Caslon Analytics elephant logo title for e-Signatures note
home | about | site use | resources | publications | timeline   spacer graphic   Ketupa

overview

basis

adoption















related pages icon
related
Guides:

Security &
InfoCrime


Governance

Information
Economy


Consumers
& Trust


e-Publishing


related pages icon
related
Profiles:


Forgery
& Fraud


Identity
Theft







section heading icon     basis

This page deals with the operation of digital signature schemes.

It covers -

subsection heading icon     public and private keys

E-signature schemes typically centre on creation and verification via public key cryptography, with an algorithm using two discrete but mathematically related keys -

  • one is used for generation of the digital signature or encryption of a document/communication so that it is unintelligible.
  • another key is used for verification of the signature or decryption of the data by/for the intended recipient.

Hardware and software with two such keys forms an asymmetric cryptosystem, with a private key (known only to the 'signer' and used to generate the digital signature) and the public key. The public key is often widely available as it is needed for verification of the e-signature, typically through publication to many people through an online repository.

In practice, although both keys are mathematically related, if the system has been designed - and, as importantly, implemented - securely it is not feasible to derive the private key from knowledge of the public key.

As a result, in what is commonly characterised as the principle of 'irreversibility', although many people may know a given signer's public key (and rely on it for validating that entity's signature) they cannot determine the private key and use it to forge the e-signature.

subsection heading icon     the hash function

The hash function is used both for creation and verification of an e-signature.

It is an algorithm that creates a digital 'fingerprint' through a "hash value" of a standard length which is usually much smaller than the message but nevertheless substantially unique to it. Any change to the message invariably produces a different hash result when the same hash function is used.

In the case of a secure hash function (sometimes referred to as a one-way hash function) it is "computationally infeasible" to derive the original message from knowledge of its hash value.

Hash functions therefore enable the software for creating e-signatures to operate on smaller and predictable amounts of data, while still providing robust evidentiary correlation to the data in the original communication/document. They serve as an efficient mechanism for assuring the integrity of a document or communication, indicating that it has not been tampered with since it was digitally signed.

subsection heading icon     generation and verification processes

Use of e-signatures involves two processes: creation and verification.

Creation is performed by the signer. Verification is undertaken by the recipient of the signature and/or another party, including a forensic consultant or court.

Creation uses a hash result derived from and unique to both the signed document/communication and a specific private key. For that hash result to be secure there must be only a negligible possibility that the same digital signature could be created by combination of any other message or private key.

Some e-signature schemes predicate creation on registration of the signer, with a registration authority (RA) for example determining the identity of an individual or organisation seeking to participate in the particular scheme. The RA might be a commercial vetting service, credit reference service, a government agency or data broker such as Choicepoint. Participation is often dependent on the signer entering into a contract with the scheme operator; such schemes generally limit the operator's liability.

Verification is the process of checking the digital signature by reference to the original item and a given public key, thereby determining whether the e-signature was generated for that document, communication or transaction using the private key that corresponds to the referenced public key.

As noted in the more detailed discussion of authentication in the separate Security & InfoCrime guide elsewhere on this site, that verification may

  • form one element of broader personal identification and authorisation schemes (eg this person has the valid signature but lacks the requisite authorisation for a particular transaction)
  • be accompanied by biometric identifiers, smart cards and other identification technologies

What is involved in signing?

To sign a document or communication (eg an email message) or authorise a transaction such as a payment or release of health records the signer first delimits the boundaries of what is to be signed. A hash function in the signer's e-signature software (held on a personal computer or other device that is assumed to be protected from unauthorised access) automatically computes a hash result that in practice is unique and specific to the message. The hash is entirely independent of the user's handwritten signature and is not, for example, a digital image derived from a scan of an ink on paper signature.

The software then transforms the hash result into an e-signature using the signer's private key. It is expected that the resultant signature will be unique both to the document/communication or transaction and to the private key used to create it.

Typically, an e-signature (a digitally signed hash result of the message) is attached to the particular signed data and transmitted as part of that document/communication or transaction. It may, however, be transmitted as a separate data element or stored separately, subject to preservation of a reliable association with the particular document, message or authorisation. Given that a digital signature is unique to the signed data, it is useless if wholly disassociated from that document/communication.

Verification of a digital signature is accomplished by computing a new hash result of the original message by means of the same hash function used to create the signature. Using the public key and the new hash result, the verifier checks whether the e-signature was generated through use of the corresponding private key and whether the newly computed hash result matches the original hash result (ie the hash that was transformed into the e-signature during the signing process).

Confirmation of the e-signature by that verification software is dependent on two factors.

The signer's private key must have been used to digitally sign the message, assumed to be the case if the signer's public key was used to verify the signature - the signer's public key will verify only a digital signature generated with the signer's private key.

The integrity of the document/communication must also be intact. That is signified if the hash result computed by the verifier is identical to the hash result extracted from the e-signature during the verification process.

Various asymmetric cryptosystems create and verify digital signatures using different algorithms and procedures, but share this overall operational pattern.

subsection heading icon     association

To verify a digital signature, the verifier must have access to the signer's public key and have assurance that it corresponds to the signer's private key. However, a public and private key pair has no intrinsic association with any person; it is simply a pair of numbers. It is therefore necessary to reliably and easily associate a particular person or entity to the key pair. That association is integral to the use of e-signatures.

