Recommendations for the implementation of encryption and digital signatures in the European energy sector Recommendations to market participants Status: Version/release: Revision: Date: ebIX Request for comments 0.3 none February 15, 2016 May 16, 2006 Use of encryption and digital signatures in the European energy sector 2 CONTENTS 0 MANAGEMENT SUMMARY .................................................................................................... 3 0.1 0.2 1 BACKGROUND ......................................................................................................................... 3 KEY RECOMMENDATIONS ........................................................................................................ 4 INTRODUCTION ......................................................................................................................... 5 1.1 1.2 1.3 1.4 1.5 2 ABOUT THIS DOCUMENT .......................................................................................................... 5 SCOPE OF PROJECT ................................................................................................................... 5 PARTICIPANTS IN THE PROJECT ............................................................................................... 5 REFERENCES ............................................................................................................................ 6 CHANGE LOG ........................................................................................................................... 6 BACKGROUND............................................................................................................................ 7 2.1 2.2 2.3 2.4 3 SECURITY OBJECTIVES............................................................................................................. 7 AIM OF THE DOCUMENT........................................................................................................... 8 ADDITIONAL REQUIREMENTS UPON BACK-UP PROCESSES ...................................................... 8 KEY STATEMENTS ON RECOMMENDATIONS FOR IMPLEMENTATION ..................................... 10 RECOMMENDATIONS FOR SHORT-TERM IMPLEMENTATION ............................... 11 3.1 3.2 3.3 3.4 3.5 3.6 REMARKS ON E-MAILING AND RECEIPTS ............................................................................... 11 CERTIFICATES ........................................................................................................................ 12 “VIRTUAL POST OFFICE” KEY INFRASTRUCTURE .................................................................. 13 EDI SERVER ........................................................................................................................... 13 REQUIREMENTS REGARDING ELECTRONIC INVOICING .......................................................... 14 APPLICATION IN BUSINESS PROCESSES CONCERNING METERED VALUES, MASTER DATA, SCHEDULES ........................................................................................................................................ 16 3.7 ADDITIONAL ASPECTS OF THE SYSTEM ACCESS INVOICING BUSINESS PROCESS ................... 16 3.8 PUBLICATION OF CERTIFICATES AND REVOCATION INFORMATION ....................................... 17 4 MEDIUM-TERM RECOMMENDATIONS ............................................................................ 18 4.1 LEGAL AND TECHNICAL DIFFERENTIATIONS REGARDING ELECTRONIC SIGNATURES ........... 18 4.2 END-TO-END-SECURITY ........................................................................................................ 18 4.3 DIGITAL SIGNATURE IN E-MAILS ........................................................................................... 19 4.4 ELECTRONIC SIGNATURE OF DOCUMENTS ............................................................................. 20 4.4.1 Utilization scenarios and file formats ........................................................................... 20 4.4.2 PDF format.................................................................................................................... 20 4.4.3 MS-Office formats ......................................................................................................... 21 4.5 ASPECTS OF LONG-TERM ARCHIVING OF ELECTRONICALLY SIGNED DOCUMENTS ............... 22 4.6 WEB-SIGNING ........................................................................................................................ 23 4.7 PROJECT CONTEXT FOR THE INTRODUCTION OF THE RECOMMENDED MEASURES ................ 23 4.8 UTILIZATION IN MICROSOFT ENVIRONMENTS ....................................................................... 24 ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 3 0 MANAGEMENT SUMMARY This document is the second in a series of publications from the ebIX project “DigSig” regarding the use of encryption and digital signatures within the European energy sector. Being defined in a general manner, the organizational parts aim at ensuring a uniform organizational security level with regard to electronic signature and encryption of transactions between market participants across company boundaries. The technical parts of the documents, defined as well in a general manner, are to ensure interoperability at a technical level even where different products or services are utilized. The political, organizational and technical statements represent recommendations which are to enable a reliable trustworthy infrastructure to be set up among market participants along the lines of solidarity. These measures shall serve as a guide for implementation within companies and for subsequent application at market interfaces. However, procedures other than proposed in the recommendations need to be justifiable and must not impair the general level of security. For economic reasons, market participants should be interested in making sure that the infrastructure of confidence is not undermined. This is the only way to guarantee secure handling of electronic business in the medium term, and to ensure that further automation steps can be managed in the light of future developments. 0.1 Background The energy branch as a whole is facing this next important automation step that should be implemented multilaterally, whenever possible. Pioneer work is not required to this end; other branches like the automobile industry have shown that automation can be realized at a reasonable expenditure. The liberalized energy market has created new challenges in terms of logistics, in particular with regard to mutual billing. Rapidly organizing electronic handling of this process will generate large synergies for all market participants. According to a study of the EU Commission, companies can rely on cost savings of up to 72 % through pure electronic invoicing with digital signature. In legal terms, electronic invoicing without accompanying paper documents has, for example, been possible in Germany since 1 January 2002; when verified with a so-called qualified digital signature, the electronic transaction is recognized as a voucher for income tax deduction. Thus, the ground has been prepared for exploiting a considerable rationalization potential. As a result of the development of markets, on the one hand, and of the possibilities of information technology, on the other hand, market participants agree that secure electronic transmission of additional market data (such as metered values, schedules and customer data) is important. A modern, secure Business Partner Network needs to be established which organizes Electronic Data Interchange (EDI) between market participants, and which ensures conformity with the law, interoperability, efficiency and liability. This system, if it is to be successful, must be based on mutual confidence and uniform rules and procedures in terms of IT security which also guarantee minimum complexity and thus maximum economic efficiency. This can be achieved through the use of digital signatures and encryption in communication processes. The necessary contractual elements can be laid down in interchange agreements governing electronic business transactions. The necessary technology has been available in the market for a long time and quick access is possible by means of secured e-mail technology. In order to define equal security criteria within the area of confidence going across association boundaries, and to optimally support ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 4 companies with regard to implementation, it is advisable in economic terms to define a common security policy (PKI-Policy – Public Key Infrastructure Policy) at market interfaces. 