The Cover Pages [画像:The OASIS Cover Pages: The Online Resource for Markup Language Technologies]
SEARCH | ABOUT | INDEX | NEWS | CORE STANDARDS | TECHNOLOGY REPORTS | EVENTS | LIBRARY
Digital Signatures

Introduction

Contents


Overview from the W3C XML Digital Signatures Activity Statement: "Digital signatures are created and verified using cryptography, the branch of applied mathematics concerned with transforming messages into seemingly unintelligible forms and then back again. Digital signatures are created by performing an operation on information such that others can confirm that a holder of a secret performed the operation and that the signed information has not subsequently changed. In a symmetric key system, both the sender and receiver need to be privy to the secret. In the public key cryptographic system, the holder of the private (secret) key signs information, but anyone with access to the public key can confirm that the signature is valid. The novel feature of public key cryptography is that knowledge of the public key used to confirm signatures does not reveal information about the private key itself."


Standards Initiatives

CEN Information Society Standardization System (CEN/ISSS)

The CEN/ISSS Workshop on Electronic Signatures (WS/E-Sign) operates under the jurisdiction of Comité Européen de Normalisation [CEN], European Committee for Standardization. "CEN's Information Society Standardization System (CEN/ISSS) is responsible for the part of the EESSI work programme dealing with quality and functional standards for Signature Creation and Verification products, as well as quality and functional standards for Certification Service Providers (CSPs). In the fast-moving domain of information and communications technologies (ICT), CEN/ISSS makes use of a Workshop mechanism, in addition to the traditional CEN Technical Committees. CEN/ISSS Workshops are open to all interested parties. They operate by consensus and produce specifications, pre-Standards, guidance and other material. Their deliverables are published by CEN as CEN Workshop Agreements (CWAs)."

"In the framework of the European Electronic Signature Standardization Initiative (EESSI) implementation phase, CEN/ISSS and ETSI/SEC have been entrusted with the execution of the work programme. The work areas were identified and their contents elaborated in the course of the first phase of EESSI. The core element in the definition of the work programme is a report drawn up by a Team of Experts, highlighting the key recommendations for standards-setting in the area of Electronic Signatures. The work items assigned to CEN/ISSS for identification of standardization requirements and for proposals of standards-setting work have been carried out within the Electronic Signatures (E-SIGN) Workshop..."

See: Business Plan for the CEN/ISSS Workshop on Electronic Signatures. CEN/ISSS WS/E-SIGN 2002-2003. [cache]

Several of the CEN/ISSS Electronic Signatures specifications are available online; see the Electronic signatures section in the list of CEN Workshop Agreements.

Drafts and Deliverables: Snapshot 2002年10月21日; CEN Workshop Agreement drafts as developed and approved by WS/E-Sign for download and comment:

