DigSig

advertisement
Technical PKI interoperability in the European energy sector
1
PKI Policy
Recommendations to market participants
Status:
Version/release:
Revision:
Date:
ebIX
Request for comments
0.3
none
March 08, 2016
May 16, 2006
Technical PKI interoperability in the European energy sector
2
CONTENTS
0
MANAGEMENT SUMMARY .................................................................................................... 4
0.1
0.2
1
BACKGROUND ......................................................................................................................... 4
KEY RECOMMENDATIONS ........................................................................................................ 4
INTRODUCTION ......................................................................................................................... 6
1.1
1.2
1.3
1.4
1.5
ABOUT THIS DOCUMENT .......................................................................................................... 6
SCOPE OF PROJECT ................................................................................................................... 6
PARTICIPANTS IN THE PROJECT ............................................................................................... 6
REFERENCES ............................................................................................................................ 7
CHANGE LOG ........................................................................................................................... 7
2
THE CONCEPT OF “TRUST” IN ELECTRONIC COMMUNICATION ............................ 8
3
FIELDS OF APPLICATION ..................................................................................................... 10
3.1
INTERNET BUSINESS APPLICATIONS ..................................................................................... 10
3.1.1
Use for Internet Applications ........................................................................................ 10
3.1.2
Internal Applications ..................................................................................................... 10
3.1.3
External Applications .................................................................................................... 10
3.2
INTERNET BUSINESS SCENARIOS ........................................................................................... 10
3.2.1
Business Partner Models in Electronic Trading ........................................................... 10
3.2.2
Business Security and Risk ............................................................................................ 11
3.2.3
Business Scenarios and Risk Management.................................................................... 12
3.2.4
Risk Categories.............................................................................................................. 13
3.2.5
Requirements for the PKI for Minimizing Business Risks ............................................. 15
3.3
FIELD OF APPLICATION OF COMMUNICATION SECURITY ...................................................... 15
4
STRUCTURE OF THE PKI ...................................................................................................... 17
4.1
APPLICATIONS ....................................................................................................................... 17
4.2
CONFIDENCE MODEL ............................................................................................................. 18
4.3
THE CERTIFICATES ................................................................................................................ 19
4.3.1
Validity Model ............................................................................................................... 19
4.3.2
Certificate Hierarchy .................................................................................................... 20
4.3.3
Publishing Certificates .................................................................................................. 21
4.3.4
Cross-Certification ........................................................................................................ 21
4.4
TRUST CENTER SERVICE ....................................................................................................... 21
5
SMART CARD PERSONALIZATION MODEL .................................................................... 23
5.1
5.2
5.3
5.4
5.5
6
PRE-PERSONALIZATION ......................................................................................................... 23
PERSONALIZATION ................................................................................................................ 23
INITIAL SUPPLY OF SMART CARDS DURING THE IMPLEMENTATION PHASE ......................... 23
KEY GENERATION ON THE SMART CARD .............................................................................. 24
POST-PERSONALIZATION ....................................................................................................... 24
PKI ORGANIZATION ............................................................................................................... 25
6.1
PURPOSE AND OBJECTIVE...................................................................................................... 25
6.2
ORGANIZATIONAL UNITS FROM AN OVERALL PERSPECTIVE ............................................... 25
6.3
CERTIFICATION AUTHORITY ................................................................................................. 27
6.3.1
Operational CA ............................................................................................................. 27
6.3.2
Smart Card Management Service (Optional) ................................................................ 30
6.3.3
Time Stamp Service ....................................................................................................... 31
6.4
REGISTRATION AUTHORITY .................................................................................................. 31
7
ebIX
CORPORATE DIRECTORY .................................................................................................... 35
May 16, 2006
Technical PKI interoperability in the European energy sector
APPENDIX A
A.1
A.2
A.3
A.4
A.5
3
REQUIREMENTS IN TABLE FORM ............................................................. 37
GENERAL REQUIREMENTS ..................................................................................................... 37
PKI COMPONENT ORGANIZATION ......................................................................................... 37
CREATING/STORING KEYS/CERTIFICATES ............................................................................ 37
PROCESSING KEYS IN CLIENT SOFTWARE ............................................................................. 38
COST ALLOCATION ................................................................................................................ 38
APPENDIX B
SUMMARY OF REQUIREMENTS FOR PERSONALIZATION ................ 40
B.1
CENTRAL CARD INITIALIZATION (PRE-PERSONALIZATION) ................................................. 40
B.2
SENDING THE INITIALIZED CARDS TO THE LRAS (WHERE APPROPRIATE WITH THE
TRANSPORT PINS) ............................................................................................................................. 40
B.3
CARD PERSONALIZATION AT AN LRA................................................................................... 40
B.4
AUTOMATIC ACTIVITIES AT THE CA DUE TO CARD PERSONALIZATION (WITHOUT
INTERVENTION OF A CA OPERATOR) ................................................................................................ 40
B.5
CARD APPLICATION PROCEDURE .......................................................................................... 40
APPENDIX C
C.1
C.2
C.3
SUMMARY OF REQUIREMENTS FOR DIRECTORY/REPOSITORY ... 42
REQUIREMENTS REGARDING VALIDATION ........................................................................... 42
SOLUTION PROPOSAL ............................................................................................................ 42
OTHER ASPECTS .................................................................................................................... 42
APPENDIX D
NOTE ON POST-PERSONALIZATION ......................................................... 44
APPENDIX E
GLOSSARY ......................................................................................................... 46
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
4
0 MANAGEMENT SUMMARY
This document is the sixth in a series of publications from the ebIX project “DigSig” regarding the use
of encryption and digital signatures within the European energy sector. Being defined in a general
manner, the organizational parts aim at ensuring a uniform organizational security level with regard to
electronic signature and encryption of transactions between market participants across company
boundaries.
The technical parts of the documents, defined as well in a general manner, are to ensure interoperability at a technical level even where different products or services are utilized. The political,
organizational and technical statements represent recommendations which are to enable a reliable
trustworthy infrastructure to be set up among market participants along the lines of solidarity.
These measures shall serve as a guide for implementation within companies and for subsequent
application at market interfaces. However, procedures other than proposed in the recommendations
need to be justifiable and must not impair the general level of security.
For economic reasons, market participants should be interested in making sure that the infrastructure
of confidence is not undermined. This is the only way to guarantee secure handling of electronic
business in the medium term, and to ensure that further automation steps can be managed in the light
of future developments.
0.1
Background
The security policy of a jointly, albeit in certain cases only partially, used organizational and technical
platform is a matter that affects all market participants who wish to use this platform. Market
participants who decide in favor of an external certification service provider, however, will be
responsible for significantly fewer issues because the chosen, generally recognized Trust Center1
assumes responsibility for the majority of services performed. Refer to the document “Management of
key material”.
The recommendations of this entire document are relevant for market participants who aim to
implement either a complete or extensive parts of a MAKE solution; in other words, participants who
wish to set up their own Public Key Infrastructure which other participants must be able to trust. Due
to the increasing extent to which standard software (for example, Microsoft) supports certificate-based
security functions, it is likely that even small companies will be more willing to use these components
to create their own PKI.
0.2
Key recommendations
Alongside the general political conditions manifested in the form of a joint declaration between the
associations, it is imperative that market participants agree upon a uniform level of security at the
interfaces to their communication relationships, which are protected by PKI mechanisms.
In addition to political provisions (for example, self-commitment), comparable technical and
organizational security must be ensured for data that is processed by comparable applications. This
applies, in particular, to Electronic Data Interchange relationships (EDI) and the associated EDI
converters, as well as e-mail exchange between the partners (with file attachments) who are already
involved in the joint Public Key Infrastructure.
The aim of the “Security policy for setting up and operating cross-association Public Key
Infrastructures” is to support a cross-industry security infrastructure.
1
Certificates can be obtained from any Trust Center (MAKE or BUY, accredited or non-accredited) providing
they conform to ebIX recommendations (for example, Certificate Policy).
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
5
Other conceptual bodies of rules and regulations, which ensure a consistently high level of security
and interoperability, are the Certification Practice Statement and Certification Policy (CP). The CP
should be created by each company separately in line with the respective application landscape.
It is not important here that each market participant involved in the procedure deploys the same
technical components or adopts the same organizational approach.
Nevertheless, the purpose of this document on the PKI security policy is to establish a necessary
minimum of