0.2 Key recommendations The Implementation Recommendations distinguish between short-term and medium-term recommendations. The recommendations concern security at the content level only (e. g. email encryption, electronic document signatures etc.). Securing the transport level (e. g. VPN, SSL encryption etc.) is not the subject of this document. In all events, a Public Key procedure is recommended for cost-benefit reasons to ensure key management at a reasonable cost. On a short-term basis, the route between two market participants (or further partners) should be secured. The term “virtual post office” has become established in this context although this principle is not limited to the exchange of emails. The security level achieved this way is called “site-to-site security”. The benefit of a “virtual post office” is that no cryptographic infrastructure or content security infrastructure is required at the individual workplace. Commercial products permit the use of company keys, and provide consistent transparency of encryptions and electronic signatures for the end user. Major applications include the exchange of metering data, bills, master data and generation schedules. This short-term measure should be implemented by all market participants to guarantee secure electronic data exchange between corporate partners, and to conform to data protection requirements. Further functionalities may additionally be made available at selected, eligible workplaces in the medium term. Rather than bilateral communication between market participants, ordering applications (e-procurement) or electronic management of permission procedures with authorities (e-government) will here be key drivers. This security level is characterised by the term “end-to-end security”. Cryptographic infrastructures (e. g. chip card/chip card readers) and/or content-security measures (e. g. virus scanners) at the workplace are prerequisites. Where invoices are dispatched without accompanying hard-copy documentation and the legislator demands a qualified electronic signature as a condition for the right to deduct input tax, the “Principles of access to data and the audit ability of digital documents” define, from a tax law perspective, the requirements for archiving relevant in a tax investigation. Together with financial data and appropriate sorting data (e. g. invoice number), an audit trail must be given for cryptographic key material. The auxiliary process of archiving is therefore of special importance in these Implementation Recommendations. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 5 1 INTRODUCTION 1.1 About this document Within the European energy sector, electronic data interchange (EDI) using a variety of methods has become a core business enabler over the last few years. It is no longer possible to imagine how liberalised energy markets would function without EDI; rapid and automatic interchange and processing of business transactions, as far as possible without human intervention, is organisationally and economically necessary for all participants at all levels. Whether the transactions contain metering data, invoices, customer switching information or schedules: automation brings benefits through process optimisation. Nevertheless, there are further, fundamental considerations – political, organisational and technical – to bear in mind, which influence implementation. Core processes with a high-volume character require supporting processes within the organisation. Securing EDI transactions is one such supporting process, especially in connection with transparency and integrity of the data involved. Just as a signature gives a piece of paper legal character – e. g. from an offer to a contract – EDI requires the same legal status for security and non-repudiation. To this end, it is essential that a secure business partner network be established, within which electronic business transactions for all participants are made possible. Therefore we need to promote an infrastructure which can be trusted both by larger corporations (with their own certification authorities) and smaller companies (who buy-in from service providers). This can only be guaranteed by verification and confidentiality mechanisms directly associated with the information exchanged. These mechanisms need to cover the whole range of the logical transactions consistently. This is necessary to be able to carry out transactions in the new deregulated market between market participants in a legally correct and clear-cut manner in terms of liability law, and not least in an inexpensive way under technical and organisational aspects. This document makes both short and medium-term recommendations for the implementation of digital signature and encryption at the information level within communication processes between market participants via Electronic Data Interchange (EDIFACT or XML). These recommendations are largely on an organizational level, further documents will detail the technical aspects of implementation. 1.2 Scope of project In the light of these requirements, a small project (“DigSig”) was established within the ebIX structure to generate appropriate documentation which can then be used as a basis for implementation scenarios on a national and/or international level. The intention is to describe the overall harmonisation requirements for the use of encryption and digital signatures for electronic transactions within the European energy sector; also being compatible with the following overall ebIX objectives: 1) Make recommendations of common procedures that facilitate the common open European energy market 2) Make common standards for secure data interchange that can automate the process to reduce the costs for the parties involved. 1.3 Participants in the project The project is based on documents produced within the German national group (under the able tutoring of Dr. Willi Kafitz, Siemens AG, Frankfurt) and has been coordinated for ebIX by Carl W. Major. The following participants provided intellectual and/or financial support to the project: ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector Country DE DE DK BE SE NL FI NO NO SE SE CH 1.4 Name Carl W. Major Dr. Konstantin Staschus Erik Hartwell Hugo Dekeyser Joachim Abrahmsén Lodewijk ter Haar Matti Vasara Per M. Breistein Ole Jacob Høyland Oscar Ludwigs Robert Lundin Rudolf Baumann 6 Company E.ON Netz VDN Energinet.dk Eandis Steria Tennet Fingrid Statkraft Statnett Svenska Kraftnät Steria ETRANS References [1] Original project proposal, see http://www.ebix.org/ 1.5 Ver. 0 0 0 0 0 ebIX Change log Rel. 1 1 1 2 3 Rev. none A B none none Date 2005-12-06 2005-12-07 2005-12-13 2006-02-28 2006-05-16 Changes Document generated Corrections and restructure Further textual corrections Comments incorporated Publication as ebIX RFC May 16, 2006 Use of encryption and digital signatures in the European energy sector 7 2 BACKGROUND 2.1 Security objectives The work of the project “DigSig” is intended to gradually provide security to the branch’s business transactions. Accordingly, security requirements for business-to-business data interchange between market participants are a subject-matter of this recommendation. The authors consider that there are strong tendencies which, for security reasons, call for a response. The main tendencies emerging are increasing number of transactions more open transaction paths As a result of the increasing number of transactions, all systems (safety features and equipment included) need to be automated to keep them controllable. This is done best within the company concerned. More open transaction paths are attributable to the general transition from public network infrastructures (e. g. X.400-Box for EDI message exchanges) to Internet-based e-mail communication. But requirements upon safeguarding the transaction range can also arise from the user perspective’s non-transparent network infrastructures within its own company or company association. In this context, end-to-end security is of the essence, which is generally in contradiction to centralized solutions. This contradiction is intentional and indispensable, but from the perspective of the work presented here it can be resolved. Any pragmatic amelioration of the current situation is desirable. Therefore, the steps of a gradually secure solution should in particular extend from site-to-site security in the short term to the end-to-end security in the medium term. Site-to-site security means that a relatively simple and cost-efficient central safeguarding entity is to be built up first at company or division level (metered data office, accounting office, etc.) which secures data transfer between two market participants through the public network but which, for instance, does not yet enable signed, legally binding contractual documents to be exchanged between two users in two different companies. This entity, charged to guarantee site-to-site security, is referred to as a “virtual post office”. “Virtual post offices” were publicly mentioned for the first time in a cabinet decision of 16 January 2002 specifying the application of public key infrastructures within the German federal administration, and describing their utilization in cooperation with external bodies (authorities of the German Federal States, companies, etc.). “Virtual post offices“ are used within public authorities, for the time being mainly in federal authorities, in areas where confidential matters which do not fall under the category of documents of higher security level, like “top secret“ are to be protected. As a result of the modified utilization scenario in the electricity industry, requirements upon the technology used have changed to an extent that would actually call for the definition of a new term. In the context of this paper, we speak of the “virtual post office” principle in order to stick to this expressive term without assuming the same applications and technology. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 8 Utilization of the “Virtual post office” principle “Virtual post office” means a central solution securing data transfer between market participants at the information level without a need for breaking this process down to individual staff members or workstations. Matters like liability, confidentiality, authenticity and integrity are secured on the basis of certificates. A certificate, though being formally assigned to a natural person in a position of responsibility, serves the proof of identity of the source, i.e. the proof of authenticity at company level. The transport of encrypted and/or signed data can but must not necessarily (where data are e. g. files in a CSV format, EDIFACT messages) be carried out by e-mail (SMTP). Electronic signatures at e-mail level are primarily considered as a proof of identity and integrity, i.e. they are to provide security to the partner that the e-mail was not modified. End-to-end security means here user-to-user security. End-to-end security is frequently used in connection with network gateways (e. g. Web-WAP) where decryption and re-encryption are to be avoided. For application examples see Chapter 4 of this document. 2.2 Aim of the document The present document provides substantial recommendations for implementation which take account of different company sizes and different needs, but which are to ensure similar security levels and interoperability throughout the branch with regard to the application of security mechanisms. At the same time it is advisable to keep track of implementations desirable for the medium term. On the one hand, branch requirements upon security in business-to-business transactions will increase; on the other hand, technological trends which can be utilized to meet these requirements in a costefficient manner are becoming increasingly available. 2.3 Additional requirements upon back-up processes Encryption and electronic signatures, i.e. IT security aspects, are relatively simple security measures which can be implemented at relatively low cost. They have the lowest share in percent in the total expenditure assessment (“80:20 rule”). The most important item is the organizational security that is in the broadest sense security in terms of audit requirements in online business transactions. In this context, a distinction should be made between aspects relating to commercial law and to tax law. In many cases, the e-mail communication path has been used for a long time for business transactions without taking on an audit-proof concept additionally as a basis for filing user data or at least for logging data. Where e-mail is used as a platform for online transactions, the e-mail procedure must satisfy the requirements of verifiability, provability, audit ability, data security and internal control, as well as the needs of documentation and statutory periods of data retention (archiving). This applies as well to logging data. All business processes between market participants considered in this paper (master file data, metered data, invoices, etc.) already in the focus of the first implementation step are relevant data according to the principles of adequate and orderly accounting or the principles of data access and verifiability of digital documents. It is to be expected that a higher expenditure is required for the back-up archiving process mainly in connection with data relevant to invoices. This expenditure is particularly determined by the requirements resulting from turnover tax legislation (including eligibility for turnover tax deduction) and from the requirements of archiving pursuant to the “principles of data access and verifiability of digital documents, e. g. in the context of a periodic tax examination. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 9 Apart from referencing in the archive according to commercial items (e. g. invoice number), cryptographic data (encrypted and signed documents, keys, certificates, validation information, etc.) need to be stored as well according to these guidelines, and to be made available “immediately” (not within a “reasonable time”, as previously stipulated) in the case of audit. Documents in business accounting usually need to be retained for 6 or 10 years, respectively; but as the cryptographic key length is rated as being unsafe at an earlier stage due to technological progress, a data medium possibly needs to be re-signed. Practicable procedures which do not require re-signature on the basis of individual documents (e. g. “hash trees”) are being developed. Relevant products taking account of this requirement in electronic archives are becoming available in the market. In spite of these uncustomary and thus new requirements, efficiency analyses carried out by supply utilities show that electronic data interchange, in particular electronic billing implies a particularly high rationalization potential, both on the invoice issuer’s and recipient’s side. Recommendations Re-evaluation of data security in terms of audit security and IT security is needed prior to the extension of electronic data interchange. Meanwhile, e-mail has become a suitable communication means and, due to its service quality, also a suitable transaction medium (and is already utilized today for this purpose). Where e-mail is used as a platform for online transactions, the entire system (with the inclusion of the e-mail system) should meet the requirements upon truth and fairness in terms of commercial and/or tax law provisions. The first step towards the introduction of electronic billing (of network access charges) without accompanying paper documents should focus on the obligations to preserve books of account and other records for a specified period according to tax law. This concerns in particular a long-term archiving concept in accordance with the principles of data access and verifiability of digital documents and the functions (reading, filtering, sorting) and formats (translated, encrypted, signed) accordingly required. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 2.4 10 Key statements on recommendations for implementation A benchmark used as a basis for the recommendations was that a minimum set of interoperability requirements is to be met by the communication partners concerned. Non-fulfilment of these minimum requirements may lead to technical problems. Requirements do not imply any “nice-tohaves”. As a first step, it should be made sure that requirements concerning “site-to-site” security can be satisfied, i.e. that the connection between communicating companies or departments is to be protected in terms of basic commercial values like o liability, o authenticity, o integrity and o confidentiality. This does not imply a cryptographic infrastructure (e. g. cards, readers) or content security infrastructure (e. g. virus scanner) at staff or workstation level. Exchanges concern o metered data o master file data o invoices (on network access charges) o schedules through the formats EDIFACT, CSV and XML (SAP, where required, in individual cases). In the medium term, end-to-end security requirements should be adequately taken into consideration, i.e. protection of the aforementioned basic values is to be ensured at user-to-user level in areas where this is appropriate under business aspects. This requires cryptographic or content security infrastructures at the workstation of the staff member concerned. Focus of this implementation step is no longer only on Electronic Data Interchange but on the exchange of particularly sensitive documents (e. g. contracts). ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 11 3 RECOMMENDATIONS FOR SHORT-TERM IMPLEMENTATION 3.1 Remarks on e-mailing and receipts Security in electronic data interchange does not only imply cryptographic security. For instance, invoices must have been “delivered” to make sure that further legal claims, like time limits for payment, can be made valid. Today, conventional mail is considered to be sufficiently secure. For this reason, particular acknowledgement procedures, like registered letter with acknowledgement of receipt, are usually not applied for normal mailing of invoices. In the past, e-mail delivery within a defined time frame was not necessarily reliable. However, service quality has been considerably improved. As a consequence, electronic transmission of EDI messages, for instance, through mandatory but somewhat cost-intensive procedures, like X.400 is decreasing. Due to the better cost-benefit ratio, the e-mail exchange medium in the form of Simple Message Transfer Protocols (SMTP) is being utilized increasingly. Though the SMTP protocol defines the dialogue between the e-mail client and a receiving server, it does not define the complete e-mail transport up to the recipient (target client). A receipt on the delivery of the mail to the recipient is not provided for in the SMTP standard.1. However, delivery at the company boundary, i.e. at the SMTP server is sufficient in business-tobusiness transactions and, although safe mechanisms of acknowledgement were lacking here, procedures have now been defined on national and European levels (see documentation regarding error and acknowledgment procedures). The store-and-forward principle can be used on the Internet as before, if an e-mail is to be forwarded for instance into another provider domain. To this end, the Domain Name Service (DNS) is frequently used for the determination of the target IP address. This principle shall not be applied in electronic data interchange at TCP/IP basis2. These technical recommendations on parameterization of the mail system allow us to take account of the legal requirements in terms of “delivery”. However, abuse (e. g. through “spoofing”) is still possible. This abuse can be excluded only by means of an acknowledgement and further means within e-mail systems at the application level. These facilities are often switched off externally. It is recommended here to activiate these acknowledgements in a domain-related manner for mails from the domains of market participants. In common mail systems (such as MS-Exchange, Lotus Notes) this progress monitoring can also be preset and adjusted by appropriate templates in such a way that automation is possible3. 1 Here recipient means a mail user agent accessing his local or relocated mailbox. The user-specific e-mail is put into this mailbox by the upstream mail server (mail transfer agent) or cached in a mail queue in case of temporary unavailability of the mailbox. 2 It is rather advisable to set up a direct session between the SMTP client (sending instance) and SMTP server (receiving instance) through the TCP-Port 25. Officially allocated IP addresses need to be used for this purpose. 3 Naturally, e-mailed user data and their protocol information give rise to new requirements in terms of archiving. Correct e-mail archiving is often underestimated, as is shown, for instance, by the case of a German bank which had to pay a penalty of 1.65 million US Dollars imposed by the American Securities and Exchange Commission (SEC). Deleted e-mails had prevented investigations on investment recommendations. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 12 It is recommended replacing the open MIME format used to date by S/MIME (Secure Multipurpose Internet Mail Extension) independently of further security mechanisms offered for instance by EDIFACT in the form of the AUTACK signature message type.4. It is recommended to set up a direct SMTP connection with the server of the market participant (not via DNS), and archiving log files; to activate a follow-up control element “transmission confirmation” unless appropriate EDI message types (CONTRL, APERAK, Application Error and Acknowledgement Message) are used; to use S/MIME independently of further security mechanisms (e. g. EDIFACT signatures through AUTACK, XML-DSig, etc.); to implement an archiving and logging concept which complies with adequate and orderly accounting for business transactions via e-mail. 3.2 Certificates A necessary prerequisite for encryption, electronic signature and authentication is certified cryptographic key material which can be generated5 and certified through one’s own trust centre or procured in the market (public trust centres). Currently, external procurement is the most common solution. Key material and certification services which can be used on condition that policy requirements are met are also offered by companies not accredited according to Digital Signature legislation. There is an enormous dynamic force in the market in this field so that examples are not given here. These providers can issue X.509 certificates which meet the requirements of the electricity branch. According to the document on technical PKI interoperability and recommendations on the certificate structure in this series, it is currently advisable to use 1024-bit RSA keys. It is recommended to use one pair of keys for authentication, encryption and electronic signature, respectively. For qualified signatures (with provider accreditation) the certified cryptographic key material is normally delivered on a secure chip card (the combination of microcontroller and chip card operating system is certified at the E4 level) and operated with a licensed chip card reader. On principle, software keys („soft tokens“) can also be utilized for advanced signatures. For encryption keys, a key backup should be organized in the company concerned; signature keys are not to be stored several times. The application scenario should at least meet the security requirements of the Bridge-CA-initiative6. Careful handling of this key material is dealt with in a further paper in this series. It has a substantial influence on the security level and thus on the communication partner’s trustworthiness. Users are to be aware of the importance of this aspect in organizational (but not in technical) terms. 4 It is true that interactive control is then also performed on the basis of superior protocol elements defined in RFC2821; but in this way contents and protocol are no longer subject to open transmission due to encryption and possibilities of manipulation at the transfer interface (particularly for MAIL, RCPT commands) through diverted protocol elements are excluded. 5 see also PKI-Policy documents 6 see www.bridge-ca.org , Participation requirements ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 13 Apart from technical and organizational aspects, acceptance on the user side plays an important role. This applies in particular to “end-to-end-security”. Particularly for end users, security should be realized in a simple, automatic, transparent and high-performance manner. Recommendations Different keys for encryption and electronic signature 1024-bit RSA key with X.509 certificates Bridge-CA minimum security requirements At least 80 % of the security level is achieved through organizational and 20% through technical measures. “Virtual post office” key infrastructure 3.3 Initially, in order not to have to install cryptographic infrastructures (software or cards and readers) for all end-user workstations, a central solution can be rapidly and efficiently established. Reasonably, the “virtual post office” principle can be technically realized through a proxy/gateway solution. Here, mainly messages on an e-mail transport basis are encoded or signed by a central instance (proxy or gateway). This does not affect the personal assignment, i.e. a personal certificate (e. g. head of the accounting division) is to be acquired according to the registration specifications of the certification service provider. The digital signature of this person is equivalent to a manual signature. De facto, a comparison with a company/division stamp suggests itself – de jure it is a fully valid signature. When applying for a certificate, it is recommended having it provided with an attribute restricting the purpose (e. g. “only for network usage invoices”). Several products are available in the market regarding the “virtual post office”. For German readers, some of these products are published on a separate Internet site7. Recommendations Implementation of the “virtual post office” principle by means of a central solution at company level or at the business process level (e. g. metered data department, network usage billing department, etc.). Formally, the certificate used is assigned to a particular person (e. g. head of the accounting department), but its use is restricted (e. g. for invoices only). De facto the electronic signature is like a company stamp. 