Requirements for the use of encryption and digital signatures

advertisement
Principal requirements for the use of
encryption and digital signatures in the
European energy sector
Current status and options for market participants
Status:
Version/release:
Revision:
Date:
Request for comments
0.3
none
February 15, 2016
Use of encryption and digital signatures in the European energy sector
2
CONTENTS
0
MANAGEMENT SUMMARY .................................................................................................... 4
0.1
0.2
1
BACKGROUND ......................................................................................................................... 4
KEY RECOMMENDATIONS ........................................................................................................ 4
INTRODUCTION ......................................................................................................................... 6
1.1
1.2
1.3
1.4
1.5
2
ABOUT THIS DOCUMENT .......................................................................................................... 6
SCOPE OF PROJECT ................................................................................................................... 6
PARTICIPANTS IN THE PROJECT ............................................................................................... 6
REFERENCES ............................................................................................................................ 7
CHANGE LOG ........................................................................................................................... 7
BACKGROUND............................................................................................................................ 8
2.1
MARKET DRIVERS .................................................................................................................... 8
2.1.1
General market features .................................................................................................. 8
2.1.2
Pressure on participants ................................................................................................. 8
2.2
EDI RELEVANT TRANSACTIONS AND THEIR REQUIREMENTS IN TERMS OF SECURITY............. 9
2.2.1
Invoices/credit notes and accompanying information ..................................................... 9
2.2.2
Customer master data ..................................................................................................... 9
2.3
TRADERS.................................................................................................................................. 9
2.4
POLITICAL FRAMEWORK ........................................................................................................ 10
3
THE LEGAL FRAMEWORK IN CONTEXT ......................................................................... 11
3.1
GLOBAL SITUATION ............................................................................................................... 11
3.2
EXAMPLE APPLICATION OF EUROPEAN DIRECTIVES – THE LEGAL SITUATION IN GERMANY 12
3.2.1
Status of legal documents .............................................................................................. 12
3.2.2
Principles concerning access to and verifiability of digital documents and
consequences within archiving processes ..................................................................................... 13
3.2.3
Consequences from the Act amending taxation on company turnover.......................... 14
4
TECHNICAL STANDARDIZATION ...................................................................................... 15
4.1
DIGITAL SIGNATURES AND EDIFACT .................................................................................. 15
4.1.1
Progress of decision–making by the EDIFACT standardization bodies ....................... 15
4.1.2
Discussed alternatives for implementation into EDIFACT ........................................... 15
4.2
DIGITAL SIGNATURES AND XML .......................................................................................... 16
4.3
DIGITAL SIGNATURE AND E-MAIL ......................................................................................... 17
4.4
INTEROPERABILITY OF DIGITAL SIGNATURES........................................................................ 17
4.4.1
ISIS-MTT standard ........................................................................................................ 17
4.5
VALIDATION OF DIGITAL SIGNATURES ACROSS ASSOCIATION BOUNDARIES ........................ 18
5
PRACTICAL APPLICATIONS ................................................................................................ 20
5.1
5.2
5.3
6
GENERAL REQUIREMENTS ON THE USE OF DIGITAL SIGNATURES ......................................... 20
APPROACH IN EDIFACT INVOICES (EDIFACT-IMMANENT SIGNATURE) ............................ 20
TIME STAMP SERVICE ............................................................................................................ 21
IMPLEMENTATION AND BEST PRACTICE RECOMMENDATIONS .......................... 22
REALIZATION OF SECURITY IN THE ENERGY INDUSTRY’S ELECTRONIC LEGAL
RELATIONSHIPS AND BUSINESS TRANSACTIONS ................................................................................ 22
6.2
GENERAL PROCESS FOR SETTING UP PUBLIC KEY INFRASTRUCTURES .................................. 23
6.1
6.2.1
Possible process for the definition of business transactions/applications for which
certificates are to be used .............................................................................................................. 23
6.2.2
Registration process ...................................................................................................... 24
7
ebIX
OUTLOOK .................................................................................................................................. 25
May 16, 2006
Use of encryption and digital signatures in the European energy sector
ebIX
3
May 16, 2006
Use of encryption and digital signatures in the European energy sector
4
0 MANAGEMENT SUMMARY
This document is the first in a series of publications from the ebIX project “DigSig” regarding the use
of encryption and digital signatures within the European energy sector. It examines especially the
legal, organizational and technical aspects which need to be taken into consideration for the
introduction of digital signatures within the sector. Particular emphasis was laid on a broad perspective
going beyond company boundaries. It is of crucial importance to pursue the introduction of electronic
handling (instead of paper and manual signatures) in business relationships – digital signatures are a
means of providing verifiability to electronic data interchanges.
0.1
Background
The energy branch as a whole is facing this next important automation step that should be
implemented multilaterally, whenever possible. Pioneer work is not required to this end; other
branches like the automobile industry have shown that automation can be realized at a reasonable
expenditure.
The liberalized energy market has created new challenges in terms of logistics, in particular with
regard to mutual billing. Rapidly organizing electronic handling of this process will generate large
synergies for all market participants. According to a study of the EU Commission, companies can rely
on cost savings of up to 72 % through pure electronic invoicing with digital signature.
In legal terms, electronic invoicing without accompanying paper documents has, for example, been
possible in Germany since 1st January 2002; when verified with a so-called qualified digital signature,
the electronic transaction is recognized as a voucher for income tax deduction. Thus, the ground has
been prepared for exploiting a considerable rationalization potential.
As a result of the development of markets, on the one hand, and of the possibilities of information
technology, on the other hand, market participants agree that secure electronic transmission of
additional market data (such as metered values, schedules and customer data) is important. A modern,
secure Business Partner Network needs to be established which organizes Electronic Data Interchange
(EDI) between market participants, and which ensures conformity with the law, interoperability,
efficiency and liability. This system, if it is to be successful, must be based on mutual confidence and
uniform rules and procedures in terms of IT security which also guarantee minimum complexity and
thus maximum economic efficiency. This can be achieved through the use of digital signatures and
encryption in communication processes.
The necessary contractual elements can be laid down in interchange agreements governing electronic
business transactions. The necessary technology has been available in the market for a long time and
quick access is possible by means of secured e-mail technology. In order to define equal security
criteria within the area of confidence going across association boundaries, and to optimally support
companies with regard to implementation, it is advisable in economic terms to define a common
security policy (PKI-Policy – Public Key Infrastructure Policy) at market interfaces.
0.2
Key recommendations
The authors recommend that

market participants make certificates with public keys for encryption or for validation of
signatures available (criterion of publication);

communication partners encrypt data in online transactions and provide advanced or qualified
signatures (criterion of application);
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
5

communication partners use and accept digital signatures and source identifiers for verification of
legal liability, integrity, and authenticity (criterion of acceptance);

e-mails are generated in a verifiable manner with a source identifier for ensuring integrity and
authenticity, and encoding them on the basis of standard procedures for the ensuring
confidentiality;

documents are interchanged in accordance with the accepted formatted message types (using
EDIFACT, XML) (criterion of document compatibility);

all EDI message required for electronic invoicing with income tax deduction (and all declarations
of a legal nature) are signed with a qualified signature (with supplier accreditation, where this is a
legal requirement);

all other EDI messages are signed with at least an advanced signature;

