Www.oasis-open.org OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.

Slides:



Advertisements
Similar presentations
17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Telia Research AB György Endersz European Electronic Signature Standardisation Initiative EESSI Budapest Seminar at the Hungarian Communication.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Mountain View 25, 26 Sept 2007 The importance of incorporating XAdES extensions into ongoing XML-Sig work W3C Workshop on Next Steps for XML Signature.
S.1 Using a Global Validation Service to Unite Communities Jon Shamah EMEA Head of Sales, BBS eSecurity.
Lecture 23 Internet Authentication Applications
Summary of ETSI/ESI activities Andrea Caccia ETSI/ESI TB member Note: This document expresses only the views of its author.
© ETSI 2012 All rights reserved EUROPEAN UNION MANDATE/460 Kloster Banz Presented by Arno Fiedler, Member of European Telecommunications Standards.
21 mai 2015 Bridges between Certification Authorities.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
M.Sc. Hrvoje Brzica Boris Herceg, MBA Financial Agency – FINA Ph.D. Hrvoje Stancic, assoc. prof. Faculty of Humanities and Social Sciences Long-term Preservation.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
European Signatures versus Global SignaturesRome, 7 April, 2003 EESSI open specifications and interoperability The state of the art in Italy Giovanni Manca.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Web services security I
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
OASIS OASIS Digital Signature Services Juan Carlos Cruellas Juan Carlos Cruellas Andreas Kuehne Stefan Drees Ernst Jan van Nigtevecht.
8 Nob 06 / CEN/ISSS ETSI STF 305: Procedures for Handling Advanced Electronic Signatures on Digital Accounting CEN/ISSS Workshop.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Digital Signatures and e-Identity. Getting the best out of DSS / DSS-X services. Andreas Kuehne – DSS-X member.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Riccardo Genghini - Ws E-Sign Chairman – IETF PKIX San Francisco March Electronic Signature infrastructure for Europe Riccardo Genghini Cen/Isss.
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
OASIS Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity OASIS Digital Signature Services and ETSI standards Juan Carlos.
Presented by : Piero Milani ( InfoCamere - Italy)Piero Milani InfoCamere - Italy VCD Signature & VCD Verification strategy as seen by InfoCamere ( WP1.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
TAG Presentation 18th May 2004 Paul Butler
Training for developers of X-Road interfaces
Cross-sector and user-centric AAI
ICAO Seminar on Aeronautical spectrum management (Cairo, 7 – 17 June 2006) SAFIRE Spectrum and Frequency Information Resource (presented by Eurocontrol)
DIGITAL SIGNATURE SERVICE
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
Cryptography and Network Security
IEEE 802 OmniRAN EC SG July 2013 Conclusion
TAG Presentation 18th May 2004 Paul Butler
HellasGrid CA & euGridPMA
Authentication Applications
Public Key Infrastructure (PKI)
S/MIME T ANANDHAN.
Brief Introduction to IEEE P802.1CF
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
ICAO Seminar on Aeronautical spectrum management (Cairo, 7 – 17 June 2006) SAFIRE Spectrum and Frequency Information Resource (presented by Eurocontrol)
Security in ebXML Messaging
Digits-2-Digits.
ELECTRONIC MAIL SECURITY
Secure Electronic Transaction (SET) University of Windsor
Technical Approach Chris Louden Enspier
ELECTRONIC MAIL SECURITY
Digital Certificates and X.509
X-Road as a Platform to Exchange MyData
Dashboard eHealth services: actual mockup
e-Invoicing – e-Ordering 20/11/2008
WEB SERVICES From Chapter 19, Distributed Systems
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

www.oasis-open.org OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity

Contents ETSI and ESI TC DSS and DSS-X OASIS TC Introduction to ETSI and ETSI ESI TC ESI standardization work overview DSS and DSS-X OASIS TC DSS concept DSS TC standardization work overview DSS-X overview ESI and DSS-X standards relationship Questions and Answers

ETSI and ESI TC

Introduction to ETSI and ETSI ESI TC European Telecommunications Standars Insitute (ETSI) website reports that ETSI: Is recognised as an official European Standards Organisation by the European Commission. Produces globally applicable standards for Information and Communications Technologies (including internet) Websites: http://www.etsi.org and http://portal.etsi.org

Introduction to ETSI and ETSI ESI TC Electronic Signatures and Infrastructures (ESI) TC: Is responsible for Electronic Signatures and Infrastructures standardisation within ETSI. Develops generic standards, guides and reports related to electronic signatures and supporting infrastructures.