3.4 EDI server After their translation, EDI files can be signed by an EDI translator and sent in an encrypted manner. Vice versa, signed or encrypted data can be received. The signature is standardized both in EDIFACT and XML. EDIFACT allows the use of the AUTACK message type which has been available since early 2003 as DIN standard but not as an international standard. For the use of this message type, requirements in 7 http://www.virtuelle-poststelle.info/Produkte/produkte.html ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 14 terms of syntax versions have to be taken into account. DIN 16560-15 describes the signature of user data; DIN 16560-16 describes the signature of key data (KEYMAN). Due to the restriction to the ASCII character set, EDIFACT immanent encryption is not possible. Both XML signatures (RFC 3075) and XML encryption are internationally standardized. The signature and the validation can be realized automatically through the batch procedure; errors like “invalid certificate” can be notified in an appropriate form depending on the valuation. It is possible to combine several/many individual messages (e. g. invoices of the INVOIC message type) by means of a collective signature. The available time frame prior to new PIN entry through an authorized staff member should not be more than some hours, i.e. it should comprise a billing run. Back-up processes like archiving, appropriate visualization of converted and signed data or subsequent validation (e. g. in the case of verifications) are also important here. This applies in particular to tax law requirements for invoices. 3.5 Requirements regarding electronic invoicing This section explains a little more the principal technical processes behind the use of electronic signatures (generally, signatures and encryption processes are relatively invisible to the user as far as applications available in the market are concerned – however, an appreciation of what is going on “behind the scenes” is beneficial). Encryption is not subject to any statutory provisions. Technically, all cryptographic operations can be carried out on a host computer. Signatures, on the other hand, are stipulated by law in such a way that the technical implementation is affected. The rules for electronic signatures were laid down for the first time worldwide in the first German Digital Signature Act of 1997. An EU Directive led to an amendment of this Act in 2001. Within the energy industry, parity of manual and qualified electronic signatures within private law is not of importance for a first implementation step. However, there are provisions in tax law which are important, particularly with regard to invoicing (esp. turnover-tax relevant invoices) between market participants, as they open up rationalization possibilities within the sector. In Germany, for instance, legal extension of the turnover tax law has enabled electronic invoicing to be carried out without accompanying paper documents since 1st January 2001. With a view to restricting abuse (turnover tax evasion), only electronic invoices must be signed. Today, legislation requires a qualified electronic signature with provider accreditation or a qualified electronic signature. This requirement means that (according to the definition in section 2 of the Digital Signature Act) the signature a) b) must be based on a certificate valid at the time of signing and must be generated on a secure signature generation unit. A secure signature generation unit can be one or several chip cards (termed “personal security environment, PSE) or a hardware security module (HSM). The law does not require a user to enter the PIN for every signature if it is generally guaranteed, e. g. in organizational terms, that the key holder is exclusively authorized to utilize the signature key. Furthermore, not every invoice needs to be signed individually, but the signature can apply to a complete invoicing sequence during an invoice run. Mass signature processes, e. g. formally signed by the head of the accounting department, are supported in this way. As chip cards can cope with only limited data volumes, it is important that processes which require processing steps both on the computer and on the cryptographic micro processor be parallelized. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 15 The following example serves to assess the performance in terms of the invoice volume that is to be coped with by the invoicing party or by the invoice recipient: The ERP system (e. g. SAP) generates consecutively numbered invoices in the inhouse format (e. g. IDOC). These invoices are forwarded to an EDIFACT translator. The translator sorts invoices according to recipients; it receives an invoice sequence of 1 to N invoices and converts them into the EDIFACT format in the INVOIC message type. On the same computer, the total invoice sequence is hashed by means of the secure hash algorithm (SHA-1), i.e. a unique profile of data is set up in the form of a 160 bit number. This process is almost independent of the data volume as it takes place within the computer. The mean size of an EDIFACT invoice is approx. 1.5 KByte; an analogous XML format is approx. 12-15 times larger. This number, the hash value, is sent to the signature creation unit (first I/O-operation) Signing means encrypting this number within the chip by means of the private signature key using the RSA algorithm (RSA Encrypt, block encryption) leading to the creation of a number with a length of 1024 bit (signature). This number is returned from the chip to the computer (second I/O operation). Validation means the comparison of the newly generated hash value on the invoice recipient’s side with the attached hash value decrypted by means of the signer’s public key. The validation operation (public key operation) does not need to take place on the chip but can be carried out on the computer. The following scenario (also approved for signatures consistent with the German Digital Signature Act) was used as an example to carry out tests (Source: Siemens Information & Communication Networks, Trusted Networks and Applications Division, February 2003): Infineon-Chip SLE 66CX322P SmartCard reader Omnikey CardMan 1010 (115 Kbaud, PPS requestable) A chip card operating system CardOS M4.01A of Siemens certified at the E4 level With a key length of 1024 bit, a signing process including I/O operations took 0.445 seconds on average in a test comprising more than 1000 measurements. This enables two calculations to be processed per second with a card on the sender’s side (signature). The recipient’s side (validation) does not pose any problems under performance aspects because all operations can take place on the computer. It is also possible to use several cards in parallel, as in public trust centres, which enables almost linear scaling effects to be achieved. For this scenario, the following general conditions need to be taken into consideration: During the card initialization process, the operating system generates a pair of keys (here: signature keys) on the chip. For card personalization or in the registration and certification process, the key material is assigned uniquely to a natural person. This procedure supports a substantial security benefit, in that the private key never leaves the secure hardware of the crypto chip. However, two cards thus have basically different keys. For cards used in parallel, this has the effect that different signature keys are applied in the mass signature procedure. This fact must be known to the validation side. However, there are no negative effects accruing from this in practice. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 16 The signature release through PIN is either given each time per signature or alternatively infinite times per session. Timer restrictions or other counting and regulation mechanisms are not provided for as this would have a negative impact on the I/O performance. If in the case of several invoicing runs, a PIN entry is required each time per invoice run for the release of mass signature, this needs to be governed by the application. Even if several chip cards are not sufficient as signature creation units for the desired performance it is possible to use hardware security modules. The key material (belonging, e. g. of the head of the accounting department) can be imported into the HSM by means of a standardized procedure. NB.: Until fairly recently, hardware security modules have been assessed according to the American FIPS 140-1 security standard which is a NIST-Standard (National Institute of Standards). On and off, the FIPS 140 is attributed to the NSA (National Security Agency) sphere of influence. Therefore, in the European context this standard was replaced by EAL4++. The use of HSM will be the exception rather than the rule as far as the utilization in the electricity industry is concerned. To date, despite being applied worldwide in high-security environments, no HW security module but only chip card solutions have been submitted even to the German certification procedure under the Digital Signature Act. Recommendations From a volume of approx. 