Web-based online transaction services are authenticated and encoded by the respective servers in
an application-oriented manner;

rules and regulations required for interoperability and defined and made available to all market
participants;

model solutions be developed allowing market participants to purchase the required functionality
(BUY) or implement it themselves (MAKE) in an economically and technically simple manner.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
6
1 INTRODUCTION
1.1
About this document
Within the European energy sector, electronic data interchange (EDI) using a variety of methods has
become a core business enabler over the last few years. It is no longer possible to imagine how
liberalised energy markets would function without EDI; rapid and automatic interchange and
processing of business transactions, as far as possible without human intervention, is organisationally
and economically necessary for all participants at all levels. Whether the transactions contain metering
data, invoices, customer switching information or schedules: automation brings benefits through
process optimisation. Nevertheless, there are further, fundamental considerations – political,
organisational and technical – to bear in mind, which influence implementation.
Core processes with a high-volume character require supporting processes within the organisation.
Securing EDI transactions is one such supporting process, especially in connection with transparency
and integrity of the data involved. Just as a signature gives a piece of paper legal character – e. g. from
an offer to a contract – EDI requires the same legal status for security and non-repudiation. To this
end, it is essential that a secure business partner network be established, within which electronic
business transactions for all participants are made possible. Therefore we need to promote an
infrastructure which can be trusted both by larger corporations (with their own certification
authorities) and smaller companies (who buy-in from service providers).
This can only be guaranteed by verification and confidentiality mechanisms directly associated with
the information exchanged. These mechanisms need to cover the whole range of the logical
transactions consistently. This is necessary to be able to carry out transactions in the new deregulated
market between market participants in a legally correct and unambiguous manner in terms of liability
law, and not least in an inexpensive way under technical and organisational aspects.
This document investigates the possibilities and limits of the use of digital signature and encryption at
the information level within communication processes between market participants via Electronic
Data Interchange (EDIFACT or XML), some of which are very extensive, where the development of a
„Secure Business Partner Network“ comprising both the secure communication platform and secure
business transactions is required.
1.2
Scope of project
In the light of these requirements, a small project (“DigSig”) was established within the ebIX structure
to generate appropriate documentation which can then be used as a basis for implementation scenarios
on a national and/or international level. The intention is to describe the overall harmonisation
requirements for the use of encryption and digital signatures for electronic transactions within the
European energy sector; also being compatible with the following overall ebIX objectives:
1) Make recommendations of common procedures that facilitate the common open European energy
market
2) Make common standards for secure data interchange that can automate the process to reduce the
costs for the parties involved.
1.3
Participants in the project
The project is based on documents produced within the German national group (under the able
tutoring of Dr. Willi Kafitz, Siemens AG, Frankfurt) and has been coordinated for ebIX by Carl W.
Major. The following participants provided intellectual and/or financial support to the project:
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
Country
DE
DE
DK
BE
SE
NL
FI
NO
NO
SE
SE
CH
1.4
Name
Carl W. Major
Dr. Konstantin Staschus
Erik Hartwell
Hugo Dekeyser
Joachim Abrahmsén
Lodewijk ter Haar
Matti Vasara
Per M. Breistein
Ole Jacob Høyland
Oscar Ludwigs
Robert Lundin
Rudolf Baumann
7
Company
E.ON Netz
VDN
Energinet.dk
Eandis
Steria
Tennet
Fingrid
Statkraft
Statnett
Svenska Kraftnät
Steria
ETRANS
References
[1] Original project proposal, see http://www.ebix.org/
1.5
Ver.
0
0
0
0
0
ebIX
Change log
Rel.
1
1
1
2
3
Rev.
none
A
B
none
none
Date
2005-10-25
2005-11-17
2005-12-06
2006-02-28
2006-05-16
Changes
Document generated
Textual and structural corrections
Further corrections
Comments incorporated
Publication as ebIX RFC
May 16, 2006
Use of encryption and digital signatures in the European energy sector
8
2 BACKGROUND
2.1
2.1.1
Market drivers
General market features
To date, relatively few EU member states have completely opened up their electricity market. Where it
has occurred, however, even though former “captive customers” in closed supply areas are now free to
choose their electricity supplier, dependencies in the market and in electrical networks (which are
partly attributable to pure physical connections), have not disappeared. Going far beyond these mutual
dependencies (as compared for instance to the liberalized telecommunication market), the common
requirements in the electricity market in terms of metering, scheduling, system services, spot market,
balance settlement, customer switching and billing require close, authentic, binding and verifiable
communication relationships.
Such demands increase with the growing transparency in almost all market segments. Although the
switching rate of domestic customers is today still around 3 percent (that of small commercial
customers approx. 4 percent and that of industrial customers approx. 15 percent), the potential
willingness to switch is estimated to be five times as high. This becomes more apparent following the
conclusion of new (often more favourable) contracts with existing electricity suppliers, so-called
"internal switching". In early 2002, the number of such agreements amounted in Germany to more
than 25 percent for domestic customers and to more than 50 percent for industrial customers.
The resulting requirements for supply and billing relationships between market participants increase in
proportion to the requirements for verifiability and integrity of the data exchanged. These overall
security requirements on the Business Partner Network need to be satisfied for the relevant EDI
relationships in a practicable manner at reasonable cost. Early experience in other branches, such as
financial management, has shown that the use of digital signatures is reasonable in economic,
organisational and technical terms because the change of media for manual signatures can be avoided,
and rationalization potential is exploitable for other paper-based processes. Consequently, there are
many additional possibilities of streamlining business processes. Internal and external business
processes and their supporting processes are obviously affected to a similar extent in the electricity
sector because data exchange can be optimized both with other market participants and within
corporate groups.
Interdependencies between market participants are not trivial in this context. The most urgent business
processes with immediate effects on financial operations need to be resolved first in keeping with
three key criteria: legal conformity, interoperability and economic viability. Furthermore, the overall
concept implemented needs to be upwardly compatible with as many economically-reasonable EDI
business relationships as possible.
2.1.2
Pressure on participants
The technical interdependencies of energy supply remain virtually unchanged. A consequence of
deregulation however is new, more complex implementation processes. For example, apart from
customer switching in the private sector, the need for additional expenditure as recently recorded can
be attributed to billing of new customer groups, billing of network usage, invoices for provision of
materials, etc. Thus, pressure for action has arisen in particular in the context of invoicing.
The situation within the different energy utilities has become serious because the rising number of
paper invoices cannot be economically handled with the existing invoicing capacity. Though the
exchange of electronic documents (e. g. Excel) has helped in some areas in the short term, it is not the
right instrument for efficiently handling transactions of this order of magnitude.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
9
Besides, confidence in the integrity (consistency, correctness) of electronic transactions is needed in
order to achieve a higher acceptance of these procedures. Confidence in non-transparent procedures is
lower than in verifiable, non-contestable procedures. In particular, it frequently happens that several
entities are involved in the handling of billing data. Therefore, the data source, i.e. the sender, must
ensure the integrity of data from the outset. The recipient must be able to authentically identify the
data source/sender to ensure non-repudiation.
2.2
2.2.1
EDI relevant transactions and their requirements in terms of security
Invoices/credit notes and accompanying information
For a commercially-valid accounting transaction, all documents relevant to credit and debit entry need
to be taken into consideration. In addition, eligibility of invoice data is of particular importance to the
tax authorities where tax deduction on turnover.
Example of German legislation:
If solely electronic invoices and credit notes are to be exchanged without any accompanying
(paper) documents, they are subject to the legal requirements according to Section 14 of the
Income Tax Law that took effect from 1st January 2002: a qualified digital signature with
provider accreditation according to the Digital Signature Act is required in Germany by law.1
From the viewpoint of tax authority auditors, invoices, remittance advices and metering data in
electronic form all contain information relevant to accounting procedures; hence they are of legal
relevance to invoices and credit notes. The invoice message type covers invoices and credit notes,
remittance advices are payment notice messages which refer to the invoice in a payment transaction.
The metered data messages represent the values of consumption to be invoiced. These last two
message types constitute accompanying information to an invoice, having a document character
according to generally accepted principles of accounting.
Thus, these transactions are also to be signed digitally if only electronic exchange of invoices is
desired in business-to-business relationships of market participants.
EDI in the form of market interfaces thus organizes communication between market participants.
Metered values are however often transmitted, prior to the electronic invoicing process, to the metered
values database by internal or external network operators. As the transactions concerned are generally
confidential and effectively have an equivalent monetary value, the authenticity of the source and the
integrity of data have to be ensured. The technology used is based on public key infrastructures and
asymmetric cryptography.
2.2.2
Customer master data
Master data regarding customers, contracts and metering points which are transmitted through the
appropriate message type are also sensitive data. Data with the appropriate classification needs to be
safeguarded according to the specifications of data protection legislation. Negative examples from
other branches show the possible consequences of irregularities. Reports of illicit access to data by
hackers or insiders have already in many cases led to substantial damage to a company’s image. A
drastic example is the case of a large German bank whose stock price slumped in 2001 by almost 10%
for several days. In the medium term, such events frequently lead to calls to tighten up the legal
situation or increasing controls through supervisory boards (financial services supervision).
2.3
1
Traders
This reference legal situation is described in detail in Chapter 3.2.3.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
10
Traders assume a special role as market actors when trading in energy supply services. They purchase
energy from their own or external power generators and associated companies or through the Power
Exchanges, e. g. in Amsterdam, Leipzig and Oslo. Energy is sold to suppliers or network operators.
Thus, the message types