In relationships involving only a few parties (particularly where there are recurrent transactions), each party can simply communicate the public key by a secure mechanism such as face to face contact or a courier.

That mechanism for associating the keys is not viable for much activity on the net, distinguished by -

  • a large number of transactions (including one-off and recurrent interactions that may be minutes or months apart)
  • parties that are geographically distant from each other
  • dealings between individuals, government agencies, SMEs and major corporations or their agents (eg payment processors and fulfilment specialists)
  • concerns about trust, reliability and repudiation
  • concerns about speed of verification and reduction of transaction costs

Signers have accordingly adopted two approaches.

One approach, favoured by some members of the ICT community, has been to self-publish their public keys - typically with a statement such as "signatures verifiable by the following public key are mine".

That approach has not had mass acceptance, given that reliance upon an essentially self-referential statement involves risks of

  • trusting a phantom (does the individual or organisation really exist)
  • being the victim of personal or corporate identity theft
  • attempting to disprove a false denial of a digital signature if a transaction should turn out to prove disadvantageous for the purported signer.

A common response to that problem is use of one or more trusted third parties (TTP) to associate an identified signer with a specific public key.

subsection heading icon     certification authorities

That trusted third party - which generally operates on a commercial basis, is often independent of government and may operate across national boundaries - is commonly characterised as a certification authority (CA).

To associate a key pair with a prospective signer, the CA typically issues a certificate - an electronic record that lists a public key as the 'subject' of the certificate and confirms that the prospective signer (aka the subscriber) identified in the certificate holds the corresponding private key.

A certificate serves to bind a key pair with a particular subscriber. A "recipient" of the certificate desiring to rely upon a digital signature created by the subscriber named in the certificate (whereupon the recipient becomes a "relying party") can use the public key listed in the certificate to verify that the digital signature was created with the corresponding private key.

If such verification is successful, it offers some assurance that the corresponding private key is held by the subscriber identified in the certificate and that the e-signature was created by the particular subscriber.

The CA digitally signs the certificate to ensure its authenticity, with that signature being verified through the CA's public key listed in another certificate by another CA. That other certificate can in turn be authenticated by the public key listed in a further certificate. The issuing CA must digitally sign its own certificate during the operational period of the other certificate used to verify the CA's digital signature.

To make a public key and its identification with a specific subscriber readily available for use in verification, the certificate may be published in a repository or made available by other means.

Repositories are online databases of certificates and other information available for retrieval and use in verifying e-signatures. That retrieval can be undertaken automatically by having the verification program interact with the repository to obtain certificates as needed.

subsection heading icon     timeframes

An ink on paper signature lasts until the ink fades, paper decays or characters are erased. E-signatures, in contrast, are generally expected to have a finite life, rather than being current and valid for all time.

As a result e-signatures generated by a subscriber to authenticate a document and by a CA to validate its certificate are usually time-stamped (in some instances by TTP timestamp providers) to assist verification of whether the digital signature was created during the 'operational period' identified in the certificate.

subsection heading icon     reliability and liability

Once issued, a certificate may prove to be unreliable.

That may be because the subscriber loses control of the private key after issue or one or more TTPs are compromised, eg through inappropriate release of information by staff or a hacker.

As with passports and other official documents, it is conceivable that a subscriber might gain a certificate by supplying false information to the CA at the time of issue (eg misrepresenting personal identity).

When alerted to unreliability the certification authority should then

  • revoke (permanently invalidate) the certificate
  • suspend (temporarily invalidate) the certificate

with or without the subscriber's request, depending on the circumstances.

Most e-signature regimes accordingly envisage that immediately after revoking/suspending a certificate - with information being added to a Certificate Revocation List (CRL) or Suspension List (CSL) - the CA will

  • publish notice of that revocation or suspension
  • notify entities who inquire or who are known to have received an e-signature verifiable by reference to the unreliable certificate
  • advise entities who inquire about the status of the e-signature.

subsection heading icon     Public Key Infrastructure (PKI)

As the following page of this note suggests, much discussion regarding e-signatures has been conceptualised as disagreement about public key infrastructure or merely the ambitions of bodies such as Australia's Government Public Key Agency (GPKA) and 1998 Gatekeeper report.

Like digital signatures and e-signatures the concept in practice means different things to different people. It can most profitably be characterised as a set of relationships and assumptions rather than a physical entity. PKI involves the interaction of document signers and recipients, government regulatory agencies, standard setting and auditing bodies, entities involved in issuing and verifying certificates (including agents such as ISPs, accountants and law firms), courts and mediation bodies, and IT or other service providers.

PKI regimes thus encompass -

  • national, international and nongovernment legal frameworks and industry codes
  • identification and maintenance of global best practice standards for internet interactions
  • a transparent and appropriate balance of risks and liabilities among all participants in the scheme
  • effective quality control protocols and practices, including maintenance of security and respect for fiduciary duties
  • delivery of services on a commercial or non-commercial basis, within and across jurisdictions
  • promotion of the scheme, since in practice it is not cost effective if (as in Australia) it is perceived as costly or inappropriate and is therefore adopted by only a handful of participants.

 







icon for link to next page    next page  (adoption)




this site
the web

Google

 

version of February 2006
© Caslon Analytics