  • CWA 14355: Guidelines for the implementation of Secure Signature-Creation Devices; Version 0.91, 2001年12月17日 (approved) N 0183rev.
  • CWA 14365: Guide on the Use of Electronic Signatures, Version 1.1, 26 September 2002 N 0221
  • Comment Resolution on CWA 14365: General Requirements for Electronic Signatures, V.066, May 06 2002 (WSES N 0196) N 0203
  • CEN/ISSS WS/E-Sign: Terminolgy for EESSI documents N 123
  • CWA 14167-1 Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures (approved 2001年08月24日) N 161
  • Revised CWA 14167-1 Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures; for electronic voting (voting terminates on 2002年09月23日) N 0210
  • Draft CWA 14167-2: Cryptographic Module for CSP Signing Operations - Protection Profile (MCSO-PP); V 0.18 (approved) N 178
  • Draft CWA 14167-3: Cryptographic Module for CSP Key Generation Services -- Protection Profile -- CMCKG-PP; Version 0.07, 2002年07月24日 (published for comment) N 0206
  • CWA 14168 Secure Signatur-Creation Devices, version 'EAL 4', 2001年03月01日 (approved) N 136
  • CWA 14169 Secure Signatur-Creation Devices, version 'EAL 4+', 2001年03月01日 (approved) N 137
  • Explanatory memorandum concerning the two versions of the CWA Drafts on Area F, 2000年11月29日 N 118
  • Memorandum: CC-Evaluation of WS/E-Sign CWA Area F (approved) N 177
  • CWA 14170 Security Requirements for Signature Creation Systems; Version 3.0, 2000年10月08日 (approved) N 141
  • CWA 14171 Procedures for Electronic Signature Verification; V 1.0.5, 2001年03月13日 (approved) N 140
  • Working Draft: Application Interface for SmartCards used as Secure Signature Creation Devices, Version 0.8 Release 0, 12th March 2002 N 0195
  • Inventory of European Economic Area Member State Strategies for implementation of European Directive 1999/93/EC, 2000年08月30日 N 72
  • Minimum criteria to be taken into account by Member States when designating bodies in accordance with Article 3 (4) of Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, 2000年11月28日 N 112
  • CWA 14172-1 EESSI Conformity Assessment Guidance: Part 1 - General, 2001年03月15日 (approved) N 143
  • CWA 14172-2 EESSI Conformity Assessment Guidance: Part 2 - Certification Authority services and processes, 2001年03月15日 (approved) N 144
  • CWA 14172-3 EESSI Conformity Assessment Guidance: Part 3 - Trustworthy systems managing certificates for electronic signatures (approved) N 170
  • CWA 14172-4 EESSI Conformity Assessment Guidance: Part 4 - Signature creation applications and procedures for electronic signature verification (approved) N 165
  • CWA 14172-5 EESSI Conformity Assessment Guidance: Part 5 - Secure signature creation devices (approved)


ETSI (European Telecommunications Standards Institute)

ETSI Electronic Signatures and Infrastructures (EESSI Program). "ETSI SEC is responsible for Electronic Signatures and Infrastructures standardization within ETSI. The ESI Working Group of ETSI SEC is in charge of executing the program. there are currently 2 Special Task Forces assisting in this activity. The work is done is close co-operation with CEN/ISSS within the ITCSB/EESSI work programme... ETSI (the European Telecommunications Standards Institute) is a not for profit organization whose mission is to produce the telecommunications standards that will be used for decades to come throughout Europe and beyond. Based in Sophia Antipolis, south of France, ETSI unites 912 members from 54 countries inside and outside Europe, and represents administrations, network operators, manufacturers, service providers, research bodies and users."

Specialist Task Force 155. European standardization initiatives in support of business self-regulation. Electronic signature infrastructure standardization. "The object of STF155 is to progress the standardization of electronic signature infrastructure in response to the new mandate (M/290). The tasks follow the proposed work programme set out by the Electronic Signatures Standardization Initiative (EESSI) and support the implementation of the EC Directive in electronic signatures in accordance with the commonly agreed work repartition between ETSI and CEN... STF155 produced the following deliverables for the European Commission: [1] DTS/SEC-004007-2 (Task 1): Policy requirements for certification authorities issuing qualified certificates; [2] DTS/SEC-004001 (Task 2): Electronic signature formats; [3] DTS/SEC-004003 (Task 3): Profile to qualified certificates X.509; [4] DTS/SEC-004004 (Task 4): Time stamping profile; [5] DTR/SEC-004015 (Task 6): Intern. Harmonisation of Policy Requirements for CAs issuing Certificates; [6] RTS/SEC-004013 (Task 7): Maintenance TS 101 456.

For 'ETSI TR 102 038' and 'ETSI TS 101 903' as two XML-related specifications, see: ETSI Releases Draft Technical Report on XML Format for Signature Policies:

  • TC Security - Electronic Signatures and Infrastructures (ESI). XML Format for Signature Policies. From: European Telecommunications Standards Institute. Prepared by the ETSI Technical Committee Security (SEC). ETSI Technical Report. Reference: ETSI TR 102 038, V1.1.1 (2002-04); DTR/SEC-004011. 26 pages. "The present document represents a very first version of a XML format for Signature Policies able to contain information on Signature Policies as specified by TS 101 733."

