x/charter.php

DSS-X overview n Main goals in the charter: l Produce new profiles based on DSS core. l Produce dissemination material. l Produce analysis of inter-relationship among profiles. l Maintenance of existing DSS OASIS standards.

DSS-X overview n Contacting coordinates: n Website: n Public comments list: Anyone willing to contribute is very welcomed!

DSS-X overview Current status (I): n Identified a number of profiles to develop: l Profile for visible signatures. l Profile for PDF signatures l Profile for ebXML l Profile for individual reports on every signature verified in multi-signature documents l Profile for requesting signed verification responses

DSS-X overview l Profiles for basic functions in support of generation and verification of XML signatures, CMS signatures, XML time- stamps and RFC 3161 time-stamps ("baseline" profiles). l Profile for handling of signature & service policy l Profile for supporting centralized encryption and decryption services

DSS-X overview n Received some external and internal contributions that will be assessed in a near future. n Currently TC is working in producing requirements documents for the different profiles. n Rough time-line estimation: work completed by the end of 2008.

ESI and DSS, DSS-X standards relationship

n ESI has: l Standardised electronic signature formats and profiled infrastructural elements. n DSS (and its successor DSS-X) has: l Defined protocols for remotely requesting generation and verification of electronic signatures to specialized services and has also … l Specified a profile for requesting generation and validation of AdES signatures specified by ESI. ESI and DSS-X standards relationship

n DSS and DSS-X: l Have made possible the provision of new services that are directly related to standards previously developed by IETF, W3C and ESI, but at the same time... l These services will make use of infrastructural elements defined by ESI TC and... l Also, within Europe, they need to be aligned with the policy requirements specified by ESI TC ESI and DSS-X standards relationship

n Future: l ESI and DSS-X could in a certain point of time establish a peer-review/comment mechanism to ensure the alignment of specifications produced by both bodies. ESI and DSS-X standards relationship

Thank you Questions ?