joint concepts and their definition
joint services and
joint organizational forms
for the joint communication interfaces. Only then is it possible to set up and operate a jointly used
infrastructure of trust.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
6
1 INTRODUCTION
1.1
About this document
Within the European energy sector, electronic data interchange (EDI) using a variety of methods has
become a core business enabler over the last few years. It is no longer possible to imagine how
liberalised energy markets would function without EDI; rapid and automatic interchange and
processing of business transactions, as far as possible without human intervention, is organisationally
and economically necessary for all participants at all levels. Whether the transactions contain metering
data, invoices, customer switching information or schedules: automation brings benefits through
process optimisation. Nevertheless, there are further, fundamental considerations – political,
organisational and technical – to bear in mind, which influence implementation.
Core processes with a high-volume character require supporting processes within the organisation.
Securing EDI transactions is one such supporting process, especially in connection with transparency
and integrity of the data involved. Just as a signature gives a piece of paper legal character – e. g. from
an offer to a contract – EDI requires the same legal status for security and non-repudiation. To this
end, it is essential that a secure business partner network be established, within which electronic
business transactions for all participants are made possible. Therefore we need to promote an
infrastructure which can be trusted both by larger corporations (with their own certification
authorities) and smaller companies (who buy-in from service providers).
This can only be guaranteed by verification and confidentiality mechanisms directly associated with
the information exchanged. These mechanisms need to cover the whole range of the logical
transactions consistently. This is necessary to be able to carry out transactions in the new deregulated
market between market participants in a legally correct and clear-cut manner in terms of liability law,
and not least in an inexpensive way under technical and organisational aspects.
1.2
Scope of project
In the light of these requirements, a small project (“DigSig”) was established within the ebIX structure
to generate appropriate documentation which can then be used as a basis for implementation scenarios
on a national and/or international level. The intention is to describe the overall harmonisation
requirements for the use of encryption and digital signatures for electronic transactions within the
European energy sector; also being compatible with the following overall ebIX objectives:
1) Make recommendations of common procedures that facilitate the common open European energy
market
2) Make common standards for secure data interchange that can automate the process to reduce the
costs for the parties involved.
1.3
Participants in the project
The project is based on documents produced within the German national group (under the able
tutoring of Dr. Willi Kafitz, Siemens AG, Frankfurt) and has been coordinated for ebIX by Carl W.
Major. The following participants provided intellectual and/or financial support to the project:
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
Country
DE
DE
DK
BE
SE
NL
FI
NO
NO
SE
SE
CH
1.4
Name
Carl W. Major
Dr. Konstantin Staschus
Erik Hartwell
Hugo Dekeyser
Joachim Abrahmsén
Lodewijk ter Haar
Matti Vasara
Per M. Breistein
Ole Jacob Høyland
Oscar Ludwigs
Robert Lundin
Rudolf Baumann
7
Company
E.ON Netz
VDN
Energinet.dk
Eandis
Steria
Tennet
Fingrid
Statkraft
Statnett
Svenska Kraftnät
Steria
ETRANS
References
[1] Original project proposal, see http://www.ebix.org/
1.5
Ver.
0
0
0
ebIX
Change log
Rel.
1
2
3
Rev.
none
none
none
Date
2006-01-26
2006-02-28
2006-05-16
Changes
Document generated
Comments incorporated
Published as ebIX RFC
May 16, 2006
Technical PKI interoperability in the European energy sector
8
2 THE CONCEPT OF “TRUST” IN ELECTRONIC COMMUNICATION
Trust is an important prerequisite for conducting business via open networks. Questions crucial to this
concept include:




Am I sure about who I am dealing with?
Is the business conducted of a binding nature, that is, are the declarations of intent of my business
partner unambiguous and indisputable?
In the event of a dispute regarding the services provided, can I assert my claims?
Are my communication facilities secure and do they ensure confidentiality?
One of the requirements for the more widespread use or implementation of a business-oriented
security platform for cross-company business processes via open networks is fulfilled within the scope
of the PKI project. A Public Key Infrastructure is used for this purpose.
A Public Key Infrastructure is defined as follows:
“A system of components, services, processes and operators for creating, disseminating and managing
keys and certificates”.
These are a prerequisite for secure services for communicating via Internet-protocol-based networks.
Secure services enable




the authenticity of electronic documents to be verified,
the identity of communication partners to be verified,
confidentiality to be maintained,
information exchange that has taken place between known partners or network components
to be verified (time related).
The essence and purpose of a PKI are always the same irrespective of whether it is an individual
company PKI or a secure Business Partner Network. A joint set of rules and regulations is always
required for all participants in cases where bilateral or multilateral business relationships are
concerned. Only when it comes to technical verifiability (validation) does the situation inevitably
become more complex. These interdependencies are dealt with in greater detail in other documents
(for example, in the Certification Practice Statement and Certification Policy).
PKI services are, therefore, at the disposal of two extensive fields of application:
(1) The application field for network security and
(2) The application field for business security/information security
The focus here will be on the second field of application, with attention also being paid to underlying
transport security. Asymmetric cryptographic methods are nowadays commonly used for transportbound security too (in particular for encryption). These methods do not initially have to be linked with
the person-related Public Key Infrastructure, however, because the products available on the market
include their own key generation and management mechanisms. The following merely contains
information on server certificates, for example.
The PKI comprises the following service components:


Trust Center service
Includes the following functions: key generation, certificate creation, key archiving, time stamp
service.
Directory service
Includes the following functions: certificate and CRL service.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector


9
Key issue service
Includes the following functions: user identification, application, creation, certification request,
key issue and management.
Smart card service
Includes the following functions: smart card personalization and smart card management.
Three principal tasks must be performed for the application fields:



Supply users with key material and certificates,
Supply the applications, computers, processes with certificates and test data (directory service
with CRLs, for example),
Provide a trustworthy time stamp service (optional).
The PKI is an important security-related requirement for the companies involved in the procedure to
enable trustworthy communication to take place across open networks. The PKI provides methods and
techniques that enable business transactions to be carried out across open networks with a level of
trustworthiness that fulfills the requirements of the business being conducted. The PKI should be
based on international standards and reflect a level of security that is necessary for trustworthy
business processes. The PKI is all the more important the greater the extent to which the business
processes are converted to Internet-based applications and further developed (portals).
From an overall company perspective, the PKI serves two primary purposes:


It helps streamline operational processes
It is a prerequisite for B2B business relationships based on mutual trust.
Within the meaning of the ebIX PKI Policy, the first point defines the motivation to act; the second
point is relevant for the purpose of standardizing joint security criteria.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
10
3 FIELDS OF APPLICATION
3.1
Internet Business Applications
The field of application of the PKI includes e-mail, the interchange formats (EDIFACT, XML, CSV)
and all other applications that exchange sensitive information via bilateral or multilateral network
relationships between the partners.
The Internet is synonymous with an open network. It is not important here whether the network type
used as a basis for communication between market participants is in fact the Internet. What is
important is that we are dealing with a network that is open or that the requirements regarding liability
and confidentiality cannot be verified by (one of) the communication partners.
3.1.1
Use for Internet Applications
Internet technology is becoming more and more widespread. On the one hand, it offers enormous
scope for standardizing and cutting the cost of networks as compared with vendor-specific
technologies; on the other hand, it acts as a global information hub via which anyone can choose to
communicate with anyone anywhere in the world, just in the same way as using a telephone.
3.1.2
Internal Applications
Internet technology is also deployed in company intranets because these generally use the services and
equipment of public network providers. It is, therefore, advisable for these internal applications to be
supported by the PKI insofar as general, i.e. cross-company, security issues are affected directly or
indirectly. The main business benefits to be derived from this include reduced costs and protection for
sensitive company data. The security requirements should be equally stringent in all areas that affect
multilateral business processes (analogy of the weakest link).
3.1.3
External Applications
The Internet can be used to handle business transactions with known business partners and
communication with external employees as well as to establish contact with new partners and
customers.
In the first case, this involves the procedures agreed upon in the interfaces of the electricity market for
exchanging (sometimes highly sensitive) data with registered companies or persons. The PKI has the
task of establishing a basis for secure and trustworthy connections by means of certified keys.
Stringent security requirements for electronic transactions have, for example, been developed by the
stock exchange.
3.2
3.2.1
Internet Business Scenarios
Business Partner Models in Electronic Trading
Catchwords are often used for applications, for example, electronic trading, e-commerce, e-business,
e-government, and so on, depending on the application or business relationship in question.
The following typology has already become established:
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector




11
Business-to-Consumer, or B2C
Business-to-Business, or B2B
Citizen-to-Government, or C2Gov, A
Business-to-Employee, or B2E
This document only discusses B2B relationships.
3.2.2
Business Security and Risk
The term business security is used here to mean safeguarding against business-related risks. Business
risks are usually assessed in terms of money.
The security of a business relationship is, therefore, based on two cornerstones:


Ensuring the confidentiality and authenticity of the business information (this also applies
to orders for financial transactions)
The reliability of the declarations of intent of the partners and their authenticity (this
includes trustworthiness from an economic point of view)
Absolute certainty must prevail regarding the person with whom the business transaction has been
agreed upon and is conducted. Today’s business practices and their strong emphasis on interpersonal
communication and human supervision make these business risks seem rather unlikely. The objective
here, however, is to harness available scope for rationalization by transferring at least some of the
human mechanisms for supervision and for establishing confidence and trust to a certificate-based
infrastructure of trust (enabler for e-business).
Business security is safeguarded by the conventions of civil and commercial law. Further legal general
conditions are currently being defined for Internet business transactions. The “electronic signature” for
documents that are communicated electronically is equivalent to a declaration of intent with a manual
signature. The appropriate sets of rules and regulations (EU guidelines for electronic signatures,
German Digital Signature Act, U.S. Law for Electronic Signatures, and so on) are already in force. A
prerequisite for legally binding electronic signatures is a PKI.
The business security objectives can be seen in the following table.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
12
Security Aims for Electronic Business
Unique identification of business partners
Authenticity
Integrity of information/data transferred
Confidentiality of information transferred
Encryption
Verifiability of commnuication
Liability
Business transactions with elec. signatures must have evidentiary value
Many business portals, EDI systems or trading platforms currently available on the market use Internet
security protocols. In the critical area of minimizing business risks at information level, the required
security measures (for example, verification of personal declarations of intent of the business partners)
are now laid down in the law. Using the PKI in accordance with joint criteria will help achieve the
required level of security and facilitate system management.
3.2.3
Business Scenarios and Risk Management
Business agreements do not usually require a specific form. Contracts that are concluded verbally are
the norm for most day-to-day business activities. Bigger business deals that involve much greater
financial risk are normally documented, that is, quotations, conclusion of the transaction, confirmation
of the delivery, and payment orders must be made in written form. Providing these documents in
written form with signed declarations of intent of the business partners is, therefore, normal business
practice. Even if the interchange formats for the electricity industry have already been created, the
security measures implemented should provide a basis for using electronic applications further (for
example, contracts). Measures for assessing business risks objectively, which will then be reflected in
credit security arrangements, supply of equity and so on, are currently being defined on an
international scale (Basel II) and laid down in national law (this will take place during the course of
2005). Great importance will be attached to the formalized assessment of "operational risks" due to the
crucial role played by electronic data processing with a view to securing the success of the company.
In electronic business transactions, written documents and declarations of intent must be replaced by
electronic files with personal, electronic declarations of intent. The purpose of this document is merely
to define a framework within which risk management for contracts in electronic form function in the
same way as for contracts in written form. It should be pointed out once again that an increase in
throughput makes greater demands on B2B processes with regard to security and liability. The
German electricity industry alone deals with approximately 2.5 billion formatted B2B transactions
every year, which can be processed via the formatted interfaces of the electricity market. To increase
acceptance with a view to leveraging the full potential involved, powerful PKI mechanisms must be
provided in order to achieve a similar level of efficiency with an automated infrastructure of trust.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
3.2.4
13
Risk Categories
A distinction is made between three risk categories for business transactions in the electricity industry,
namely a low, a medium and a high risk category. The transitions between these categories are fluid
and differ from one company to the next.
The low risk category covers business deals with a low contractual value per business transaction. This
means that individual bad debt losses in the electricity industry do not represent an economic threat to
the company. Bad debt losses with relatively low values can, however, become critical for electricity
utilities if it becomes known that the company does not sue for the recovery of a low-value debt
because furnishing proof for a legitimate claim is more time consuming and costly than the value of
the business transaction itself.
In the electricity industry, high-value business deals or transactions (for which special safeguarding
measures are required for legal reasons) that are carried out via the Internet or open networks should
be classified in the high risk category.
The category between the low and high categories is less clear cut and can be defined by each
company in line with the nature of its business dealings.
If business transactions are to be carried out without encryption via the Internet, it is relatively easy for
unauthorized persons to gain access to confidential information. Such a loss in confidence and trust
can severely damage the reputation and business opportunities of a company. A loss of trust and
confidence can also result in extremely high business risks. Confidentiality is, therefore, something
that should be aspired to by market participants in the interests of security.
3 Categories of Business Risk
Low Risk
Medium Risk
High Risk
E-mail *
E-mail
E-mail
Information,
Quot.
Technical info.
etc.
Business with
partners based on
contracts or with
limited value
Business
with unknown
partners or with high
or limited value
B2B with
low-value
contract content
In legally necessary
technical processes
(official processes)
*) Depending on the content, e-mail can appear in all three categories
The three categories of business risk are portrayed in the following table.
Typical methods are those with which claims from business transactions in the three risk categories
are dealt with. The overview on the following page illustrates this more clearly.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
14
Risk Management in the 3 Scenarios
Low Risk
Medium Risk
High Risk
Claims
settled through
goodwill
Claims
settled through
mutual agreement
or out-of-court
settlement
Claims
settled through
judicial decision or
arbitral award
The purpose of laws regulating digital signatures is to recognize electronic
agreements. They therefore support business risk management.
In the low risk category, claims are usually dealt with as cases of goodwill. PKI services would not be
necessary here because no costly and complex arbitration procedures are used due to the low value of
the transactions involved. In this risk category, the focus is on confidentiality and integrity of
communication, which can be ensured by means of Internet security protocols.
Note:
In line with the Basel II requirements, financial institutions will, in future, have to consider the credit
risks of their customers in much greater detail than they had been required to do to date. The
customers concerned will, in turn, have to observe these more detailed criteria in order to furnish their
lenders or shareholders with the appropriate evidence.
Alongside business-related risks, operational risks, which include telecommunications and information
technology, must also be considered. In line with this, attention has been paid to the increasing
importance of the technical side of electronic business, the reliability of which is, no doubt, critical to
the company.
Risk assessments in IT business processes and implementing suitable security infrastructures render
operational risks easier to control and, at the same time, boost the financial strength of a company in
line with Basel II.
The Law on Control and Transparency in Business (KonTraG), which came into force in May 1998,
obliges management to implement suitable risk management measures and stipulates that the
executive board member or manager responsible shall be personally liable for damage or loss caused
by negligence.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
3.2.5
15
Requirements for the PKI for Minimizing Business Risks
The three business category risks result in different requirements regarding the PKI services.
As far as the low risk category is concerned, the existing Internet security protocols would be
sufficient.
In the case of the medium risk category, the business partners could agree upon the level of
trustworthiness required.
In the high risk category, electronic signatures that comply with the stipulations of the law are
required.
In most of the other business relationships, the use of qualified, electronic signatures is not necessary.
If a high level of security is to be achieved for signatures irrespective of legal requirements, the key
material should be stored on secure hardware (smart card).
The management responsible for business operations requires the PKI to maintain the trustworthiness
of electronic business and that no increased risks (for example, regarding claims) result from using
electronic business processes. For this reason, the distinction according to risk categories discussed
above is hardly relevant with regard to day-to-day business activities, but should be considered in a
suitable form (insurance law, assessments for loans, Law on Control and Transparency in Business,
and so on).
3.3
Field of Application of Communication Security
Confidentiality is required for business transactions with external or internal partners and internal
administrative procedures. The Internet is an unsecure medium. Practically no other means of
communication has been paid so little attention regarding the issue of security during the initial
development stages as the Internet. The Internet committees have for some years been pushing ahead
with work on the agreements for security protocols for the Internet. Confidentiality and integrity at the
transport level can be ensured by the “Secure Socket Layer” (SSL) protocol or HTTP-S for Web
applications. The “IPSec” protocol is now also popular for setting up virtual company networks via the
public Internet.
These security protocols have the following in common:
1. They are based on the layer model of the Internet. This means that the security mechanisms are
active from the end user workstation right through to the end-user workstation of the partner or
data server of the process and include the intermediate switching computers (communication
servers). End users (at their respective workstations) can also be integrated personally through the
use of smart cards for supporting cryptographic authentication.
2. They use asymmetric, cryptographic mechanisms for authentication and for exchanging
communication keys. Suitable key material and certificates are required for the cryptographic,
asymmetric mechanisms.
Using secure Internet security protocols (SSL/TLS) also increases technical security.
The PKI can issue key material and, where appropriate, certificates for services and other devices. The
procedures for distributing and managing this key material and certificates differ from those for
distributing and managing personal key material and certificates. This must be defined separately in
the operating concept if these options are to be included. Broadening the range of certificate-based
services is a welcome move within the scope of the cross-association PKI providing the security level
of user certificates is not compromised as a result. The following sections cover all the different types
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
16
of key even if the requirements for market participants specified in the declaration refer to holder
(user) certificates only.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
17
4 STRUCTURE OF THE PKI
4.1
Applications
The PKI supports:




