practical digital signature issues paving the way and new opportunities n.
Skip this Video
Loading SlideShow in 5 Seconds..
Practical Digital Signature Issues. Paving the way and new opportunities. PowerPoint Presentation
Download Presentation
Practical Digital Signature Issues. Paving the way and new opportunities.

Loading in 2 Seconds...

play fullscreen
1 / 13

Practical Digital Signature Issues. Paving the way and new opportunities. - PowerPoint PPT Presentation

  • Updated on Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X co-chair <TB completed with OASIS DSS-X TC members>. Paving the way (I):

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Practical Digital Signature Issues. Paving the way and new opportunities.

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
practical digital signature issues paving the way and new opportunities

Practical Digital Signature Issues.Paving the way and new opportunities.

Juan Carlos Cruellas – DSS-X co-chairStefan Drees - DSS-X co-chair<TB completed with OASIS DSS-X TC members>


Paving the way (I):

    • OASIS DSS Standards. Protocols for central services providing signature generation AND verification.
      • Avoid problems of deployment of infrastructure required to support individual generation
      • All the complexity of verification implemented and deployed once at the server.
      • Reduces overhead of key management: the central server takes care of the required tasks on certs status in both generation and verification.
      • All the details of the policy for the signatures centralized.
      • May keep logs of the verification processes and results.
dss concept conventional approach
DSS concept. Conventional approach

Deploy key to each user

Handle Interface to all PKI functions

Security depends on user


DSS concept. DSS approach

Internal user

Authentication &




PKI CertificateManagement

dss also forms the basis for the emerging standard eid framework
DSS also forms the basis for the emerging standard eID-framework

classical DSS-domain



ISO/IEC 24727 / CEN TS 15480 („European Citizen Card“)



OASIS Digital Signature Services TC produced a set of OASIS standards, including the core protocols and a number of profiles.

When IPR modes changed, it was closed.

New OASIS Digital Signature Services eXtended TC created operating under OASIS RF IPR mode.


Ebxml Messaging Transport Binding for DSS.

    • Specifies how DSS messages are encoded and carried using OASIS ebXML Message Service (Ebxml MS).
    • Ebxml MS: designed for supporting e-business. Communities using it as regular transport mechanism, may use this binding.
    • Robust channel between DSS clients and servers.
    • Make use of all the Ebxml MS features, including asynchronous messaging.
  • Profile for managing visible signatures.
    • Need to display (mostly in signed documents) information on the digital signatures to human beings. Parts of this information may also be signed.
    • Aims at defining mechanisms enabling clients interacting with DSS servers, to incorporate this visual information in the created signatures.

In verification, DSS servers should be able to also verify some of the displayed information.

  • Profile for supporting centralized encryption/decryption.
    • Aims at providing protocols for requesting centralized encryption/decryption operations.
    • Works with CMS ContentInfo and with <xenc:EncryptedData> elements (binary and XML documents).
    • Allows to request encryption/decryption of only certain parts of a document.
    • Allows to request encryption for different intended recipients and operate with the corresponding encryption keys.
    • The combination of encryption and signature is also an issue for this profile.

Profile for detailed individual verification reports.

    • Aims at incorporating the capability of reporting individually on each signature found in a document. Also aims at incorporating in each report relevant details of the verification process.
    • Business requirement: log the details of the verification process, including the certificates whose status were checked, the time-stamps verified, the CRLs checked, the OCSP responses requested and checked, attribute certificates verified, commitment endorsed by the signer, etc…. And this for each signature found in the signed document.
  • Profile for signed verification responses.
    • Aims at allowing to DSS clients to request that the verification response is actually signed by the verifying server.
    • Business requirement: to get responses that may be seen…

…as signed receipts of the verification of a certain signed document.

  • Profile for handling signature policies.
    • Aims at allowing clients to request generation/verification of a digital signature following a certain set of rules (signature policy), and also allowing servers to report on the signature policy used for verifying certain signatures.
    • Business requirement: different documents may require different types of signatures, generated and verified following different rules and processes. This information is the signature policy. A server may be able to operate under different policies and allow to clients to select the suitable one.

Analysis of inter-relationships among existing profiles.

      • Requirement: the number of different DSS profiles requires the production of a document explaining their inter-relationships in order to make a right usage of them.
  • Paving the way (II): Interoperability events:
    • Standards more and more complex. Interoperability is an issue.
    • Interoperability tests:
      • Very useful for progressing towards interoperability.
      • Provide feedback to the Standardization Bodies from actual implementers, helping in getting better standards (identify wrong or ambiguous parts, identify new requirements, etc)

Face to face: XML Sec maintenance WG in 2007.

  • BUT now ALSO REMOTE interoperability events.
    • ETSI owns a portal supporting remote interoperability tests on XAdES signatures. It has conducted two Remote Interoperability events on XAdES (high figures of participation from Europe and Asia) and organized a third one for next year on XAdES and CAdES. See details at
  • Also former DSS TC organized a restricted interoperability test between the TC members.

New coming areas for digital signatures include trusted services supporting electronic business, with specific requirements on the signatures. One example:

    • “Registered Electronic Mail”. ETSI is about to publish its Technical Specification TS 102 640: “Registered Electronic Mail (REM): Architecture, Formats and Policies”.
    • REM: an “ enhanced form of mail transmitted by electronic means (e-mail) which provides evidence relating to the handling of an e-mail including proof of submission and delivery “.
    • This TS specifies a generic architecture for the provision of this type of services, proposals for formats of signed evidences and requirements on the corresponding digital signatures. This spec also acknowledges the existence of centralized services for generation and verification of digital signatures for evidences (DSS set of protocols).