ADSS Server Historic Signature Verification
ADSS Server Historic Signature Verification
ADSS Server Historic Signature Verification
Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held in electronic form and as important documents need to be referred to over a period of time this area will become increasingly important and relevant to businesses, governments and individuals. For example legal agreements, government and financial documents need to be referred to and validated at various points during their lifetime. Sometimes this can be many years after the document was originally created, for example old tax records, patent data, land ownership. To support these needs various digital signature techniques can be used. This paper discusses how the advanced digital signature features of Ascertias ADSS Server can be used to fully address these requirements for long term signatures and historic validation.
www.ascertia.com
Page 1
Depending upon the type of data and signature, the resulting long term signature is referred to as XAdES-X-L for XML signatures, CAdES-X-L for PKCS#7/CMS signatures and PAdES for PDF signatures. The validation data that forms part of the long term signature can either be individual certificate status responses (OCSP) or complete Certificate Revocation Lists (CRL). Both must relate to the time when the document was signed and additionally the validation data must be for the full certificate chain and not just the signers end-entity certificate. www.ascertia.com Page 2
The first is to periodically add Archive Timestamps to the long term ETSI signatures to create AdES-A signatures The second is to create Evidence Records for any archived documents.
Archive Timestamping
Over time digital signatures can become weaker due to advances in computing power and/or crypto-analysis techniques. To overcome this, ETSI long term digital signatures can be periodically archive timestamped with stronger algorithms. The timestamp protects the signature it envelops and the cryptographic strength is dependent purely that of the latest timestamp.
The resulting archive signature is referred to as XAdES-A for XML signatures and CAdES-A for PKCS#7/CMS signatures. ADSS Server supports the creation and verification of these archive timestamp signatures.
Data Object
Meta Data Hash & Timestamp Archive Process Meta Data ERS
Data Object
Meta Data Verify request & client authorisation Gather Archive Process Meta Data Request timestamp for full archive object
DB
mo .aire sa. w ct c ww
Meta data may include items such as file names, author details, detached digital signatures etc. Archive Process Meta data may include archiving time, retention period, cryptographic information etc. ADSS Archive Server provides full support for long term archiving i.e. the creation, renewal and verification of evidence records (ERS) and is compliant with the draft IETF LTANS standard. LTANS defines two encoding formats for the ERS one in ASN.1 format and one in XML, ADSS Server supports the XML format referred to as XMLERS. The LTANS interface for access the archiving authority is also XML/SOAP web services and referred to as Long Term Archive Protocol (LTAP). The additional advantage of LTANS over the ETSI archive timestamp approach is that the Evidence Records can be automatically refreshed based upon a defined policy so that the business application doesnt need to be involved in trying to re-timestamp. Re-evidencing can be based upon the use of lifetime timestamp authority certificates with a periodic assessment of algorithm strengths, or alternatively just on policy (e.g. automatically re-evidencing every couple of years).
www.ascertia.com
Page 4
ADSS Server Historic Verification and Validation Signature and Certificate Quality Assessment
Another important aspect of signature verification is that of signature and certificate quality. The motive behind this is that in a large cross-border environment it becomes difficult to determine to what degree to trust certificates (and thus digital signatures) which are from foreign CAs. This issue is recognised within the European Commission, and as a result the new PEPPOL (Pan-European Public Procurement On-Line) project aims to standardise quality criteria for all electronic signatures between enterprises and EU government institutions for all procurement processes. PEPPOL proposes the use of signature policies to define the acceptance criteria for e-signature and the provision of Validation Authority (VA) services based on the OASIS DSS Verify protocol and W3C XKMS Validate protocol. These and other protocols are already supported by ADSS Server. The purpose of the quality ratings is to enable business applications to more easily decide if sufficient trust and assurance exists in signatures and certificates to allow transactions to be accepted. The way this works is that ADSS Server is configured to respond with rating values for certificate quality (from 0 to 6), independent CA assurance (from 0 to 7), and hash and public key qualities (0-5). The business application can now make its decisions based not only that the certificate is valid but also that it meets the required quality levels. The Ascertia solution paper Creating PEPPOL solutions for eProcurement projects discusses this area in further detail shown as a PDF document on the Ascertia website.