Practitioner’s Perspective PKI Digital Signatures by Holly K. Towle, J.D.

advertisement
Guide to Computer Law—Number 284
Practitioner’s Perspective
by Holly K. Towle, J.D.
PKI Digital Signatures
Last month’s article discussed some of the issues surrounding electronic
signatures generally. That prompted several questions regarding electronic
signatures supported by public key infrastructure (PKI), which are
commonly referred to as “digital signatures.” Carrie Valladares, an attorney
in Preston’s Electronics in Commerce group, volunteered to tackle that
subject this month.
Holly K. Towle is a
partner with Kirpatrick &
Lockhart Preston Gates
Ellis LLP (K&L Gates), an international law firm,
and chair of the firm’s E-merging Commerce
group. Holly is located in the firm’s Seattle
office and is the coauthor of The Law of
Electronic Commercial Transactions (2003,
A.S. Pratt & Sons). Holly.Towle@KLgates.com,
206-623-7580.
Practitioner’s Perspective appears periodically
in the monthly Report Letter of the CCH Guide to
Computer Law. Various practitioners provideindepth analyses of significant issues and trends.
What Is a Digital Signature?
As noted last month, a “digital signature” is one kind of electronic signature.
But what kind?
The term references technology that presents one of the most secure methods
of electronic signature currently available, although it is not foolproof. The
technology is based on a system called “public key cryptography.” A user
is issued two “keys,” one private and one public. The keys are really two
numbers related by an algorithm such that it is generally impossible to
deduce one key from knowledge of the other (assuming that the keys are
long enough and there are no defects in generation of them). To “digitally
sign” a document, a party attaches his or her private key, stored on either
a secure computer or a smart card, to the document. The document is then
reduced into a “hash” (a numeric representation of the original document
made shorter through application of a “hash” function or algorithm), which
is encrypted. The “hash” is sent off to the recipient. The recipient, who has
access to the sender’s public key through a website, a certificate or an email from the sender, attaches the public key to the hash, which is then
decrypted. Because the public key can only decrypt a message signed by
the corresponding private key, and because the hash value would change if
the document were tampered with, the receiver knows that the document is
unchanged and was signed by the holder of the private key.
Where Do the Keys Come From?
Typically, keys are issued by a “Certification Authority” (“CA”) who
conducts varying degrees of checks to verify user identities. Before relying
on the signature’s authenticity, the recipient of a message containing a digital
signature must contact the CA to verify that a certificate issued with the
sender’s key has not expired or been revoked. The trick here is that the CA acts
pursuant to its own “Certificate Policy” or contract, which can be very long
and detailed and may or may not be appropriate for the kind of transaction in
which the keys are being used (e.g., the policy might be for transactions under
$10,000 and not involving real estate; the policy will also limit the liability of
the CA). Also, at least Washington State’s digital signature law only governs
CAs licensed by the state and, at present, there is only one of those. In short,
this is not really as simple as it appears (if it does, in fact, appear to be simple).
CCH GUIDE TO COMPUTER LAW
What Law Governs PKI Digital Signatures?
There is no generally applicable law: PKI digital signatures
are primarily technology-based protection. A few states do
have digital signature statutes, e.g., Washington and Utah.
A section of the American Bar Association issued lengthy
unofficial “Digital Signature Guidelines” that are commonly
consulted but do not have any legal effect. As for federal law,
the Electronic Signatures in Global and National Commerce
Act (E-Sign) generally prohibits states from favoring
particular technologies, although E-Sign should not prohibit
digital signatures. In short, the use of digital signatures is not
an area with developed legal authorities, which results in
some risk and uncertainty.
Are All Digital Signings the Same?
CAs vary in both reliability and verification due diligence, so
anyone relying on a digital signature (whether the person is
signing or receiving the document, assuming each wants an
enforceable document) will typically want to take a hard look
at the CA and its policies or contract. Some applications for
a certificate available online are intended to “sign” or verify
almost any digital data, including a web page, web form, XL
data, XML form and so on. An applicant who can supply
a typed name and email address can get a certificate from
some of these online CAs. This kind of certificate issuance
procedure is of limited value because it may only verify a
machine instead of a person, i.e., it may prove that someone
was sitting at machine X who signed document Y, but that
is not the same as being able to prove who the signer was at
machine X.