schedules
metered data
invoice
payment advice
all play an important role both in the internal and external relationship of any corporate group and
should as a consequence be adequately secured.
The contents and time-constraints of transactions need to be documented in legally binding terms. To
this end, telephone transactions are frequently tape-recorded today so that the time is simultaneously
documented. For all Energy Exchanges, electronic trading is increasing in importance. The Exchange
market has developed into a virtual market place. Errors attributable to a change of media (paper,
electronic, voice) and the resulting transactional errors can lead in many cases to considerable
investigative expenditure which may cause substantial costs for a just a few financial transactions. The
liability mechanisms discussed later in this paper can lead to improvements in this field.
2.4
Political framework
In the example of energy supply companies in Germany, all participants are interested in maintaining
the associations’ own guidelines and hence voluntary commitment to contribute to the successful
organization of market interfaces. If they were no longer able to do so, laws and a regulatory authority
would have to be established like in the communication branch to enforce the further deregulation of
the market.
The introduction of digital signatures is an important prerequisite for the implementation of binding
business transactions between market participants. This contributes to minimizing potential conflicts –
which are always counterproductive to the organizational aspects of a technically and economically
networked sector, such the energy market.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
11
3 THE LEGAL FRAMEWORK IN CONTEXT
3.1
Global situation
In nearly all Western countries, digital signatures are an accepted legal (though not yet universally
implemented) method to ensure the authenticity of the sender and the integrity of transmitted
information. Appropriate certification infrastructures (Public Key Infrastructures) are being
increasingly established within trade and industry and in public administration.
Internationally, three standardization authorities (CEN/CENELEC, ETSI and ISO/TEC JTCI) have
given an important impulse to European digital signature standardization (see EESSI Steering
Committee).

In technical terms, the work was organized within the E-SIGN standardization bodies and
other committees (such as for mathematical algorithms).