1000 conventionally issued invoices per month, business case invoices should show significant savings potentials through electronic (network access) invoicing without accompanying paper documents. 3.6 Application in business processes concerning metered values, master data, schedules In the aforementioned business processes, files are generated (e. g. EDIFACT, CSV and other formats) and frequently transmitted by e-mail. The necessary security mechanisms can be immediately applied on the basis of the “virtual post office” principle. Signature and/or encryption can be carried out on the computer (advanced signature). Other legal requirements, like for electronic invoicing, do not exist. Recommendations Security recommendations should be immediately implemented, at least on the basis of the “virtual post office” principle. Master data are to be encrypted in any case. Data should be centrally signed to provide evidence of integrity. 3.7 Additional aspects of the system access invoicing business process Electronic mailing of invoices eligible for input tax deduction without accompanying paper documents is subject to legal requirements (see above). This applies to the actual process of invoice signature but also to back-up and/or archiving processes affecting the principles of adequate and orderly accounting. The most important requirements are defined in the principles of data access and verifiability of digital: according to these principles, it must be possible to archive and immediately consolidate the ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 17 data (e. g. for periodic tax examinations) in any form (e. g. SAP-IDOC, translated version, encrypted version, reference fields like invoice number, cryptographic keys). Particularly with regard to income tax deduction, it is advisable to have the overall system certified by a qualified auditor. The total system must satisfy national auditing standards and can then also be used for purely electronic invoicing (without accompanying paper documents) with income tax deduction. This type of audit is a well-established measure. It is required for any essential change in financial accounting systems; the result being generally submitted to the responsible regional taxation office. Recommendations Compilation and implementation of an overall concept based on the correlation between the ERP system (e. g. SAP), the archiving system, EDI translator (where necessary) and “virtual post office” Within the framework of a consistent overall concept, signature calculation can be easily shifted from a SmartCard to the processing computer Audit according to relevant national auditing standards and registration, where necessary, at the responsible regional finance office. 3.8 Publication of certificates and revocation information Public encryption keys or the relevant certificates need to be accessible to communication partners as the message is encrypted by the sender through these means. Particularly (or at least) in the case of revocation, public signature keys or the relevant certificates need to be published in a Certificate Revocation List (CRL) or through the Online Certification Status Protocol (OCSP). CRLs must be regularly imported in the form of a signed list; the online status can be queried via an OCSP responder. Query criterion is the certificate number; the answer is also signed by the certification authority. These services are also offered by a service provider/certification service provider (BUY model). If no public certification service providers are involved (MAKE model), the information required for communication or revocation must be made publicly available by the user himself. Information on the key material must be accessible outside company firewalls in the so-called demilitarized zone (DMZ) generally through the LDAP protocol. To this end, the relevant information in an internal Corporate Directory (e. g. ADS, DIR.X, etc.) needs to be replicated into the LDAP directory in the demilitarized zone. For this purpose, the Port 389 (LDAP) or the Port 636 (LDAP through SSL/TLS) needs to be opened on the one hand for LDAP queries of an LDAP-client (e. g. of another market participant), but to be protected, on the other hand, against abuse. http access is an alternative which activates an internal LDAP query behind the firewall. First products for this purpose are available in the market. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 18 Recommendations An externally accessible LDAP directory needs to be set up for the provision of encryption keys and for verification of signatures. The LDAP directory should be accessible to a closed user group only to which the market participants belong. 4 MEDIUM-TERM RECOMMENDATIONS 4.1 Legal and technical differentiations regarding electronic signatures A "simple" signature is an electronic signature which is added to other electronic data and serves to identify the sender (e. g. auto signature in MS Outlook). As it is not possible to identify subsequent alterations to e-mail contents or to the document, the simple signature is suited only for cases where oral or telephonic message transmission would also be sufficient. The simple signature should not be used if security aspects are of importance. The necessary security for external and internal correspondence is provided by "advanced" signatures based on a user-individual certificate (cryptographic key for personal identification) and appropriate software tools. Advanced signatures can be used in EDI transactions or for signing e-mails and documents. Data and signature are inseparably connected. However, a disadvantage of e-mail signatures is that multiple signing and formatting of e-mails – e. g. according to corporate design – is not possible. Therefore, in the majority of cases in legal transactions with non-formatable contents (non-EDI-compliant), the document signature will be suitable. For this purpose, a document, e. g. a word file, or better a pdf file, is signed electronically and sent as an attachment to an e-mail. This form meets the requirements of most of the existing provisions on signature and of the corporate design for business letters. Furthermore, apart from business letters, the document signature offers a great variety of possibilities which often can be utilized albeit only in the medium term within a broader application environment. A "qualified" signature is always needed where the written form is required by law (e. g. for contracts or communication with public institutions). Qualified signatures require keys/certificates issued by special trust centres and, in addition, appropriate smartcards and readers. 4.2 End-to-End-Security In the medium term, it is recommended taking not only central server solutions (site-to-site) into consideration but to invest more intensely into “end-to-end-security” at workstations where the need for communication and data security requires this. In this respect, electronic signatures for the protection of authenticity and integrity which are indispensable at the information level will be a driving force. Where confidentiality is required (encryption) there are certain alternatives available at the transport level through SSL (Secure Session Layer) or VPN (Virtual Private Network). Their security might however be limited through recoding at gateways (e. g. Web/WAP); thus, they do not provide end-to-end security. End-to-End-Security cannot be realized by means of gateway solutions; it requires cryptographic infrastructures at workstations. Also content protection (e. g. virus scanning) can be guaranteed only through appropriate measures at the workstation system itself. As mentioned before, this applies mainly to cases where no mass transactions with formated EDIcompliant data are to be covered. End-to-end-security completes site-to-site-security, and does not necessarily replace it. Investment protection for short-term measures recommended here is thus ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 19 guaranteed. Hybrid forms (“end-to-site security”) are feasible and reasonable in the case of different protection needs on the recipient’s or sender’s side. First examples are known. Two main applications need to be taken into consideration here concerning the secured communication between concrete employees whose work stations require adequate cryptographic infrastructures: e-mail signature and document signature. End-to-end security with recourse to