What Kinds of Issues Are Raised by the Small
Print of a CA’s Certificate Policy or the Law?
Under Washington law, the recipient of a digital signature
assumes the risk of forgery “if reliance on the signature is not
reasonable under the circumstances.” See e.g., RCW 19.34.310.
To figure out what that might mean (in Washington or by
analogy elsewhere), senders or recipients should at least
examine the CA’s policy/contract to determine what the
CA believes to be reasonable. Such examination will often
reveal that the certificate is inappropriate for the transaction
in question. This is because CAs do not have one-size-fits-all
certificates or polices and the parties must attempt to match
what the CA does provide to their circumstances. More often
than not, there will not be a match.
As a result, persons desiring to use a digital signature should
at least ask about the following: is there a certificate that
matches the value and type of the transaction in question; are
the steps necessary to obtain the certificate more inconvenient
than simply signing by hand or electronically with some
other system for verifying the signors; are the parties capable
of complying with the procedures necessary to deal with
the certificate; are third parties impacted by the transaction
willing to rely on a digital signature or will its use be treated
by them as insufficient; and does the CA’s policy/contract
appropriately address the risk of the transaction involved?
NUMBER 284
To illustrate, if the seller of real property digitally signs a deed
and a forgery nevertheless occurs (e.g., an ex-spouse who knows
the signor’s password, steals and uses the signor’s smart card),
is a payment of an amount from the CA (which will likely be
very limited under the CA’s terms) the remedy desired by the
buyer? The deed will be invalid (i.e., the buyer will not become
the owner of the property) and the payment will typically be
less than the value perceived as lost by the buyer. In fact, it is
more likely that the payment won’t even be due if the CA’s
certificate was designed for non-real estate transactions.
Is a Digital Signature Binding?
Washington law expressly allows a digital signature to satisfy
a “signature” requirement, but only if certain conditions are
met. For example, the digital signature must be verified by
the public key issued by a licensed CA; the signature must
have been affixed with the intent to sign (this is true under
traditional signature law as well); and the recipient of the
signature cannot be on notice that the signer: (a) breached a
duty as owner of the private key, or (b) was not authorized to
use the key. In short, simply because a digital signature is used
does not mean that it is automatically valid as a matter of law.
What Safeguards Can Be Taken if Digital
Signatures Are Used?
The central point is that digital signatures are not simple.
Nevertheless, in some circumstances they can save significant
time and money. Parties using digital signatures may wish to
consider some basic steps to mitigate some (but not all) of
the risks:
• Check that the Certificate is current. Certificates can
expire. Depending on the CA and jurisdiction, it may be
necessary to renew the certificate.
• The receiver must contact the CA to verify that the
signor’s key remains valid. Although some programs
alert the recipient if the key has expired, they might not
notify the recipient that the key has been revoked or
suspended.
• The holder of a private key must exercise some level of
care in maintaining its confidentiality. Under Washington
law, for example, "due care" is required.
• Proper maintenance of a private key is especially
important in Washington, where, for example, a signature
affixed with a person’s private key is presumed to be
the signature of the key owner and to have been affixed
with the intent of the key owner to sign. Although
the presumption can be rebutted, that will not always
be possible. It’s a bit like having a dog: don’t get one
unless you can take really good care of it and can train it
appropriately - or it may bite you.
• Consider engaging a date-time stamp service. In the
event that a key is stolen, the service is intended to
CCH GUIDE TO COMPUTER LAW
enable the user to identify documents fraudulently
signed. Date and time stamps also help to avoid
problems with time-sensitive communications, for
example, orders to purchase an item issued just prior
to a rise or fall in the price.
NUMBER 284
The above is not a complete list of issues that should be
considered in using digital signatures, and the pros and cons
of their use differ with transaction types and users. Digital
signatures do, however, provide alternatives that can be
useful in several types of transactions.
Download