  • XML Advanced Electronic Signatures (XAdES). ETSI TS 101 903 V1.1.1 (2002-02) ETSI Technical Specification. Reference: ETSI TS 101 903, V1.1.1 (2002-02); DTS/SEC-004008. 70 pages. Normative Annex B presents the XML schema; Annex C contains the XML DTD. "The present document defines XML formats for advanced electronic signatures that remain valid over long periods, are compliant the European Directive and incorporate additional useful information in common uses cases. This includes evidence as to its validity even if the signer or verifying party later attempts to deny (repudiates) the validity of the signature. The present document is based on the use of public key cryptography to produce digital signatures, supported by public key certificates."

  • Time Stamping Profile. Technical Specification ETSI TS 101 861 V1.1.1 (2001-08). Produced by ETSI Technical Committee Security (SEC). Time Stamping is critical for electronic signatures in order to know whether the digital signature was affixed during the validity period of the certificate. To this respect, electronic signatures must be time stamped during the life time of the corresponding certificate. A Time Stamp Protocol has been defined by the IETF. The present document limits the number of options by placing some additional constraints... The profile is based on the Time Stamp Protocol (TSP) from the IETF, RFC 3161 [1]. It defines what a Time Stamping client must support and what a Time Stamping Server must support."

  • Electronic signature formats. ETSI TS 101 733 V1.3.1. February 2002. 103 pages. "The present document defines an electronic signature that remains valid over long periods. This includes evidence as to its validity even if the signer or verifying party later attempts to deny (repudiates) the validity of the signature. The present document specifies use of trusted service providers (e.g., TimeStamping Authorities), and the data that needs to be archived (e.g., cross certificates and revocation lists) to meet the requirements of long term electronic signatures. An electronic signature defined by the present document can be used for arbitration in case of a dispute between the signer and verifier, which may occur at some later time, even years later. The present document uses a signature policy, referenced by the signer, as the basis for establishing the validity of an electronic signature. The present document is based on the use of public key cryptography to produce digital signatures, supported by public key certificates."

  • Telecommunications Security: Electronic Signature Standardization Report. Draft TR 101 xxx V0.4.2 (1998-11). Technical Report. 30 pages.

ETSI SEC Publications listing:

Phase 3 Publications

  • XML format for signature policies - TR 102 038 (April 2002)
  • Policy requirements for time-stamping authorities - TS 102 023 (April 2002)
  • Policy requirements for certification authorities issuing public key certificates - TS 102 042 (April 2002)
  • Policy requirements for certification authorities issuing qualified certificates - TS 101 456 v 1.2.1 (April 2002)
  • Provision of harmonized Trust Service Provider status information - TR 102 030 (April 2002)
  • FAQ (March 2002)
  • International Harmonization of Policy Requirements for CAs issuing Certificates - TR 102 040 (March 2002)
  • Time stamping profile - TS 101 861 v1.2.1 (March 2002)
  • Signature Policies Report - TR 102 041 (February 2002)
  • XML Advanced Electronic Signatures (XAdES) - TS 101 903 (February 2002)
  • Electronic Signature Formats - TS 101 733 v 1.3.1 (February 2002)

Phase 1 and 2 Publications

  • Time Stamping Profile - TS 101 861 v 1.1.1 (September 2001)
  • Qualified Certificate Profile - TS 101 862 v 1.2.1 (June 2001)
  • Policy requirement for certification authorities issuing qualified certificates TS 101 456 v 1.1.1 (December 2000)
  • Qualified Certificate Profile - TS 101 862 v 1.1.1 (December 2000)
  • Electronic Signature Formats - TS 101 733 v 1.2.2 (December 2000)
  • Electronic Signature Formats - ETSI ES 201 733 v 1.1.3 (May 2000


IETF (Internet Engineering Task Force)

Digital signature specifications from various IETF Working Groups. This section not complete. The IETF XML Digital Signatures Working Group is a joint WG with W3C's XML Signature Working Group; see below.

