首页    期刊浏览 2024年09月21日 星期六
登录注册

文章基本信息

  • 标题:Issues regarding digital signature infrastructure and digital certificate management.
  • 作者:Robu, Raul ; Filip, Ioan
  • 期刊名称:Annals of DAAAM & Proceedings
  • 印刷版ISSN:1726-9679
  • 出版年度:2008
  • 期号:January
  • 语种:English
  • 出版社:DAAAM International Vienna
  • 摘要:The high performances reached by the information technology during the last years and its decreasing costs made it possible to present, manipulate and archive documents more and more in an electronic format. In this context, an essential role is played by the digital signature, the instrument through which the content of an electronic document and its issuer are authenticated in an almost infallible manner.

Issues regarding digital signature infrastructure and digital certificate management.


Robu, Raul ; Filip, Ioan


1. INTRODUCTION

The high performances reached by the information technology during the last years and its decreasing costs made it possible to present, manipulate and archive documents more and more in an electronic format. In this context, an essential role is played by the digital signature, the instrument through which the content of an electronic document and its issuer are authenticated in an almost infallible manner.

The digital signature is implemented using cryptographic methods based on two keys: a private key and a public key (Diffie & Hellman, 1976). The base principle of these methods is: a hash function--such as MD5, SHA1 (NIST, 1995), SHA2 (NIST, 2002)--is applied on document, in order to extract from the document a binary code, known as hash value (we note it H1), representing essential data. The hash value is encrypted (Rivest et al., 1978) with the private key of the signer, obtaining a cryptogram which represents it self the signature and which is attached to the original document. Signature validation procedure is achieved by extracting the hash value from the signed document (we note it H2), decrypting the cryptogram which is attached to it by using the public key, in order to obtain the initial hash value (H1). If the two hash values are identical (H1 and H2), the signature is valid.

2. THE DIGITAL SIGNATURE INFRASTRUCTURE

The required infrastructure to implement a digital signature system mainly consists from: digital certificates, server certificates, certification authorities (CA), facilities for the certificate management

2.1 Digital certificates

The digital certificate represents a collection of data in electronic format which confirm the connection between the validation data of the digital signature and a person, authenticating the identity of that person (Romanian Parliament, 2001). The most important data contained by a digital certificate are: public key, the name and the signature of the certification authority that issued the certificate, the holder's name, the cryptographic algorithm and the hash function used.

[FIGURE 1 OMITTED]

The most widely used digital certificate is the one with the number X.509, standardized ISO/IEC/ITU--version 3 (figure 1).

A system based on public key certificates also involves the existence of a Certification Authority, which releases certificates for a certain group of a key pair's owners (public and private). Each certificate contains the value of the public key and information that identifies in a unique mode the subject of the certificate (which can be a person, an application, a device or another entity which has the private key corresponding to the public key integrated in the certificate). The certificate represents a connection, impossible to fake, between a public key and a certain attribute of its possessor. The certificate is digitally signed by a Certification Authority, which confirms the identity of the subject. Once the certification infrastructure is established, a user of that public keys' infrastructure can obtain a public key for any of the users certified by that Certification Authority, simply by obtaining the certificate for that user and extracting the required public key (Patriciu et al., 2001).

2.2 Certificate servers

A certificate server, also known as a Cert-server or a Key-server, is in fact a database which allows the users to search or generate digital certificates. A Cert-server usually provides some administrative components which allow certification companies to maintain the security policies--for example, to permit storage only for the keys that fulfill certain conditions.

The most well known certificate servers are (Patriciu et al., 2001):

* Netscape Certificate Server: interoperates only between Netscape clients.

* Microsoft Certificate Server (IIS): interoperates between Netscape clients, as well as Entrust clients.

* Entrust Web/AC Server: permits SSL, S/MIME certificates to be released and published as well as the signing of objects for Netscape Enterprise Server, for MS IIS and Apache Stronghold servers.

2.3 Certification authorities

Because it is not practical for all the users in the world to trust a single organization or company concerning their secret communications, there are more Certification Authorities. They mutually detain certificates--not necessarily each one to the other one-, with the help of which an user having a certificate released by a certain authority--such as CA1--may obtain the public key of an user possessing a certificate released by another authority--such as CA3, for example -. Therefore, a so called certification chain or path is constituted -see figure 2-, in which, at the present time, all the great systems that distribute public keys are registered in.

A credible certification authority which does not have a digital certificate issued by another certification authority stands at the highest level of the previously mentioned hierarchy. The public key released by such a certification authority must be recognized in an independent manner, i.e. published on a large scale (DigiSign, 2006).