In political terms, Article 9 of the EESSI Steering Committee had a decisive influence on the
EU Directive.
In Europe, this European Directive was adopted by the heads of states and governments in autumn
1999, and put into force in January 2000 meaning that it had to be implemented into national
legislation by all participating states within 18 months. Subsequent harmonization has been pursued
e. g. through the “SmartCards eEurope” initiative. On the basis of Finnish proposals, this committee
also discussed a Europe-wide electronic identity card with digital signature.
The USA has given the use of electronic identity cards a legal basis (21 CFR Part11 of the USA); one
of the largest Public Key infrastructures worldwide is maintained by the Canadian government.
However, the North American approach leaves the initiative rather to market participants. The initial
approach of (continental) Europe – based on the EU Directive – led at the start to difficulties caused
by evaluation requirements (organizational and technical) of the field of application surrounding
qualified digital signatures and also due to legal requirements concerning regulation of liability. On
the other hand, this facilitated the establishment of a secure legal foundation in the medium term,
especially where manual and digital signatures co-exist legally and liability is guaranteed by
certification service providers.
Japan has since adopted large parts of the legal position of Germany, launching a 160 million Dollar
project for national SmartCards with digital signatures that are also capable of storing applications of
non-governmental organization at a later date (helping to minimize total costs and provide value added
services).
The financial sector is a further important driving force. The business-to-business approach is shown
by Identrus where member banks can market certificates for digital signatures worldwide to corporate
clients on the basis of extensive liability guarantees. The root certification authority („Root-CA“) is
located in New York. The business-to-consumer influences, as in the case of banking cards or in pointof-sale transactions, are also important. The introduction of the Europay/Mastercard/Visa standard
(EMV) for banking cards has been a driving factor in almost all Western countries. The current
functions of magnetic strips are gradually being replaced globally by microchip technology. This gives
rise to enormous savings in transaction costs, higher resistance to forgery and new value added
services, like bonus systems, etc.2
2
In January 2005, about 80,000 cash machines and 350,000 POS terminals were switched over to these new
technologies in Germany.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
12
This branch shows that the use of advanced digital signatures with a high security level in technical
and liability terms can also be increasingly importance in the legal framework of business contracts (as
in “General Standard Terms and Conditions”). Today, an inquiry for pension details can be addressed
to the German Federal Insurance Office for salaried employees by means of a banking card and digital
signature.
3.2
Example application of European directives – the legal situation in Germany
In Germany, the European Directive was implemented into German legislation through the Digital
Signature Act of 21 May 2001 and the Signature Ordinance of 20 October 2001.
3.2.1
Status of legal documents
Changes to the form requirements in private law (which became effective as on 1 August 2001) now
permit the electronic form of documentation (when verified with a digital signature) in many different
legal areas of the German Civil Code. Thus, there exists a legal foundation within national legislation
scope and security of liability within the European Community (NB. encryption is not subject to
statutory provisions but is left exclusively to the discretion of communication partners. However, if
document encryption is used for example for documents relevant under tax aspects, this will have an
impact on data access for periodic tax examinations).
The most important difference as compared to the paper form is the reversal of the burden of proof in
the case of legal assessment of digital signatures on electronic texts as evidence in legal proceedings.
The reasons for this are mainly consumer protection aspects. If today a party in a legal proceeding
submits a (certified) document, the opposing party must prove the falseness of this document in case
of doubt. But the legislator did not expect of the consumer as opposing party to be forced to prove the
falseness of a digital signature to an authority or to a company.
Additionally, areas have now been specified where manual signatures have been equated to qualified
digital signatures (in Germany with provider accreditation for the certificate).
It is also for the sake of consumer protection that e.g. a savings agreement with a building society can
be signed electronically because explicit decision-making can be assumed for this declaration of
intent. On the other hand, a consumer credit agreement which can also be concluded with a car dealer
or furniture store must still be signed manually. These examples show the possibilities and limits of
the use of digital signatures in business or in contacts with public authorities (B2C, A2C).
However, digital signatures do not have any perceivable specific legal consequences within electronic
business transactions via EDI processes (e. g, EDIFACT or XML). Nevertheless, only qualified digital
signatures qualify within the public legal scope where they are defined as equal to manual signatures.
Provider accreditation of the “trust center” by the German regulatory authority for electrical and gas
supply, telecommunication and postal services (REGTP) thus guarantees liability without bilateral
contractual relationships within the scope of customary general terms and conditions. Certificates are
still expensive in general; they require specially authorized hardware and are restricted to natural
persons.
Within the scope of the legal framework governing formal requirements the legal written form
(covered by signature and witnessed by a notary public) has been extended to include the electronic
form. This requires in addition the name and a qualified digital signature. Some EDI transactions in
the electricity industry represent declarations of intent in the framework of a bilateral
contract/agreement on electrical supply within the meaning of the so-called voluntary written form
(e. g. schedules) but unless a further intention is explicitly specified, transactions can be covered by
advanced digital signatures. It can thus be concluded that the exchange of a declaration of supply and a
declaration of acceptance, each with an (advanced) digital signature will suffice.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
13
In the general context, it has to be noted that electronic messages need to be handled now much more
carefully than in the past. According to previous reasoning, electronic messages did not represent
documents associated with business risks, but after the amendment of the German Civil Code the
electronic form can now legally replace the written form. Thus, electronic documents and traditional
business documents are equivalent. Nevertheless changing the information carrier does not change
anything in the objective to make business relationships legally transparent. This, then, also leads to
the necessity to provide information (at least in signed mails) equal to that required in business letters
and on letterheads.
At company level, digital signatures and encryption are not questioned as far as standard applications
(e-mail, remote LAN access, etc.) are concerned. At the application level, however, there were only
few reports about consistent implementation of „PKI-Enabling“. Indeed, a decision in this respect
should be taken on a case-by-case basis under economic aspects.
3.2.2
Principles concerning access to and verifiability of digital documents and consequences within
archiving processes
On 1 January 2002, formal requirements concerning financial documentation of business activities
were considerably eased. With the exception of the notes added to the balance sheet and the annual
report, a company’s accounting can theoretically now be realized in a paperless form since this date.
On the other hand, “immediate” (formerly “adequate”) access to the archived data relevant to taxation
and to their processing systems is now required by the tax authority for periodic tax examinations.
On the one hand, this gave rise to new rationalization potential in electronic data processing, and on
the other hand, to further requirements if this rationalization potential is to be utilized, for instance, by
the use of digital signatures. These requirements on verifiability and archiving have been laid down in
a widely discussed regulation of the Federal Ministry of Finance3 (described in a paper of the Federal
Ministry of Finance of 16 July 2001 - IV D 2 - S 0316 -136/01-).
However neither preliminary processes resulting from purchase, production and sales nor
supplementary processes like collective cost, clearing and final accounts/reporting proceedings are
affected, but audit requirements concern exclusively financial accounting with its active accounts. For
all documents that have to be preserved for a specific period, the principles of adequate and orderly
accounting shall apply, whereby the possibility of subsequent modifications through the accounting
system must be excluded from the beginning. The use of qualified digital signatures gives rise to new
requirements concerning procedures and procedure documentations attributable to the requirements of
the aforementioned regulations.
Accordingly, the relevant verification keys have also to be archived in the case of electronically signed
documents. Where cryptographic procedures are used, both the encrypted and the decrypted versions
as well as the keys utilized need to be archived. For conversions into data formats which are not in
current use, the two versions have to be archived together. Concerning documents that have to be
preserved for a specific period, a record has to be made of their entry, further processing and
archiving. This is all very complicated, but the history of information technology shows that this
challenge can be coped with. The transition from microfilming to optical archiving was a similar step.
As a consequence from the guidelines, large German companies decided already to make the ERP
system (e.g. SAP) NOT accessible to financial authorities. Therefore, a working group was founded by
the association of German SAP users aiming at defining a downstream SAP module with the working
title: DART (DART = DATA RETENTION TOOL) with a view to avoiding complete transparency of
internal cost center transactions. In this context, a compromise has to be sought between a decision
Principles concerning data access and verifiability of digital documents (German abbreviation: GDPdU –
„Grundsätze zum Datenzugriff und zur Prüfbarkeit digitaler Unterlagen“).
3
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
14
made by the tax court of the city of Münster on 28 August 2002 (“cost centers are relevant in terms of
audits”) and complete transparency of internal and international transactions.
DART provides a data extract with a high rate of compression (first figures: 1:25, meanwhile these
figures have been somewhat normalized by SAP). Irrespective of these activities, archiving
requirements have been increased with a view to paying attention to the requirements of GDPdU. The
elaboration of a code of practice for data extraction, preservation and reproduction becomes
indispensable to many companies. Goal is, on the one hand, to reduce the data (of finalized operations)
in operative systems and, on the other hand, to archive (electronic) records required for a complete
examination of facts.
Not least in this context, legal and auditing requirements determine the requirements to be met by the
technical and organizational framework for the use of digital signatures in companies.
Until 31 December 2001, there were only two types of documents for long-term archiving:


signed, paper documents
electronic documents
From 1 January 2002, GDPdU additionally prescribes archiving of