cryptographic key material in an external personal security environment (PSE) at e-mail level may require a “plug-in” in the e-mail-client supporting the S/MIME standard. Other solutions (without plug-in) are available. Regarding document signature, a distinction is also to be made between two cases: 1) End-to-end security at file level (with plug-in in the application, e. g. in Word, Excel, Acrobat, etc.) 2) End-to-end security at file level (without plug-in in the application, but e. g. at Explorer level) The document signature from the relevant processing tools (e. g. MS Office or Adobe Acrobat) is preferable to the signature of any files (via Explorer). If archiving of the business letter and signature verifiability are required later, document signature should be implemented in the PDF format by means of the appropriate Acrobat Signature Plug-in. In any case, the use of electronic signatures currently still requires that organizational and technical details be clarified with the business partner concerned (e. g. whether the recipient is able to identify and verify the signature). The core objective of this series of ebIX documents is to enable such bilateral clarification processes to be reduced to a minimum in the future. Recommendations Signature regulations should remain valid without any changes in case they refer to competences and not to procedures. In business, electronic signatures should be of the same relevance as manual signatures. This applies in particular to the differentiation between essential and unessential contents, to the requirement of two signatures, and to the designation of employees authorized to sign. Just as in the case of EDI through e-mail, letters signed electronically are subject to qualifications as defined by commercial standards including specifications on the legal form, executive bodies and if necessary entry on the appropriate Commercial Register. As in the case of EDI, archiving requirements and, in addition, formal archiving duties which may result from the principles of adequate and orderly accounting, but also from contractual obligations, need to be taken into consideration. 4.3 Digital signature in e-mails The use of e-mail signatures in the S/MIME format is limited in principle by the possibilities covered by this standard. For instance, multiple signatures are not supported: the sender of the message is the signer. Within the scope of e-mail functions, the message contents can be formatted only to a limited extent. Formatting of an e-mail in corporate design is not possible. The signature is not immediately linked with the attachment and it is not stored e. g. when only the attachment is stored (except when it is stored with the original e-mail). For this reason, chapter 3 underlined that electronic signatures in emails primarily serve as proof of integrity. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 20 To be able to verify a signed e-mail, the recipient needs an S/MIME compatible mail client (e. g. MSOutlook 98/2000 or later, or an S/MIME-Plug-in); in addition, the recipient’s mail server should be configured for S/MIME. For business letters or EDI files in Excel format, transmission by means of digitally signed e-mails is thus sufficient provided that only one signature is needed. The contents of the business letter can be contained either in the message text itself or, if corporate design is required, in the attached document. The signature is provided by the sender of the e-mail. In the case of documents attached to the business letter, the sender must open these documents prior to signing by means of the relevant processing or display tool and verify the contents. To enable e-mails also to be represented by mail clients without security functions, it is advisable to use the S/MIME format of the multipart/signed type. 4.4 Electronic signature of documents 4.4.1 Utilization scenarios and file formats Irrespective of business relationships between market participants, electronic signing of documents will continue to gain in importance due to the fact that a change of media required for manual signatures can be avoided. Projects in the production field, in quality assurance of sensitive plants and appliances or in the materials flow and logistics field are already known from similar areas within other sectors. In the production field, applications with rationalization potential may offer themselves for the exchange of engineering drawings or other frequently changed documents, for asset reviews, test reports, measurement reports, check lists etc., and for delivery notes in the case of materials flow. For business letters, it is advisable to sign at tool level as the document contents are displayed during the process of signing; besides, the electronic signature can be optically represented in the signed document. The following document formats are recommended for this purpose: PDF (Adobe Acrobat) or DOC (Microsoft Word, restrictedly). Contrary to the S/MIME standard, interoperability standards for e-mails in the field of document signature have not yet become fully established in the market and standard-conforming signature products still need to be developed. Therefore, product recommendations are unfortunately still necessary. The main decision criterion will be the document format. Though there exist wellestablished standards for the signature format (PKCS#7 and 3 XML variants), additive functionalities like representation of signature fields or linkage of the signature history with the document are more important with regard to the document signature. Currently, there are no standards available yet for these functions. The simple application of document signatures under acceptance aspects is best guaranteed if it can be realized from the relevant processing tool. Multiple signatures, free formatability of the signature field and display of contents, e. g. of a business letter, should be possible during the process of signing. 4.4.2 PDF format A suitable document format that can be recommended with a few restrictions is PDF as the risk of signing cryptic information is low or even excluded („What you see is what you sign“, WYSIWYS). Moreover, PDF is a suitable common format over the entire life cycle of the document up to archiving. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 21 As a matter of principle, at least version 4.05 should be utilized as key lengths of 1024 bit are supported from this version onwards8. The following formats are recommended for electronic signing of PDF documents: Adobe Acrobat 5.0 and above with signature Plug-in Mentana M-Doc Signer 2.4 or Adobe Acrobat Approval 5.0 with signature Plug-in Mentana M-Doc Signer 2.4 Adobe Acrobat 5.0 (full version) enables PDF documents to be generated and electronically signed from almost all current document formats. The more cost-efficient Adobe Acrobat Approval product enables PDF forms previously created to be processed and electronic signatures to be generated in predefined signature input fields. In both cases, the electronic signature is displayed in the document. The Self-Sign-Signature offered by Adobe Acrobat should not be used as it does not offer sufficient security. Verification of a signed document also requires Adobe Acrobat 5.0 or Adobe Acrobat Approval 5.0 with Plug-in M-Doc Signer; a signed PDF document can be displayed as before through the Adobe Acrobat Reader free of charge. 4.4.3 MS-Office formats The DOC format or the XLS or PPT format applied by Microsoft can also be used as a limited alternative. In this case, however, it is indispensable to make sure that no cryptic information (e. g. white text in a white field) is signed as well; this is no trivial requirement in logistic terms. For electronic signing of DOC-type documents, it is advisable to use at least Microsoft Word 2002 (version Office XP1). The electronic signature is not displayed in the document but through an icon in the lower status bar of Word or under “options”. The document name contains the information “signed”. However, in this way there is no tool available at the user interface. An alteration to the document deletes the signature after a warning sign without possibility of fallback. A history is not compiled. Multiple signatures are possible. Verification of a signed Word-type document also requires at least Word 2002; a signed document can be displayed through Word 2000. It is absolutely necessary to make sure that apart from cryptic information, non-visible file characteristics like date of creation, author, etc. are signed as well. Office XP and M-Doc-Signer for MS-Office (and also the Internet Explorer) use the certificates/key memory contained in the Microsoft Windows 2000/XP operating systems. Additional components are needed if employee IDs are used as key memory.9 Product evaluation activities have not been completed; Office and Adobe Acrobat refinement is to be followed. In the next version of its product suite, Adobe intends to support a PKI/Smartcard interface so that additional Plug-in software will possibly be no longer required in the future. Where necessary, product recommendations must be adjusted accordingly. 