For example, in Romania, there are two certification authorities, DigiSign and e-Sign both headquartered in Bucharest. These companies are certified by ADACOM, and VERISIGN is the root of this certification tree. A certificate released by the e-Sign company is presented in figure 3.

[FIGURE 2 OMITTED]

[FIGURE 3 OMITTED]

3. THE MANAGEMENT OF DIGITAL CERTIFICATES

The certification authorities usually have a secure site that allows the management of certificates. The management of digital certificates comprises (DigiSign, 2007):

a) Registration in order to obtain a digital certificate:

A person who buys a digital signature from a certification authority receives a cryptographic secure device (like e-token or smart card). Any use of the secure device involves entering the pin code. At three wrong introductions of the pin code, the device locks and can be unlocked by entering the puk code.

In order to obtain a digital certificate, one has to register on a secure page of the certification authority's website. Before registration, the future signatory must send certain documents to the certification authority. These documents consist of copies of personal identification documents, as well as a statement certified by the public notary through which one declares on his own risk that he learned about the legal provisions regarding the digital signature. The next step involves the installation of secured device drivers. Once these steps are taken, the registration process can be carried out only using the cryptographic device connected to the computer. The person fills in the form in which he enters personal data. Some of these personal data, such as one's name, email address, workplace, phone number, will appear in the certificate. The future signatory must also enter a password, which is needed in case of the certificate's revocation.

b) Receiving the certificate: Within 24 hours of the registration time, the administrator of the application who manages the certificates verifies the accuracy of the registration data, comparing them with the ones contained in the papers sent by the person. In case the registration data are valid, the administrator sends to the applicant, an email which contains a link and a password that the applicant can use to download the certificate. The applicant must introduce the cryptographic device in the computer and then he can download the certificate on the secure device. After this operation, the applicant can digitally sign any document.

c) Searching the certificates: all digital certificates generated by certification authorities are public and accessible to everyone. The confidentiality of a document or email message can be assured by encrypting the email message or document with the recipient's public key. This way only the recipient can decrypt the email or document with his private key located on his secure device. That is why certification authorities offer the opportunity to search and download any certificate generated by them, to anyone who is interested.

d) Renewal of the certificate: digital certificates have a period of validity of one year. They must be renewed annually, the expired certificates having no legal power.

e) Revocation of the certificate: if a person has lost possession of the secured device and believes that the pin code necessary in order to be able to sign is compromised, he may revoke the certificate. The digital signature done with a revoked certificate no longer has any legal value.

4. CONCLUSIONS

Digital signature offers many advantages and can be used in a wide range of applications, being able to substitute physical signature in any domain.

This technology assures important time reductions, allowing the achievement of remote transactions between individuals and / or institutions and eliminates paper work.

The authors offer in this paper a systematic presentation of the infrastructure of the digital signature and of the management of digital certificates, founded on their practical experience in implementing digital signature in hospitals and territorial work inspectorates from several counties of Romania.

5. REFERENCES

Diffie, W. & Hellman, M. (1976). New directions in cryptography, IEEE Transactions on Information Theory, Vol. 22 (Nov. 1976), pp. 644-654, ISSN 0018-9448

DigiSign (2006). The trust chain, Available from: http://www.digisign.ro/products-and-services/security-services/ qualified-certificates/lant.html, Accesses: 2008-06-14

DigiSign (2007). Registration, Searching, Renewal and Revocation of certificates, The homepage of Center of Digital Certification, Available from: https://ca-services. digisign.ro/public/digitalidCenter.htm, Accessed: 2008-06-15

NIST--National Institute of Standards and Technology (1995). Announcing the Secure Hash Standard, FIPS 180-1 (1995)

NIST--National Institute of Standards and Technology (2002). Announcing the Secure Hash Standard, FIPS 180-2 (2002)

Patriciu, V.V.; Ene-Pietrosanu, M.; Bica, I.; Vaduva, C. & Voicu, N. (2001). Security of electronic commerce, Bic All, ISBN 973-571-325-X, Romania

Rivest, R.; Shamir, A. & Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, Vol. 21 (Feb. 1978), pp. 120-126, ISSN 0001-0782

Romanian Parliament (2001). Law nr. 455 about digital signature, Official Gazette of Romania, No. 429 (Jul. 2001), Available from: http://www.mcti.ro/index.php?L=0&id=20 &lege=3, Accessed: 2008-06-14
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有