  • "ECDSA with XML-Signature Syntax." IETF Internet Draft. By Simon Blake-Wilson (BCI), Gregor Karlinger (Chief Information Office Austria), and Yongge Wang (University of North Carolina at Charlotte). June 30, 2002. Reference: 'draft-blake-wilson-xmldsig-ecdsa-03.txt'. Appendix A provides the Aggregate XML Schema; Appendix B provides the Aggregate DTD. "This document specifies how to use ECDSA (Elliptic Curve Digital Signature Algorithm) with [IETF/W3C] XML Signatures. The mechanism specified provides integrity, message authentication, and/or signer authentication services for data of any type, whether located within the XML that includes the signature or included by reference. [cache]

  • Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP). IETF Request for Comments, 2802. April 2000. Produced by the IETF Internet Open Trading Protocol Working Group. "The objective of this document is to propose syntax and procedures for the computation and verification of digital signatures applicable to Version 1.0 IOTP protocol messages, providing for: (1) Authentication of IOTP transactions (2) Provide a means by which an IOTP message may be made "tamper-proof", or detection of tampering is made evident (3) Describe a set of available digest and signature algorithms at least one of which is mandatory to implement for interoperability (4) Easily integrate within the IOTP 1.0 Specification (5) Provide lightweight signatures with minimal redundancy (6) Allow signed portions of IOTP message to be "forwarded" to another trading roles with different signature algorithms than the original recipient.." See: Digital Signatures for Internet Open Trading Protocol (IOTP)

  • Digest Values for DOM (DOMHASH). IETF Request for Comments, 2803. April 2000. "This memo defines a clear and unambiguous definition of digest (hash) values of the XML objects regardless of the surface string variation of XML. This definition can be used for XML digital signature as well efficient replication of XML objects... There are at least two usage scenarios of DOMHASH. One is as a basis for digital signatures for XML. Digital signature algorithms normally require hashing a signed content before signing. DOMHASH provides a concrete definition of the hash value calculation. The other is to use DOMHASH when synchronizing two DOM structures..." Produced by the IETF Internet Open Trading Protocol Working Group. Earlier references: Digest Values for DOM (DOMHASH).


IETF/W3C XML Signature and XML Key Management

"The mission of the XML Signature Working Group is to develop an XML compliant syntax used for representing the signature of Web resources and portions of protocol messages (anything referencable by a URI) and procedures for computing and verifying such signatures. This is a joint Working Group of the IETF and W3C.

"The mission of the XML Key Management Working Group working group is to develop a specification of XML application/protocol that allows a simple client to obtain key information (values, certificates, management or trust data) from a web service."

General Reference documents

W3C Specifications


ISO (International Organization for Standardization)

Several ISO/IEC standards relevant to digital signatures are listed/described at the Diffuse website:

  • ISO 9796 Digital signature schemes giving message recovery
  • ISO 9797 Message Authentication Codes
  • ISO 9979 Registration of Cryptographic Algorithms
  • ISO 10118 Hash-functions
  • ISO 11770 Key Management
  • ISO 13888 Non-repudiation
  • ISO 14888 Digital signatures with appendix
  • ISO 15946 Cryptographic techniques based on elliptic curves


JCP (Java Community Process)

JCP is an "open, participative process to develop and revise the Java technology specifications, reference implementations, and test suites, the Java Community Process (JCP) program has fostered the evolution of the Java platform in cooperation with the international Java developer community."


OASIS Digital Signature Services (DSS)

"The OASIS Digital Signature Services Technical Committee (DSS) will develop techniques to support the processing of digital signatures. This includes defining an interface for requesting that a web service produce and/or verify a digital signature on a given piece of data and techniques for proving that a signature was created within its private key validity period."

The DSS proposal says: "Many efforts related to digital signatures and related technologies are underway throughout the industry. The following work may be relevant to this Digital Signature Services TC:

[November 26, 2002] Entrust Contributes Digital Signature Protocol Specifications to OASIS DSS TC. A posting from Robert Zuccherato (Entrust) to the OASIS DSS TC list announces the contribution of three technical specifications from Entrust germane to the work of the OASIS Digital Signature Services Technical Committee. An X-KISS Extension for Digital Signature Verification defines an extension to the XKMS X-KISS protocol that supports the verification of digital signatures. The document Digital Signature Web Service Interface "describes an RPC interface for a centralized digital signature web service that enforces policy controls on who can request signatures for specific transactions. The signature is calculated using a private key owned by the web service for the purpose of producing an 'organization' signature. Thus, anyone within the organization authorized to obtain an 'organization' signature can obtain it simply by request to the web service." A third document Tokens and Protocol for the Temporal Integrity Markup Language (TIML) "defines an XML schema for a timestamping protocol. Its schema is based upon the RFC 3161 ASN.1 timestamping protocol, but uses the XML Signature standard for signature formatting." These three protocols developed at Entrust are believed to meet the requirements for three particular deliverables sketched in the TC's provisional Statement of Purpose.