signed electronic documents
key generation & archiving in conjunction with signature validation mechanisms.
For manual signatures, the identity and legitimacy of the signer has to be ensured in an audit-proof
manner through signature regulation. The same applies now to digital signatures. It has become
general practice for this purpose to use the “PKI Policy” or the “Certification Practice Statement”
documents. It has to be emphasized that not the digital signature but the new legally admitted
possibilities of handling digital signatures, and market pressure compel each company to deal with this
subject-matter. The signature only serves to provide security for legal documents or accounting
vouchers in their respective form.
3.2.3
Consequences from the Act amending taxation on company turnover
The term “invoice” is defined in German legal terms (this definition is of particular economic
importance to input tax deduction) as follows: “An invoice is any legal document through which an
entrepreneur or a third party acting on his behalf accounts for a delivery or any other service to the
account of the recipient of the performance”. In terms of turnover tax, invoice and credit note are to be
handled virtually equally4.
A second sentence was added to this paragraph which became effective on 1 January 2002: “An
invoice is also a statement of account bearing a digital signature in accordance with the Digital
Signature Act of 22 July 1997 (German Civil Code - BGBl. I 1879, 1872), as amended”.
Pressure from industry made the financial committee of the German Bundestag discuss relaxations
even before entry into force of the turnover tax amendment law. At European level, too, it was
recognized that electronic business must not be excessively burdened. Therefore, the 6th ValueAdded-Tax Directive (77/388/EEC) was amended through Directive 2001/4/EC by a decision of the
Ministers of Finance on 4 December 2001. The Directive was formally adopted by the member states
and published on 17 January 2002.
Though digital signatures (contrary to electronic invoices) are no longer explicitly mentioned in the
EU Directive, an important aspect of this amendment is that it maintains strict security requirements,
4
Turnover Tax Law (German abbreviation: UStG – Umsatzsteuergesetz; section 14, paragraphs 4 and 5).
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
15
which are imperative for standardized EDI transactions. This legal development shows, on the one
hand, that free electronic business should be promoted; but on the other hand, digital signatures are
used primarily in Germany as a means to curb value-added-tax evasion totalling an estimated amount
of more than 10 billion € (with a high number of undisclosed cases). After implementation into
German legislation on 1 January 2004, advanced digital signatures are sufficient in the case of EDI
invoices eligible for input tax deduction without accompanying paper documents. In any case,
1. adequate procedures are required for security integrity and authenticity;
2. accompanying paper documents (turnover tax unit billing) can be required where digital signatures
are missing.
Hence, only the use of digital signatures enable invoices and other message formats to be exchanged
in a paperless manner by the energy industry.
4 TECHNICAL STANDARDIZATION
4.1
Digital signatures and EDIFACT
4.1.1
Progress of decision–making by the EDIFACT standardization bodies
At the project meeting of NBü-AA3 on 31 July 2001 at DIN in Berlin, the “Digital Signature Working
Group 3.5” was founded (see NBü-AA3 No 85-2001). This Working Group was charged to set up one
or several guides on the EDIFACT message AUTACK “security, authentication and confirmation
message”. The basis for this work is the matrix established in June 2001 (see NBü-AA3 No 53-2001),
finalized in the version 7/2002.
4.1.2
Discussed alternatives for implementation into EDIFACT
designation
Alternative 1
Two-Interchanges approach
characteristics
user data + AUTACK in
separate transmission files
user data: syntax V1-V2-V3V4
AUTACK: syntax V4
benefits
Syntax version neutral (user
data)
hardly any changes of actual
situation required (only
additional AUTACK)
clear-cut separation between
user data and signatures
drawbacks
organizational expenditure to
the recipient for uniting,
checking, waiting (for other
file)
archiving difficult
ebIX
Alternative 2
One-Interchange V3/V4
approach
framework: syntax V4
user data: syntax V4 used in a
downwards compatible
manner (in fact syntax V3)
AUTACK integrated (syntax
V4)
user data: syntax version
neutral
user data framework:
minimal syntax V4 (only 8digit date)
hardly any changes of actual
situation required (appended
AUTACK)
clear-cut separation between
user data and signature
simple archiving
Alternative 3
Integrated Syntax V4
approach
user data: syntax V4
embedded security
segments of syntax V4 are
utilized (header-/trailer
concept)
no utilization of AUTACK
simple archiving
dates and signatures
readable/processable in a
data current
only feasible with syntax
V4
complex processing at the
recipient
May 16, 2006
Use of encryption and digital signatures in the European energy sector
16
Meanwhile, an option was made on variants 1 and 2 (alternatively One-Interchange approach or TwoInterchange approach with syntax downward compatibility). This option was essentially refined during
the session of DIN NBü 3.5 of 8/9 January 2002 to be adopted in 7/2002. The draft standard consisting
of 2 parts has been available to the public for comments since as early as February 2002 under DIN
16560-15 and DIN 16560-16.
In parallel with the AUTACK message type which governs digital signatures in EDIFACT by means
of asymmetrical cryptography, attention was paid to the requirement of practicable key management
for secure transmission of public keys. The KEYMAN service message type needed for this purpose
was embedded in the framework of AUTACK application rules because key management can only be
practised if it is safeguarded through integrity and authenticity information. It has thus to be treated
like reference data, secured by AUTACK
4.2
Digital signatures and XML
Mainly as a result of the advance of e-business (defined here as electronic business processes going
beyond company borderlines) the XML data format standard has developed during the past few years
into a widely-spread, de-facto standard. XML is a standard that is intentionally simple in technical
terms (Syntax). Nevertheless, standardization needs to be pursued because branch-specific exchange
formats must be built up (semantics).
According to the PKCS#7 standard of the RSA Company, XML documents can also be signed
electronically. However, this “PKCS#7 container” has certain drawbacks which contravene the
benefits of XML. This applies generally to EDI immanent procedures as opposed to PKCS#7 which
allow more favourable support processes in economic terms. Therefore, at the beginning of 2001 the
draft RFC 3075 (XML signature syntax and processing) was adopted in the XML world (XML-DSig);
it does not exhibit the aforementioned drawbacks and eliminates in addition the deficits of the
PKCS#7 signature (e.g. possibility to sign parts of a document). Since early February 2002, and hence
after a remarkably short period, it has also become a proposed standard of IETF.
XML encryption is also a subject-matter of intensive standardization activities. However, stable
standards have backlog of about 1 year as compared to XML-DSig. XML signatures are available in 3
different variants that can be combined with each other:



enveloped signatures
enveloping signatures
detached signatures
At the generic level, the following can be said about these terms:
- Enveloped signatures
Require dedicated application or document design. Hence, they are 'only' suited to data objects to be
generated in future.
- Enveloping signatures
Particularly suited to messaging services or services allowing for one-time validation. Can 'wrap'
existing data objects; thus, they can be relevant to migration scenarios. Consequently, it is suited to
already existing data objects, which are however transformed.
- Detached signatures
Particularly suited to security add-ons to existing data objects which cannot or should not be modified
(or wrapped); example: authenticated SW distribution.
Within the existing context of branch requirements, types 1 and 3 are particularly interesting. Type 1
can make use of new features of XML signatures, like the signature over parts of the message where
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
17
for instance no legal responsibility is to be assumed for part of the message to be forwarded, which is
thus not to be signed (again). However, type 1 revolves in a pure XML-imminent environment which
still needs to be established in terms of applications. Type 3 may become interesting when data and
signature can or must be separated. Unchangeable data like metered values can be forwarded together
with a clearly defined link to the signature (Unified Resource Identifier, URI).
Easy readability of XML documents is not affected by the XML-DSig signature standard, and is
beneficial e.g. in full text retrieval. The introduction of XML and XML-DSig is in particular
reasonable if different distribution channels (e.g. Web and WAP) support different formats
(“Stylesheets”) in a business transaction. Though pure XML implementations have existed sparsely to
date in established EDI structures, the majority of analysts believe that this is the technology of the
future. Therefore, new implementations should be based on a strategic decision on whether XML can
be used as EDI format.
4.3
Digital signature and e-mail
The S/MIME format can be considered today as an accepted standard worldwide. Other standards for
securing e-mail like PEM and PGP are declining in importance. However, one should be aware of
certain restrictions. With S/MIME the signer is identical with the sender. Therefore, S/MIME does not
support multiple signatures as they are for instance required in business letters or in other ranges of
application with multiple responsibilities. And with S/MIME, the text and attachments are packed up
in a “sealed” container. Archiving and retrieval incl. full text search is thus more time-consuming than
signature and encryption at data level.
In Germany, implementations based on the S/MIME standard were subjected to a large-scale
interoperability and practice test within the scope of the SPHINX project. To prepare the wide-spread
introduction of these safety measures, the German Federal Administration, the coordination and
advisory bureau of the Federal Ministry of the Interior in cooperation with the Federal Office for
Security in Information Technology, carried out the SPHINX pilot test on “end-to-end-security for
electronic document exchange”. The pilot test consisted of several phases. Phase 1 started on 1 April
1998 and was terminated on 30 September 1998. Phase 2 started on 1 October 1998 and continued
SPHINX until 1 March 1999. The following objectives were pursued by SPHINX:



testing of functionality and interoperability of security solutions of different providers,
gaining experience in terms of user acceptance and
assessment of the personal, financial and organizational expenditure to the authorities concerned.
The German Bundestag, numerous German Federal Ministries and authoritative institutions of the
German Länder and different companies have participated in SPHINX. More than 30 organizations
were represented. PCs of approx. 400 participants in the pilot test were equipped with software which
enables messages to be encrypted and decrypted, and digital signatures to be signed and verified. Part
of the users applied chip cards where the private (secrete) key was stored. These workstations were
additionally equipped with a chip card reader. The hardware and software used were produced by
eight different firms. These technology providers all passed the relevant interoperability tests:
The interoperability criteria obtained through this type of practical test for encrypted and signed emails should also serve as an example for e-mail exchange between industry participants.
4.4
4.4.1
Interoperability of digital signatures
ISIS-MTT standard
Compatibility or interoperability between providers of qualified certificates does not yet exist per se.
This applies as well even to accredited providers of certification services according to the German
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
18
Digital Signature Act. Two committee standards and a proposal of the German Federal Ministry for
Security in Information Technology (BSI) are available which are overlapping to a large extent.



MTT (MailTrusT V 2.1) of TeleTrust e.V. from the SPHINX project.
ISIS interoperability standard of the T7 Trustcenter working group of (Industrial Signature
Interoperability Specification V.1.1), and
SigI, a specifiation proposal of BSI
The Trustcenter association T7 has meanwhile agreed with TeleTrusT on a common standard (ISISMTT). However, full interoperability has not quite been achieved. The project is actively supported by
the “Fraunhoferinstitut für Sichere Telekooperation” and promoted by the German Federal Ministry of
Finance.
The reason for the specification of ISIS-MTT is the large variety of possible interpretations of a
certificate that needs to be evaluated in terms of data processing according to the X.509 standard
(Version 3). Therefore, a practicable development basis must be provided to trust centers and clientsoftware producers. Simultaneously, a text suitable for tendering procedures must be available to
professional users. A label/quality mark is being developed with a view to increasing product
acceptance.
4.5
Validation of digital signatures across association boundaries
The validation of the signature’s authenticity and the data’s integrity by the mechanisms of digital
signature through the signer’s public key and the comparison of hash values is of decisive importance
to the complete scenario and needs to be manageable in technical and organizational terms for further
e-mail applications. The validation of signatures is a requirement concerning interoperability; but its
practicability is of decisive importance for success in practice. Therefore, in Germany, the Digital
Signature Act and the underlying DIN-standard define a relatively simple hierarchical structure which
comprises of only two stages. And here is why:
Unconditional confidence must be placed in the Root Certification Authority which rests with the
appropriate regulatory authority as far as qualified signatures with provider accreditation are
concerned. Its private key undersigns the public keys of accredited certification service providers
(“trust centers”).
With their private keys, the latter undersign the public keys of the signature key holders after proper
registration of the user and after unequivocal identification by means of personal documents (e.g.
identity card/passport) and make these certificates available to the public; thus, they guarantee the
correctness as defined by the liability provisions of the Digital Signature directives. Validation means
the prompt verification of this certification chain with regard to unrestricted consistency. There is
therefore no doubt that this strictly hierarchical validation chain of only two stages offers certain
advantages.
However, these certificates are today (still) expensive and bound to natural persons. Qualified
certificates do not comply with the requirements on server certificates for client/server authentication,
encryption certificates with their requirements on recovery mechanisms, certificates for crypto
hardware, certificates for legal persons, certificates needed for meters, etc. Advanced certificates
which can be generated, for instance, in companies’ PKIs are recommended for these purposes. These
signatures are often referred to as not complying with the Digital Signature Act, which is not quite
correct. These signatures were also defined in the Digital Signature Act, but they were not put on a
level with manual signatures.
If advanced signatures are also used by market participants (which is advisable), it is necessary to
organize the „confidential relationships“ that can be automatically validated among business partners.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
19
A cross certification must be provided for the extreme case that every employee/operation participant
be able to trust every employee/operation participant of the corresponding partner company.
In case of lower requirements, it is possible to safely exchange only root certificates of partner
companies, and to operate “black lists” (certificate revocation lists, CRLs). In this case, the validation
path is extended with the corresponding organizational and technical consequences. Moreover, this
procedure needs to be moderated at the introduction stage, and administered in operation through a
neutral trustworthy third party, or associated with undisputed criteria which have to be strictly
observed by parties participating in the procedure.
The latter procedure is a reasonable alternative with good chances of success in the energy sector
because regulation needs which have been required to date could be adequately agreed. Nevertheless,
prior to the commencement of operation, liability issues should be settled and determined in political
terms within the scope of sectoral agreement.
Depending on individual applications, a combination of advanced and qualified signatures will
therefore exist in practice, which are validated on a consolidated data base (directory) by means of a
standardized protocol (i.e. LDAP). External directory information is timely received from the partners
in the case of advanced signatures, or from certification service providers in the case of qualified
signatures (accredited “trust center”).
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
20
5 PRACTICAL APPLICATIONS
5.1
General requirements on the use of digital signatures
The use of digital signatures in the energy industry has far-reaching long-term effects of a technical
and mainly organizational nature.
The signature for metered data would be at the beginning of a series of sequences. It is economically
reasonable to invest early in technologies with short key lengths. To this end, it may be advisable in
future to use algorithms operating with the mathematics of elliptic curves. Even though public key
infrastructures using common RSA algorithms with more than sixfold key length emerge today within
associations, the compatibility of procedures must be ensured in the field of metrology and with regard
to EDI market interfaces and internal procedures.
5.2
Approach in EDIFACT Invoices (EDIFACT-immanent signature)
To be able to generate a digital signature after invoicing for presentation to the local tax office for
input tax deduction, the following organizational structure may be used as a basis:









Individual invoices and the collective invoice list are generated in the ERP or accounting system
and released for transmission to the EDI partner5.
These released basic files (individual invoices and collective invoice list) are transferred to the
EDI system.
The EDI system is equipped with a security module (to be defined in a later document).
The security module checks the basic file and generates a hash value of the basic file.
The hash value is signed with the private key of the sender (releaser)6.
The signed hash value is generated into an AUTACK message type.
This AUTACK is attached to the original basic file
(INVOIC01+INVOIC02+INVOIC03+…..+INVOICn).
This gives rise to an EDIFACT transmission file with the following content:
(INVOIC01+INVOIC02+INVOIC03+…..+INVOICn) + AUTACK
The contents of the AUTACK thus generated can be described for instance in a guide which is an
integral part of the PKI policy or which the policy is referring to.
Remarks on the legal security of this solution:
An audit for tax reasons or other grounds represents an audit of facts. There are no formal
requirements upon the invoice format but only on signatures (qualified digital signatures, current
status in Germany with voluntary provider accreditation) due to the new legal situation. The EU VAT
Directive of 17 January 2002 set an additional legal framework. Its implementation into national
legislation is instrumental.
“Released” means an organizational step which needs to be set up in addition or which may result
from the activation of automatic billing.
6
In this respect, the future legal situation will be of decisive importance. If signatures are applied that
comply with the Digital Signature Act and are bound to the natural person, release will have to be
explicitly established; alternatively, higher automation levels and assignment of the operation to the
legal person may be possible. First experience gained with financial authorities show that a pragmatic
approach is by all means possible. In any event, the decisive criterion is the overall context in which
business transactions need to be inversely and progressively auditable. The progressive audit extends
from bookkeeping record over the basic records to accounts and finally to the profit and loss account
or self-assessment / tax return, respectively. The inverse audit is carried out vice versa.
5
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
21
So, the current legal situation permits the interpretation that individual invoices have to be signed
electronically. Although this will probably not be necessary – even if the requirement for qualified
digital signatures with provider accreditation and thus for full compatibility with the Digital Signature
Act and natural person as signer – is maintained.
Non-EDIFACT-immanent signatures are conceivable and unproblematic in legal and technical terms.
They should be applied where files are signed (so-called PKCS#7 signatures). For signatures on the
basis of EDIFACT, it is expedient to use the AUTACK message type. It saves an additional step of
processing.
5.3
Time stamp service
Some pecuniary or mandatory processes in business transactions between market participants are tied
to specific times and may thus require urgent treatment. An example in this context is schedules.
Therefore, it may be reasonable to receive confirmation of the time of a data transaction.
An accredited time stamp service is based on the principle that it provides data (including signed data)
with the legally valid time and signs them together with its private key (accredited by the appropriate
regulatory authority). Subsequently, the data treated in this way are returned to the original sender.
The rules in Germany for the time stamp service are laid down for example in Section 9 of the
Signature Act; here, the time stamp on the hash value is sufficient.
Though data generated thus is time limited in the past, the further transmission of data to the recipient
is not recorded, i.e. that the time stamp service is not suited as sender evidence. Sender evidence is
furnished only through forwarding of data by the certification office, i.e. the time stamp service. This
is however not a mandate determined by law; respective rules have to be defined in individual
business transactions. Hence, the time stamp is not like a mail stamp on a letter handed over at the post
office counter. The sender gets the stamped “letter” back for forwarding it to the receiver!
A possible organizational solution is to have a time stamp put on the recipient’s automated receipt.
This is recommended e.g. in the e-government manual of the BSI (German Federal Office for IT
Security) for time-critical operations carried out within the German Federal Administration.
Absolute security is thus only given where the stamped delivery, analogous to a mail stamp, is
accepted by a trustworthy third party. One solution on offer adds the previously time-stamped hash
value in a given form to the document (e.g. invoice). To this end, the sender needs generating software
(“write version”); the recipient is able to download a “read version” free of charge from the Internet
and thus validate the time stamp.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
22
6 IMPLEMENTATION AND BEST PRACTICE RECOMMENDATIONS
Realization of security in the energy industry’s electronic legal relationships and business
transactions
6.1
No market participant can be compelled to apply digital signatures and encryption unless it is bound
by law to do so, for instance in the case of electronic invoice transmission where an application was
made for eligibility for input tax deduction.
On the basis of a bilateral, multilateral or, ideally, sector-wide agreement, criteria should be
determined in particular for signed electronic data exchange. Where these criteria are fulfilled by the
concrete communication partner, market participants should undertake, also on the basis of a sectoral
agreement, to use digital signatures and encryption, where necessary. However, also outside the
statutory legal framework of qualified digital signatures with provider accreditation (according to the
relevant legislation), this must lead to security of non-repudiation for all market participants receiving
an (advanced) electronically signed transaction from another market participant.
Most of the criteria for qualified signatures are defined by law. The following main criteria apply to
advanced signatures (e.g. mutual acceptance of company PKI certificates):


uniform security level of participants, as a matter of principle,
easy public key accessibility also for advanced signatures, i.e. publication of a subset of directory
information (generally on the Internet) for other market participants.
The technical and above all the organizational security level should be defined by baseline IT Security
specification, unless of course higher criteria are applicable. Current signature rules applied in
different companies to comply with audit requirements, particularly in business transactions with other
market participants, need to be introduced in technical and organizational terms into a PKI policy or a
Certification Practice Statement as far as digital signatures are concerned. The observance of the
security level provides the basis for a confidence model like the Public Key Infrastructure used across
company boundaries.
Information-bound, certificate-based encryption and simple validation of electronically signed data in
terms of the sender authenticity and the data integrity assume that the public keys of communication
partners, certified to be correct, are easily accessible and reliable with regard to their current validity.
This guarantee is given for “qualified” certificates, i.e. for key material that was certified by an
accredited certification service provider
In the case of advanced signatures which, for instance, were certified in the framework of a company
PKI, a publication or, where necessary, a prompt revocation of the public key must be ensured if the
owner of the signature key participates in the market. Simple signatures, such as scanned signatures,
have no importance.
Vice versa, market participants accepting electronically signed messages from other market
participants should undertake to



accept digital signatures and sender identifications of their communication partners for verification
of legal liability, integrity and authenticity, to the extent that they guarantee sufficient security in
terms of the application (the “acceptance criterion”),
if the document transmitted corresponds to the adopted market interfaces, e.g. EDIFACT, XML,
etc. (the “document compatibility criterion”);
to make their certificates available with public keys for encryption or for validation of signatures
(the “publication criterion”);
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector

23
to encrypt the data of their communication partners in online transactions and to provide them as
agreed with an advanced or qualified signature (the “criterion of voluntary commitment”).
All EDI message components needed for electronic invoicing, and all declarations of intent with the
character of a legal document require a qualified signature with provider accreditation.
Other EDI types of messages between market participants must be signed at least with one advanced
signature (example legal framework: General Standard Terms and Conditions, or Association’s
agreement), but they can also bear a qualified signature (example legal framework: German Digital
Signature Act).
Informal valuable or binding declarations of intent, sent e.g. by e-mail, are signed and, where
necessary, encrypted depending on the degree of confidentiality.
Market players participating in the process shall ensure that they use in their function as
communication partners an appropriate verification software for verifying liability on the basis of the
two legal frameworks mentioned above, as well as the integrity of the message and the authenticity of
the sender.
6.2
General process for setting up public key infrastructures
Before discussing development steps, MAKE or BUY or even technical questions, it is advisable to
answer some basic questions concerning functions and applications for which certificate-based process
steps are necessary or rational. Applications should be segmented before determining the number of
users within these segments. In most cases, a first and simple step is e-mail encryption and signature
for selected workstations. More interesting in economic terms, however, are commercial applications
for which certificate-based mechanisms may be practical.
6.2.1
Possible process for the definition of business transactions/applications for which certificates
are to be used
Examples:
 Business transactions/applications are e.g. the generation of electronic invoices in the context of
Electronic Data Interchange, e.g. between members of VDEW
 other electronic declarations of intent with the character of a legal document (documents which
may substantiate long-term claims)
 transferring signature rules in the e-procurement context (EDI-based, e.g. schedule, or Web-based,
e.g. order for materials)
 transferring rules in the context of internal business processes which are to be authenticated on the
basis of certificates (e.g. SAP HR, Human Resources)
 Secure mobile workstation (e.g. remote LAN access)
 encryption of files
 etc.
Apart from legal requirements (concerning e.g. billing/electronic invoice), the possible litigation level
or other risk management considerations should be of particular importance. Subsequently, certificate
categories should be assigned to business transactions/applications (possibly with quantification). To
this end, the question has to be asked where advanced signatures are sufficient and where qualified
certificates (with provider accreditation) should or must be utilized.
The external PKI service provider as standard for the PKI should be selected analogously to other
outsourcing or out-tasking projects in the service sector, i.e. according to performance and service
level agreement.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
24
Creation of a decision matrix for the assessment of tenders submitted by certification service providers
is also useful here because some of the providers accredited today apply different philosophies with
regard to corporate clients. This matrix facilitates assessment and documentation for the selection and
recommendation of a service partner.
6.2.2
Registration process
The registration process ensures an unambiguous association between certificate and staff
member/user; thus, it substantially determines the PKI’s security level. The registration processes
related to the certificate category and the processes associated with certificate management should be
standardized internally unless they were determined by the external PKI service provider.
Therefore, the start-up phase and the operational phase should be determined clearly in advance in the
registration process, and implemented in accordance with audit requirements. For this reason, this
process is usually connected to the issuance of a new employee identity card. A multifunctional
identity card with contact chip or additionally with a non-contacting chip can address, apart from the
key material’s certification, a large variety of other functions, such as computer access, admittance to
buildings, payment in canteens, etc.
As far as qualified certificates are concerned, detailed specifications are usually determined by the
certification service provider. However, these specifications must always be synchronized with
internal mechanisms, e.g. for identity and access management, and in particular with the following
mechanisms:
 Conceptual design of the registration process for certificates which do not conform to the Digital
Signature legislation.
 initial issue (new certificate/SmartCard, collective request), follow-up issue (new keys, previous
SmartCard), issuance of replacement certificate/SmartCard (compressed), issuance of replacement
certificate/SmartCard (not compressed), return of replacement certificate /SmartCard, withdrawal
of certificate/SmartCard when leaving the company, blocking of certificate/SmartCard, description
of the recertification process after expiry of certificates (User)
The following proceduer is recommended with a view to successfully implementing standards for the
introduction and utilization of the basic PKI:



Selection of firm partners for the introduction and operation of the basic PKI and of certificatebased applications (preferred partner / products).
Definition of the internal ordering process for PKI services/products (definition of packages,
where possible). Definition of the functions of certificate purchase to limit “product variety”.
If certificates are frequently used for communication with external business partners (e.g. through
EDI) it is necessary to grant these firms access to the corporate directory or to make a subset of the
corporate directory available in a repository (cf. above). To this end, a new definition of firewall
rules may be required for access of partner firms to certificates in the corporate directory.
ebIX
May 16, 2006
Use of encryption and digital signatures in the European energy sector
25
7 OUTLOOK
Information technology and thus, in legal terms, the electronic form of almost all documents will
certainly extend in a growing number of areas of public life and business. This will also lead to an
increase in importance of digital signatures, whether advanced in the legal framework of a closed user
group, or qualified in the legal framework of a national signature law. This is the only way to ensure
verifiability/non-deniability and integrity of electronic information in legal terms and hence in a noncontestable manner.
Written signatures will have to be abandoned in any area where a change of media would impede
further rationalization.
Furthermore, more open networks (e.g. through wireless technology) will increasingly require
encryption at the information level, i.e. of the document itself. At the network level, re-encryption is
required, for physical reasons, prior to every change of the transmission medium. End-to-end security
exists only at the information level.
The authentication process in applications will be based to an increasing extent on certificates and less
on passwords.
For intelligent appliances and applications, digital signature will be the modern “seal” in data
transmission: it will secure data integrity irrespective of the transmission path.
The relevant technology is available now at reasonable costs. Certification service providers offer
keys, reader hardware and software plug-ins for standard mail systems at relatively low entry-level
cost so that small companies can also afford them. Manufacturers of EDI systems already have
solutions available, and are working on their harmonization with the new legal possibilities and the
requirements of data access and storage (cf. chapter 3.2.2).
Much more important than technology is the acceptance and the correct handling of the change of
paradigm associated with the digital signature as an alternative to the written signature. This is the
actual challenge that has to be coped with in order to consistently utilize the possibilities of the
electronic form, including digital signatures, for corporate development. Electronic business within the
energy industry and with its partners constitutes a practical entry-level in this respect.
ebIX
May 16, 2006
Download