Digital Signature
Hassenstein Thema 4
Hassenstein Thema 4
Set of flashcards Details
Flashcards | 33 |
---|---|
Language | English |
Category | Computer Science |
Level | University |
Created / Updated | 03.01.2019 / 31.01.2019 |
Weblink |
https://card2brain.ch/box/20190103_digital_signature
|
Embed |
<iframe src="https://card2brain.ch/box/20190103_digital_signature/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Create or copy sets of flashcards
With an upgrade you can create or copy an unlimited number of sets and use many more additional features.
Log in to see all the cards.
What is a digital timestamp?
What does it increase or support?
- a digitally signed attestation (Beglaubigung, Bescheinigung) provided by trustworthy service which confirms that certain data have been present at a specific time
- it increases level of probative value (beweiskraft) and non-repudation, also often very helpful to have a timestamp as such
Long Term Validation (LTV)
What is this used for?
Why do we request LTV?
By which means can LTV be fulfilled?
- All revocation information, certificate chain and timestamps necessary to validate a
signature will be included in the document or data, even though they normally can be
obtained during signature validation. So even if the certificate issuer were to cease to
exist, it is still possible years later to know that at the third-party confirmed point in time
of signing, the signing certificate itself and the corresponding chain was good.
- At any time in the future it must be possible to validate a signed
document to confirm that the signature was valid at the time it was
signed – a concept known as Long-Term Validation (LTV).
- it needs revocation infromation, certificate chain and timestamp
Long Term Archiving (LTA)
What is LTA used for?
- Digital signed documents must also be archived for a
long time – even many decades. At any time in the future,
in spite of technological and other advances, it must be
possible to confirm that the signature is still valid and
tamperproof.
Due to the aging process of key material (computing
power) or cryptographic algorithm (findings in
cryptanalysis) an initially secure signature may get weak. -> due to that QES may loose its provative value -> should be resigned
What does the eIDAS (electronic IDentification authentication and signature) and ETSI (European Telecommunication Standards Institute) provide?
- they provide trust and confidence in electronic transactions and publishes standards for trust services providers, electronic signatures and electronic seals / time-stamps
What are the 4 baselines of the three main ETSI standards used for high-value signatures (XAdES, PAdES, CAdES)?
- Zusammenfassung der Baselines:
- B: SignedInfo, SignatureValue, KeyInfo and SignedProperties
- T: timestamp
- LT: longterm
- LTA: longterm with archive timestamp
- BASELINE-B: (Basic Electronic Signature) the lowest and simplest version just
containing the SignedInfo, SignatureValue, KeyInfo and SignedProperties. This level
combines the old -BES and -EPES levels. This form extends the definition of an
electronic signature to conform to the identified signature policy.
- BASELINE-T: (Signature timestamp) A timestamp regarding the time of signing is
added to protect against repudiation.
- BASELINE-LT: (Long Term level) Certificates and revocation data are embedded to
allow verification in future even if their original source is not available. This level is
equivalent to the old XL level.
- BASELINE-LTA: (Long Term with Archive timestamp) By using periodical timestamping
(e.g. each year) compromising is prevented which could be caused by
weakening previous signatures during a long-time storage period. This level is
equivalent to the old -A level.
What for is the Swiss Electronic Signature Act (ZertES)?
- an electronical identity for all swiss citizen
What legal imlications does the ZertES have?
- same legal impl. as a handwritten signature
As with eIDAS (electronic IDentification authentication signature) with ZertES it allows it to enhance its legal imlication through what?
And what device is used to create such signature?
Where is such a signature attached?
Who can such a qualified certificate be issued to?
- same as AdES (advancedelectronic signature) it allows to enhance its legal implication trhough a regulated and qualified electronic signautre (QES)
- secure signature creation device (SSCD)
- to a qualified certificate
- to a natural person
When such a ZertES is attached to a X509 Cert, what fields must be modified?
► authorityKeyIdentifier: Identifier of the CSP‘s key,
which signed the certificate.