Introduction to ETSI and ETSI ESI TC Liases with both internal and external bodies to ETSI related to electronic signatures in order to harmonize specifications at the international level. Website: http://portal.etsi.org/esi/ESI_ToR.asp

ESI standardisation work overview Standardisation work background: Publication in 1999 of the European Directive that allows use digital signatures for legally binding transactions and defines the Advanced Electronic Signature.

ESI standardisation work overview ESI TC standardises in different electronic signature related areas: Electronic Signature Formats Infrastructure, including: Specification of new architectural elements Profiling of architectural elements Policies, including: Signature Policy formats Policies for Trusted Service Providers

ESI standardisation work overview Guidance material, including: Guidance on algorithms and parameters for electronic signatures.

ESI standardisation work overview Electronic signatures formats. Technical Specification TS 101 903: “XML Advanced Electronic Signatures (XAdES)” TS 101 733: “CMS Advanced Electronic Signatures (CAdES)” These specifications: Build on XMLDSig and CMS formats respectively. Standardise a set of properties that may be incorporated to XMLDSig-based electronic signatures fulfilling a number of common requirements (such as the long term validity of the signature)

ESI standardisation work overview Identify a set of different combinations of properties (Signature Forms), each one offering its own set of features relevant in specific contexts and phases of the signatures life cycle. They have been further profiled by: TS 102 904: “Profiles of XML Advanced Electronic Signatures based on TS 101 903” TS 102 734: “Profiles of CMS Advanced Electronic Signatures based on TS 101 733” They define an electronic signatures baseline profile and profiles for e-Government and e-Invoicing.

ESI standardisation work overview Infrastructure. This includes: Profiling infrastructural elements: TS 101 862: “Qualified Certificate Profile” Defines a technical format for Qualified Certificats aligned with annexes I and II of the European Directive. TS 102 280: “X.509 v3 Certificate Profile for Certificates Issued to Natural Persons”. TS 101 861: “Time stamping profile”. Profiles IETF RFC 3161 time-stamps regarding electronic signatures time-stamping.

ESI standardisation work overview Specifying new infrastructural elements: TS 102 231: “Provision of Harmonized Trust Service Provider status information”. Defines a way for publishing information on the status of Trusted Service Providers and the services that they provide, as assessed against certain assessment schemes. This is specially useful for supporting cross-domain and international transactions. ASN.1 and XML formats are specified.

ESI standardisation work overview Policies. This includes: Signature Policies Formats: Technical Report TR 102 038: XML format for signature policies TR 102 272: ASN.1 format for signature policies These reports define structured formats for signature policies documents that govern the creation and verification of electronic signatures.

ESI standardisation work overview Policies that Core Trusted Services Providers must adhere. These include providers of: Public Key Certificates: TS 101 456 Attribute Certificates: TS 102 158 Qualified Certificates: TS 101 456 Time-stamps: TS 102 023

ESI standardisation work overview Specifications covering electronic signatures when used in specific application areas. These include: TS 102 573: “Policy requirements for trust service providers signing and/or storing data for digital accounting”. Specifies security management and policy requirements applicable to TSPs that issue fiscally relevant electronically signed documents and/or store them on behalf of taxable persons

ESI standardisation work overview On going work on Registered Electronic mail Systems (REM systems: e-mail systems that provide trusted evidences that certain facts have actually occurred), where ETSI is going to produce a new TS: “Registered Electronic Mail (REM) Architecture, Formats for signed evidences and Policies”, a multi-part document that will specify: A generic architecture for REM systems Data requirements and formats for signed evidences in REM systems. Policy requirements for trust service providers providing signed evidences in REM systems.

ESI standardisation work overview Guidance. This includes: TS 102 176: “Algorithms and Parameters for Secure Electronic Signatures”. Multipart document: Part 1 deals with hash functions and asymmetric algorithms. Part 2 deals with secure channel protocols and algorithms for signature creation devices.

DSS and DSS-X OASIS TC

DSS concept DSS charter reads: Develop “a protocol for a digital signature creation web service. Providing digital signatures via such a web service facilitates policy-based control of the provision of the signatures”. Develop “a protocol for a digital signature verification web service that can verify signatures in relation to a given policy set”. Develop “an XML-based protocol to produce cryptographic time-stamps”.