[November 27, 2002] Schema/DTD for Response from a Digital Signature Verification Web Service. Posted to the OASIS DSS TC list by Manoj K. Srivastava (Infomosaic Corporation) on 2002年11月27日. "I would like to submit the following DTD / XSD for response from a digital signature verification web service. You can try a signature verification web service, which follows the above schema, hosted by Infomosaic. See the text version.

References


Other Specifications

[Section not complete]

  • "Specifications for the Digital Signature Standard (DSS)." [US] Federal Information Processing Standards Publication (FIPS) 186-2. U.S. Department Of Commerce / National Institute of Standards and Technology (NIST). 2000-January-27. 76 pages. "This publication prescribes three algorithms suitable for digital signature (ds) generation and verification. The first algorithm, the Digital Signature Algorithm (DSA), is described in sections 4 - 6 and appendices 1 - 5. The second algorithm, the RSA ds algorithm, is discussed in section 7 and the third algorithm, the ECDSA algorithm, is discussed in section 8 and recommended elliptic curves in appendix 6." [cache]

  • ISO/IEC 15945:2002. Information technology -- Security techniques -- Specification of TTP services to support the application of digital signatures. JTC 1/SC 27. See the description from Diffuse: "ISO/IEC 15945 / ITU-T X.843 defines those TTP services needed to support the application of digital signatures in commercial applications. It also defines interfaces and protocols to enable interoperability between entities associated with these TTP services."

  • ANSI X9.31-1998: Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA). Covers both the manual and automated management of keying material using both asymmetric and symmetric key cryptography for the wholesale financial services industry. ANSI X9.31 contains the complete specification for the RSA signature algorithm.

  • ANSI X9.55-1997: Public Key Cryptography for the Financial Services Industry; Extensions to Public Key Certificates and Certificate Revocation Lists. As standards for public key certificates evolve, this standard extends the certificate with provisions to facilitate explicit management of certificates, certification paths, security policies, and transfer-of-trust so that non-hierarchical infrastructures are practical and manageable.

  • American Bar Association Digital Signature Guidelines. "The "Guidelines" describe a system for ensuring the identity of the holder of a private key, for making digital signatures as usable in commerce and in legal proceedings as a written signature on paper, and for ascribing appropriate responsibility to those engaged in electronic commerce should one of the parties involved deny liability under the transaction."


General Reference Works/Collections

[Section not complete]


Articles, Papers


SEARCH
Advanced Search
ABOUT
Site Map
CP RSS Channel
Contact Us
Sponsoring CP
About Our Sponsors

NEWS
Cover Stories
Articles & Papers
Press Releases

CORE STANDARDS
XML
SGML
Schemas
XSL/XSLT/XPath
XLink
XML Query
CSS
SVG

TECHNOLOGY REPORTS
XML Applications
General Apps
Government Apps
Academic Apps

EVENTS
LIBRARY
Introductions
FAQs
Bibliography
Technology and Society
Semantics
Tech Topics
Software
Related Standards
Historic
Last modified: January 07, 2003

Hosted By
OASIS - Organization for the Advancement of Structured Information Standards

Sponsored By

IBM Corporation
ISIS Papyrus
Microsoft Corporation
Oracle Corporation

Primeton

XML Daily Newslink
Receive daily news updates from Managing Editor, Robin Cover.

Newsletter Subscription
Newsletter Archives
[画像:Globe Image]

Document URI: http://xml.coverpages.org/digitalSignature.htmlLegal stuff
Robin Cover, Editor: robin@oasis-open.org


AltStyle によって変換されたページ (->オリジナル) /