8 Already today there exist “services” which annul safety settings for 40 US-$ and decrypt older documents from previous versions for 300 US-$. 9 The Microsoft support to the Crypto Service Provider interface (CSP) for the use of SmartCards as carrier of the key material is achieved e. g. through a component of the Secude company. ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 22 Key statements on document signature With regard to document signature, especially concerning functions going beyond the original signature container format, it not yet possible to provide any information about interoperability in the medium term. Extensive independent standardization activities are showing in particular in the context of PDF. Signed PDF is mainly reasonable where aspects of long-term archiving are a matter of priority. Likewise, signed PDF documents are suitable where a change of media is to be avoided, and where no unrestricted follow-up processing of the document, as in the Office environment, is envisaged or where workflow processes are to be performed on the basis of forms. Through MS-Office XP and third-party suppliers, an industry standard is emerging for Office formats (in particular MS-WORD) which covers the protection need of rather fast-living documents. The “final version” should be archived in a PDF format. 4.5 Aspects of long-term archiving of electronically signed documents The aim of archiving signed documents is to retain documents over a long period, and to be able to reproduce them as written evidence independently of the tool or operating system development. For this reason, Office documents should normally be converted into platform-neutral formats. Generally, these are TIFF, JPEG, ASCII and PDF. Documents which have to be preserved for a specified period are usually stored in document management systems, archives or simply through department filing (e. g. drives). Archiving system und workflows are defined in a process or business-specific manner according to the respective requirements (retention period, visual reproduction/reproduction of contents, etc.). In contrast, archiving of electronically signed documents requires a new kind of approach. a) Archiving system: If the signature(s) are integrated into the file, the archiving system does not have to meet additional requirements. Where separate signature files of the document are to be archived, the document file and the signature file(s) have to be inseparably linked with one another. b) File format: Concerning signed Office or mail files, account has to be taken of the fact that a converted long-term archive format is not provided with the signature of the original file (which means that verifiability of authenticity and integrity is lost). Conclusion: A converted long-term archive format would have to be "certified". The aforementioned problem also occurs if signed Office or mail files are directly archived. Should reverse compatibility of tools no longer exist (e. g.: change of the operating system platform or of the tool providers) documents need to be converted where necessary. Conclusion: Conversions due to system migrations need to be “certified” as well. Therefore, the aim should be to sign documents in the file format which permits subsequent unproblematic long-term archiving and enables follow-up costs to be avoided. Though TIFF and JPEG ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 23 are standards in terms of archiving, they are scarcely used as document exchange format. This need is currently satisfied by the industry standard and the PDF ISO standard. “Sub-dialect” archiving is emerging in terms of standardization.10 Recommendations: Relevance in terms of commercial law: For contractual documents, it is recommended using the document signature on the basis of PDF. Relevance in terms of tax law: If the documents to be archived are relevant to taxation, additional requirements need to be satisfied, where necessary (in particular requirements resulting from the principles of data access and verifiability of digital documents after filtering and sorting) 4.6 Web-Signing Web-Signing, i.e. the signature of transactions (for instance in a portal, in order to achieve a high degree of liability) is still of minor importance within the electricity industry; therefore, this topic is only briefly dealt with. Basically, a distinction has to be made between two scenarios: In both cases, safeguarding takes place at the information level; the transport level is mostly additionally encrypted through SSL in practice. Original HTML files of a transaction are signed in the case of Native Web-Signing. As most portal applications are based on forms, the Browser-based Adobe-Integration in conjunction with Web-Signing is a reasonable additional scenario. 4.7 Project context for the introduction of the recommended measures The introduction of certificate-based authentication, encryption and electronic signatures at many workplaces is nearly always realized through introduction of a multifunctional employee ID. Apart from its traditional function as identity card (name, photo, etc.), the multifunctional employee ID can imply additional functions which can be distinguished into the following categories: control of access to rooms and buildings entrance and exit control for motorcar parking support to data recording for time management systems support to accounting systems (canteen, etc.) control of access to computers, networks and applications storage medium of cryptographic keys and certificates for the purpose of authentication, encryption and electronic signature possibly additional functions In most cases, the functionalities described are made available through a multifunctional chip card (SmartCard) which, apart from the plastic corpus, contains further elements, such as magnetic strips (mainly on account of compatibility with existing applications) contact chip with cryptographic functions For long-term archiving of electronic signatures, requirements can be delimited through „key questions“: How long are items to be archived (e. g. 6 years: invoices without subsequent signature; 10 years: business letters with subsequent signature; 30 years: contracts with indeterminate subsequent signature)?; is migration required (e. g. new versions of display tool)?; Is a history needed (new signature to alterations, are previously signed statuses identifiable)?; are multiple signatures required (e. g. internal administrator, external auditor)? 10 ebIX May 16, 2006 Use of encryption and digital signatures in the European energy sector 24 contactless chip Cards with these characteristics are also called hybrid cards. One chip with both contacting and noncontacting access will possibly be available in future. 4.8 Utilization in Microsoft environments From a strategic perspective, the implementation of this security strategy into concrete product functionality has been put to the test by the Microsoft initiative “Trustworthy Computing”11 This initiative stands for interoperability and standards though these standards are not put in concrete terms. The analysis of PKI functionalities in Windows 2000/2003 and Windows XP and relevant requirements upon interfaces have shown that Microsoft as industry standard and PKIX as open standard are not conflicting in essence. This applies today also to standards like S/MIME or ISISMTT. Naturally, a further refinement cannot be precisely predicted and thus remains to be awaited. However, it is likely that Microsoft does not want to occupy PKI-markets through proprietary but through standard-conforming “out-of-the-box” provision in product components, e. g. within the scope of the .NET strategy. Vice versa, past experience has shown that especially the refinement of security functionalities at the Microsoft platform opened up a field of activity to smaller product and solution providers. An example of ready-made hardware solutions on the Microsoft platform is given below: ISIS-MTT can be given as an example of practice-oriented interaction of established standards like PKIX and S/MIME. Microsoft, as an important platform provider, complies today with these standards and does not question them in the near future. Microsoft is registered with TeleTrusT as an ISIS-MTT-application developer. See e. g. Whitepaper on „Trustworthy Computing“ on http://www.microsoft.com/presspass/exec/craig/1002trustworthywp.asp with additional links. 11 ebIX May 16, 2006