DSS concept. Conventional approach Deploy key to each user Handle Interface to all PKI functions Security depends on user

PKI Certificate Management DSS concept. DSS approach Internal user Authentication & authorisation Directory System PKI Certificate Management

www.oasis-open.org DSS concept. Why DSS Avoid burden of deployment of signing on individual basis Shared server for generation and verification of digital signatures Support of signing as corporate function

DSS concept. Main features www.oasis-open.org DSS concept. Main features DSS supports : Creation of digital signatures Verification of signatures Creation / verification of time-stamps XML (Define in DSS) / Binary (RFC 3161) Simplified slide

DSS concept. Main features www.oasis-open.org DSS concept. Main features Support range of signature formats including: W3C XML Signatures CMS (RFC 3852) Signatures RFC 3161 XML time-stamps (defined in DSS) Advanced Electronic Signatures (ETSI TS 101903 and ETSI TS 101733) Range of Document / Signature structures Optional inputs / outputs for controlling specific features

DSS TC standardization work overview www.oasis-open.org DSS TC standardization work overview Core protocol specification. Defines two protocols: signing and verification. Each protocol two messages: request and response. Defines basic mandatory features and a number of optional features.

DSS Sign Protocol DSS-Sign request (document) (Signed document) DSS-Sign request (document) DSS-Sign response (Signed document) Archive DSS Server

DSS Signature Creation: Advantages Authentication of user separated from management of signature key. Controls on who may apply “corporate” signatures Controls on user access to own signing key Based on existing internal security controls using existing authentication and authorisation controls within normal work flow If user’s authorisation is revoked, organisation can stop use of signature Immediate No need to publish external revocation No need for special device on user system Strict organisational controls can be applied to handling of signing key Improved security & reduced per user cost Need not be just eInvocing, same for verification?

DSS Verify Protocol DSS-Verify request (Signed document) Public Key Store / directory Archive

DSS Signature Verification: Advantages Verification complexities taken off user system Common verification policy can be directly applied Can maintain log of result of signature verification when first received for later re-checking

DSS TC standardization work overview Profiles of the core specification: Extend and/or adapt the core to specific needs, use cases and environments. Time-stamp: equivalent of RFC 3161 for XML. Entity-seal: generation/verification of a “seal” (time-stamped signature with information of identity of the requester: proxy signature).

DSS TC standardization work overview Advanced Electronic Signature. Supports lifecycle of CAdES and XAdES signatures Signature Gateway: creation of signatures at a gateway, translating from an internal format to a standard form Code-signing. Support to signing of code authorized for distribution Asynchronous Processing. Supports deferred delivery of server responses

DSS-X Overview New DSS-X TC “Digital Signature Services eXtended” opened in 23rd July 2007. DSS-X TC has joined OASIS IDTrust member section. Charter at: http://www.oasis-open.org/committees/dss-x/charter.php 33

DSS-X overview Main goals in the charter: Produce new profiles based on DSS core. Produce dissemination material. Produce analysis of inter-relationship among profiles. Maintenance of existing DSS OASIS standards. 34

Anyone willing to contribute is very welcomed! DSS-X overview Contacting coordinates: Website: http://www.oasis-open.org/apps/org/workgroup/dss-x/ Public comments e-mail list: dss-x-comment@lists.oasis-open.org Anyone willing to contribute is very welcomed! 35

Current status (I): DSS-X overview Identified a number of profiles to develop: Profile for visible signatures. Profile for PDF signatures Profile for ebXML Profile for individual reports on every signature verified in multi-signature documents Profile for requesting signed verification responses 36

DSS-X overview Profiles for basic functions in support of generation and verification of XML signatures, CMS signatures, XML time-stamps and RFC 3161 time-stamps ("baseline" profiles). Profile for handling of signature & service policy Profile for supporting centralized encryption and decryption services 37

DSS-X overview Received some external and internal contributions that will be assessed in a near future. Currently TC is working in producing requirements documents for the different profiles. Rough time-line estimation: work completed by the end of 2008. 38

ESI and DSS, DSS-X standards relationship

ESI and DSS-X standards relationship ESI has: Standardised electronic signature formats and profiled infrastructural elements. DSS (and its successor DSS-X) has: Defined protocols for remotely requesting generation and verification of electronic signatures to specialized services and has also … Specified a profile for requesting generation and validation of AdES signatures specified by ESI.

ESI and DSS-X standards relationship DSS and DSS-X: Have made possible the provision of new services that are directly related to standards previously developed by IETF, W3C and ESI, but at the same time... These services will make use of infrastructural elements defined by ESI TC and ... Also, within Europe, they need to be aligned with the policy requirements specified by ESI TC

ESI and DSS-X standards relationship Future: ESI and DSS-X could in a certain point of time establish a peer-review/comment mechanism to ensure the alignment of specifications produced by both bodies.

Thank you Questions ?