► keyUsage (Critical): Purpose of the key →
contentCommitment = nonRepudiation
Dass eine CSP solche ZertEs austellen kann, muss sie was bestehen?
- Einem Audit von SAS (Schweizerische Akkreditierungsstelle
- Nein, erst das qualified certificate (unten rechts) ist mit dem gleichzustellen?
- Nein, dies kann nur an natürlich Personen ausgestellt werden.
- Dies ist ein Standard für die Public Key crypto, welche die Schnittstelle von OS zur Crypto Hardware darstellt, mit welcher man entsprechend keys/certs brauchen, erstellen, löschen, modifizieren kann.
- dasselbe wie oben für Microsoft ;-)
- Bei Local Signing wird ein lokales physisches z.B. Token verwendet, um mittels keys/certs daten zu signieren. Bei Remote Signing übernimmt ein Server das Signieren
TW4S (Trustworthy System Supporting Server Signing) generate advanced electronic signatures -> auf der rechten Seite unser TSP.
Was generiert dieser Service (Server Signing Application) für uns?
Was ist das HSM?
Was wird an den User retourniert?
- er signiert Dokumente für uns
- hardware security module -> es hält die keys und macht die kryptographischen Operationen
- Ein Dokument und deren signatur.
Recap: What do certificates provide?
- integrity
- authentication
- non-repudiation
Recap: Why are digital signatures important?
And what can be signed? (at least 3 answers)
- PDF, MS-Word
- XML docs
- emails
- image-/binary-files
Recap: Tell the 3 most common algorithms to create a digital signature?
- RSA
- DSA
- ECDSA
Recap: What part of a message is singed?
And which hashing algorithm family should be used?
- the message digest (rather than the message itself)
- SHA-2, SHA-3
Recap: What must a Digital Certificate include? (4 answers)
- bind public key to identity
- Path Validation up to root CA / Log Verification (CT-log)
- CP/CPS Policy (for what the cert should be used - ex. encryption, authentication or signing)
- Web Trust (http://www.webtrust.org/item64428.aspx) -->can provide assurance services to evaluate and test whether the services provided by a particular Certification Authority meet these principles and criteria.
CMS (Cryptographic Message Syntax) SignedData:
in which notation the CMS is presented?
what contains a cms signed message? (3 parts)
- ASN.1
- digital signature (encrypted hash)
- infromation about the signer (subject name
- serial number
PDF Signature Standard:
What is serial signing of PDFs?
What components are interanlly used for signing?
- serial signing is where each signature comprises the prveious signatures
- PKCS#7 and CMS
Signature in PDF
When a PDF is signed as below, is this signature embedded or is this a separate file?
What parts of the PDF can be signed
- it is embedded
- signature value may also include additional information such as a signature graphic a time stamp and other data
PGP Signature - has its own format, syntax and encoding
what can be signed?
- files and emails
XML Digital Signature
What can signature referecnes point to? (4 answers)
- child
- parent
- sibling
- other file
What type of XML signatures exist? (3 answers)
- enveloping
- enveloped
- detached
What can XML-D-Sig be used for? (2 examples)
- SOAP (Simple Object Access Protocol) - SOAP messages are ordinary XML documents, uses HTTP for transmission, uses WSS to encypt or sign
- SAML (Security Assertion Markum Language) - for exchanging authentication and authorization assertions, SAML is XML-based where requests and responses usually are singed
JSON Web Signature (JWS) what does it represent and what 3 main parts does it have?
- represents content secured with digital signatures or MACs using JSON based data structures
- 3 main pars:
- Header - parameter descriging the crypto operations and
- Payload - sequence of octets secured
- Signature - digital signature or MAC over header and payload
OAuth 2.0 what does it provide?
Open Id Connect extends OAuth with what?
- token to authorize calls to back-end resources
- adding an authentication and identity layer providing information about the end-user
Electronic Signature vs. digital signature.
What is the difference?
- ES -> a legal non-technica term, includes also non-crypto procedures as scanned handwritten signature
- DS -> Based on crypto algorithms, generates a temperproof representation of the data (integrity), enables proving of data origin (sender/author),
-
- 1 / 33
-