personal users (encryption, authentication, and signature keys as well as certificates) that use
asymmetric, cryptographic mechanisms for encryption, identification, authentication and/or
signing purposes
processes, applications, servers and other hardware and software components that use asymmetric,
cryptographic mechanisms for encryption, identification, authentication and/or signing purposes
key management entities, that is, equipment and services for assigning, distributing and managing
key material and certificates correctly in the PKI system
the creation, distribution and management of smart cards for storing key material and certificates
for personal users.
Certificate Types in the Applications
Natural
persons
hold
User
certificates
Communication
components
hold
Component
certificates
Users can be natural persons and should, therefore, be referred to as holders of keys and certificates so
that they can be distinguished more clearly. Natural persons apply for and own holder (user)
certificates.
Users can also be network components and processes.
As a result, this machine-related, non-personal type of usage should be referred to as the field of
application of the communication components. These components are equipped with keys and
certificates. Communication components own component certificates.
Key material and certificates should only be issued to a holder if the person in question has been
uniquely identified beforehand. Identification is carried out by a registration authority. Companies can
set up their own registration authorities at their respective locations within the framework of the PKI
so that they have these services on site.2
2
For network components, key management depends on the procedure or process in question.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
18
The holders are supplied with the key material and certificates in the form of a secure data carrier
called the Personal Security Environment, or PSE for short. The file contents can be issued in the form
of software or stored on secure hardware (smart card, hardware security module, HSM), and handed
over to the holder.
In the PKI, three asymmetric key pairs can be created and managed for each holder together with the
associated certificates and three different PSEs:



Encryption PSE for encryption purposes,
Authentication PSE for identification and authentication purposes,
Signature PSE, only for electronic signatures.
In the case of large implementations, authentication and signatures can be handled, if necessary, with
one key. This allows archiving of the encryption key for the purposes of data recovery, should the
need arise, in particular within larger organizations (some implementations nevertheless prefer to
combine authentication and encryption in one key; although this is possible and can, in the short term,
seem simpler this can lead to organizational difficulties later, especially when data recovery becomes
necessary).
The private decryption keys can be stored on a smart card or made available in the form of a soft PSE.
Due to the fact that the requirements regarding liability generally result in specific security
requirements for signature keys, these aspects of a PKI will be dealt with more closely in this
document. Certain aspects (for example, content security) can even render local decryption
inadvisable.
The keys for encryption PSEs can be archived in the Trust Center. Authentication and signature keys
should not be archived externally. Other technical keys required (for example, for the batch process of
the smart cards in the initialization phase, for the administration or PIN change terminal if the user has
forgotten all of his personal access codes, and so on) are not discussed here. They can harbor
considerable power and are, therefore, prone to attack, which means that they must be protected
accordingly both from a technical and organizational perspective.
Other non-personal, machine-related keys and certificates (for example, for special devices, processes,
network components, SELMA) can also be generated in the PKI and distributed in accordance with
the requirements of the applications and managed in the same way as the component certificates.
4.2
Confidence Model
Certificates are a means of confirming that users (persons or components) and keys belong together
and form the basis of the confidence and trust established between communication partners. For this
reason, the certificates must be mutually recognized by the communication partners. This can be
achieved by means of bilateral agreements or, as is the aim here, by means of global recognition of the
certificates within a self-contained user group that have been issued by the certification authorities
concerned. In the first case, an appropriate bilateral agreement must be concluded between the
communication partners. In the second case, cross-certification must be carried out between the
certification authorities concerned3. The objective here is to reach as few bilateral agreements and as
many multilateral agreements as possible within the framework of the joint declaration between the
associations and its follow-up documents. The concept should, however, be sufficiently open to allow
special relationships between the market participants to be integrated without violating the generally
desired security level.
3
Preference is now given to what are known as bridge concepts. These concepts do away with the need for
cross-certification, which is difficult to implement from an IT perspective, in favor of notification by means of email to the procedure that issued the request. The e-mail then merely confirms that the certificate in question is
trustworthy.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
19
In a multilevel hierarchy, the certification authority itself must possess a certificate from a higher-level
certification authority, which acts as a guarantor for its trustworthiness. This chain of dependencies
ends at the respective root entity (root CA), the trustworthiness of which is inherent. Individual
companies create such a root entity themselves which can be trusted by the other partners when the
security level matches the generally defined level. The root CA as the uppermost root entity of one or
more CAs simplifies organizational changes in a PKI (for example, integration or spin-off of parts of a
company). This advantage outweighs the extra costs involved in an additional license for the CA
product.
‘In Germany, a certification authority can undergo voluntary accreditation in accordance with section
17, paragraph 1 of the Digital Signature Act. It must be issued with a certificate by the German root
entity of the regulatory authority for telecommunications in Mainz4. Suitable stipulations must also be
made for mutual, cross-enterprise validation of association members. With the MAKE variant, crosscertification can be carried out by a technical CA (hub CA) and/or one or more certification service
providers can assume responsibility for this task (BUY variant).
The overall PKI confidence model is based on:

the intention of the PKI operators to proceed accordingly with a view to fulfilling the security
requirements and preventing any security risks,
the verifiability and monitorability of activities and responsibilities (security concept, operational
procedures and standing instructions),
regular supervision and unannounced inspections carried out by the internal auditing division.


Special protection must be provided against any form of attack for all technical components and
communication channels in the PKI. The certificates themselves are not confidential. The directories,
however, do require special protection against manipulation and denial of service.
4.3
The Certificates
The following types of certificate are used in the PKI:



Operational CA certificate
The operational CA certificate is created once before operations start up. Its purpose is to certify
the operational CA (self-certification without root or certified by the root CA).
Holder (user) certificate
Holder (user) certificates are only issued for natural persons.
Component certificate
Component certificates are only issued for network components, processes, and devices. They are
non personal and are used for network security or for SELMA, for example.
4.3.1 Validity Model
The validity model described below only applies to owner (user) certificates. Network certificates
have specific periods of validity that are determined by the respective process or by the person
responsible for network security.
4.3.1.1
Absolute Maximum Validity
Asymmetric, cryptographic keys age. Their security depends on the level of computing power
attained. The higher the level of computing power deployed to crack the key, the more likely it is that
4
The German root entity “RegTP-Root” is the highest certification entity.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
20
the key will be compromised. This is why for example the validity of certificates is limited by the
current German Digital Signature Act. Key material and certificates must be renewed at regular
intervals to ensure that they are secure.
The German Federal Gazette publishes the algorithms and key lengths for the algorithms, which
according to the Digital Signature Act are regarded as secure. The validity periods of the certificates
are, therefore, limited until the end of 2004. The longer keys of the Trust Center CA are valid until the
end of 20075.
4.3.1.2
Relative Maximum Validity
Two interpretation models are used for the validity of a certificate.
(1) In accordance with RFC 1422, the validity of a certificate that has been issued depends on the
validity of the certification path.
In accordance with RFC 1422, a certificate is valid at a defined point in time if:



the holder (user) certificate is valid, and
the certificate of the issuing certification authority is valid, and
all certificates in the path through to the root entity are valid.
(2) In accordance with the German ISIS specification6 (Industrial Specification for an Interoperability
Standard), a certificate that has been issued is valid if:


the holder (user) certificate is valid and if the signing CA was in possession of a valid certificate at
the time the holder (user) certificate was created.
if the certificate of the operational CA expires earlier of it is revoked, the holder (owner)
certificates issued before this remain valid until the end of their defined validity period7.
In situations dictated by corporate policy (for example, spin-offs), the holder (user) certificates should
be revoked and re-issued if the old certificates are the responsibility of majority shareholders.
It is expected that an international agreement on RFC 1422 will be reached by the time the ebIX PKI
is put into operation regarding the validity model to be used.
4.3.2
Certificate Hierarchy
The certificate hierarchy within the individual PKIs of the market participants should contain no more
than three levels (often referred to as a two-level hierarchy (similarly structured)). It refers to
certificates at the following levels:



Root entity
Operational CA certificates
Holder (user) certificates and network certificates/component certificates.
The certificate with the public key of the root entity is a self-certified certificate.
5
These intervals are based on the announcement in the German Federal Gazette no. 213, page 18.638. If
algorithms other than the recommended ones are used in the PKI, the validity period must be specified
accordingly by the CIO.
6
The German ISIS specification was elaborated as part of the SigI specifications (publ.: BSI, specification for
developing interoperable procedures and components according to the Digital Signature Act/Signature
Ordinance). The SigI and ISIS specifications ensure that international interoperability is achieved.
7
From a technical perspective: shell model versus chain model with consequences for vertical interoperability in
accordance with the declaration.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
21
As with the namespace (for example, based on EAN code numbers), this hierarchy should be
implemented by the individual companies.
Several certificates can be created for the operational CA before the PKI is put into operation. If
several certificates are made available to the operational CA, virtual operational CAs can be set up8.
If, during operation, it appears necessary to set up further CAs for companies within the group, these
CAs must be subordinate to the root entity and must conclude an agreement with it. In this agreement,
the operators must declare that they will maintain the same level of security as for the operational
CAs. Adherence to these rules and regulations must be ensured for all market participants as defined
within the general scope of overall responsibility.
4.3.3 Publishing Certificates
All holder (user) certificates used for encryption and, but only where appropriate, for authentication
purposes are published in the corporate directory or repository9; signature certificates are not published
until the owner has given his permission. The certificates in the corporate directory that concern B2B
must be accessible to the entire cross-association PKI user group. Experience has shown that subdifferentiation (who communicates with whom) is not possible and is not consistent with the
confidence model.
Network certificates are only published in the corporate directory/repository if this is necessary for the
associated application.
4.3.4
Cross-Certification
The operational CA can cross-certify with other certification authorities for the purpose of using
certificates beyond the borders of the company PKI. Cross-certification is a commonly-used method
that allows certification authorities to trust and use the certificates of other certification authorities.
The EBIX PKI is a group of company PKIs including public certification service providers whose
validation models are safeguarded by means of cross-certification. The architecture for this is yet to be
defined.
Before cross-certification is carried out, the respective security concepts and Certificate Practice
Statements (CPS) of the other certification authorities must be checked to ensure that the desired level
of security is maintained. Cross-certification must be approved by the CIO. In line with the planned
Business Partner Network in the electricity industry, the internal binding organizational and technical
rules and regulations – insofar as these affect B2B communication relationships – are to be published
in such a way that all market participants involved in the procedure can inspect the rules and
regulations of other participants. Unilateral cross-certification should not be possible.
4.4
Trust Center Service
The Trust Center service is either set up as an internal company service (MAKE) or the services of a
generally accepted certification service provider are engaged (BUY). The CIO is responsible for the
A “virtual” CA is not an independent service component. The certification authority can use several keys and
certificates in order to supply different fields of application with different certificates. In addition to this
flexibility, a further benefit can be identified. If a particular operational CA signature key is compromised, a
non-compromised key together with the associated certificate can be used instead.
9
Network certificates do not normally need to be published. The procedures concerned usually store the network
certificates in their applications.
8
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
22
Trust Center10. The internal Trust Center service is provided by the operational CA together with the
registration authorities.
The Trust Center service performs the following tasks:
 Creates encryption keys centrally and ensures that they are kept in a secure location and can be
restored.
 Creates authentication and signature keys centrally (the service is, however, not responsible for
keeping these keys in a secure location).
 Issues and revokes certificates.
 Publishes certificates.
 Designs the processes and communication interfaces to the local registration authorities.
 Carries out cross-certification with other CAs.
10
The organizational and process structure must be described in the section "PKI Organization“.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
23
5 SMART CARD PERSONALIZATION MODEL
Key material, certificates and the storage media for preserving these must be personalized.
Personalization means being able to uniquely identify the holders or users of key material and
certificates.
Smart cards are used for storing holder (user) key material and certificates for Digital Signature Act
certificates and for security levels classified as high or medium.
The smart cards are obtained from the manufacturer and can, if required, be equipped with all static as
well as optical and electronic features (these are valid for all cards). The tasks to be performed by the
card manufacturer and those to be performed in the PKI will, assuming a common level of security
and interoperability, depend on a number of economic aspects and can be decided upon by the market
participant.
The personalization model incorporates the distribution and management process for key material and
certificates on smart cards. The personalization model generally comprises two levels, namely the prepersonalization level and the personalization level itself.
5.1
Pre-Personalization
The smart cards are prepared by the certification authority. The smart cards are loaded11 with the
asymmetric key pairs from a pregenerated pool of keys or using keys that are generated on an ad-hoc
basis, and are sent to the registration authorities as pre-personalized keys in large batches in line with
plannable local requirements. The cards are then stored in a secure location. This applies in particular
to encryption and authentication keys. Alternatively, a method that is becoming more and more
common involves the signature key pair being generated on the card itself. This means that the
personal key is never separated from the highly secure card.
5.2
Personalization
The personalization process for the individual cards is carried out in the local registration authority
(LRA) in the presence of the holder12. A certificate request is sent to the operational CA where the
certificates for the users are created and then returned to the smart card at the registration authority.
The CA also sends a letter containing the PIN directly to the user. The user is identified at the
registration authority and the smart card is issued in accordance with the requirements of the Digital
Signature Act (unique assignment of the signature key to a natural person). An important prerequisite
for using a smart card is possession of the card and receipt of the letter containing the PIN.
If the smart card is to be used as a multifunctional plant ID card, it must be configured so that it can
accommodate additional information regarding plant security, and so on. The contactless chip (for
example, “Legic” or “Mifare”) on the plant ID card must also be personalized. The personalization
process is performed in one single step. This ensures that the holder data is consistent.
5.3
Initial Supply of Smart Cards During the Implementation Phase
If large quantities13 of smart cards are to be personalized at once for the initial supply of cards at the
individual locations, the procedure is as follows:
11
The cards do not have to be pre-loaded with key material. Key material can also be generated on the smart
cards locally by the registration authority.
12
If a large number of smart cards have to be personalized, this can be carried out centrally by means of batch
processing. The cards are then issued to the user ready personalized. PIN letters are sent to the users separately.
13
For example, batches of more than 10,000 cards.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
24
The cards are initialized and personalized with all the holder-specific data centrally. The key material
and certificates are then created. In order to prevent misuse, the cards are handed over to the local
registration authority using a secure means. The holders collect their cards from the LRA. During this
process, the holders are identified personally. The PIN letters are delivered by means of a different
trustworthy channel.
5.4
Key Generation on the Smart Card
If signature keys are to be generated locally on the smart card and certified centrally, the procedure is
basically the same with the exception that key generation must be initiated before certification is
carried out. The public key is exported via a secure channel and certified by the CA. PKCS#10
Request has proven suitable as a protocol for this purpose.
5.5
Post-Personalization
In special cases and for certain types of data, it may be necessary to subsequently overwrite and/or
recreate memory areas on the smart card. Situations may also arise in which existing cards are to be
used for additional purposes. The post-personalization concept can, however, not be elaborated until
relevant experience has been gathered within the framework of the Business Partner Network or
individual requirements are specified by the market participants. The card-specific authentication key
is particularly important here with regard to upwards compatibility and offers an inexpensive means of
protecting smart card data if post-personalization is carried out. This process is now supported by all
major vendors irrespective of the card operating system used. Protection is provided in particular for
the identifier, or in other words, the technically unique name of the holder which should be stored in
read-only format outside the certificate in a protected area of the card. The importance of this process
from an economic perspective warrants a closer look at a number of additional technical aspects.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
25
6 PKI ORGANIZATION
6.1
Purpose and Objective
This section is used to describe the tasks of the individual organizational units and distinguish them
from each other in order to create task specifications. These can then be used as requirements catalogs
for the organizational units themselves or for service contracts that are to be concluded.
Service descriptions are provided by the relevant persons responsible for the organizational units.
They specify the services an organizational unit is to provide along with the required level of quality
in order to perform the defined PKI tasks and to ensure smooth operation. This will, in certain cases,
be of interest to all market participants involved in the procedure (for example, guaranteed minimum
times for revocation service). As already mentioned, the market participants should not be forced to
adopt a standard organizational model. Within the framework of the company PKIs, only
organizational units of all partners involved in joint security mechanisms are required without which it
would not be possible to attain this level of security within the overall network of the ebIX PKI.
6.2
Organizational Units From an Overall Perspective
From an operational perspective, the “PKI” system comprises various PKI organizational units14 and
the levels at which they interact. The organizational units are either part of the central company
organization or companies within the group, or the services they provide are outsourced to external
service providers. Due to the different responsibilities involved, the tasks of the organizational units
must be clearly defined and distinguished from each other. From an organizational perspective, the
PKI system extends across the entire company even if isolated technical applications, such as e-mail
and EDI, are initially integrated. The participating organizational units can reside within the company
or within different companies in the group whereby a consistent namespace is maintained15.
Two company services are crucial for the PKI to function correctly:
The Trust Center service and a publication service, which can be based on a corporate directory16.
The Trust Center performs the following:
 Creates keys in its key generation component (KG),
 Creates certificates in its certification component (CA),
 Archives keys in its key archive component (CA),
 Manages smart cards across the entire life cycle of the certificates
The certification authority provides the following service:
The certification authority17 operates a root entity which acts as the source of trustworthiness. The goal
of the certification authority is to cross-certify with other root entities to create a network of
confidence and to associate a level of trustworthiness with the certificates that goes beyond company
borders.
The company-wide PKI comprises the following organizational units:
14
The organizational units in the PKI must be equipped with personnel, materials and equipment so that they can
carry out their assigned tasks. The heads of the organizational units are responsible for services to be provided.
15
Outsourcing individual PKI services to external service providers is optional.
16
The corporate directory is not described in any further detail in this concept. The corporate directory has an
auxiliary function in the PKI. It is run outside the PKI but must provide the directory service for the PKI.
17
Secondary certification authorities can also be set up in the group companies. This should not be considered,
however, until sufficient experience has been gathered using the central company solution.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector



26
PKI division
Certification authority
Registration authorities
and the service component

Publication service
The CIO and the PKI Division
The Corporate Information Officer (CIO) or a similar organizational unit assumes overall
responsibility for security in the PKI system.
The PKI division is the unit responsible for planning and controlling. It is authorized to issue
directives to the PKI organizational units with regard to all fundamental and security-relevant aspects
of the PKI within the scope of the functional responsibility of the CIO and on his behalf. The CIO
implements the security concept for the PKI, plans and controls the development and sequence of
activities involved in the individual services, where appropriate concludes service agreements with
internal or external service providers and establishes external relationships.
It must be possible to justify other organizational forms implemented by the market participants which
should attain the same organizational level of security.
Operational CA & Reg. Authority
Registration authority
remote
(many)
Firewall
Certification authority
Certificate
Smart card
management
Holder
Documentary
evidence verifying
identity
ebIX
Application for
certification
Corporate
directory
Certificate
directory
CRL
Key
generation
Time stamp
service
Certificate
generation
Key archive
Cert.
Operational CA
May 16, 2006
Technical PKI interoperability in the European energy sector
6.3
27
Certification Authority
The certification authority is an organizational unit within the PKI. It performs the following
functions:




Root entity
Operational CA
Smart card management (particularly certificate related)
Time stamp service (optional)
The certification authority is supervised by the CIO. It is the highest confidence-building authority in
the PKI in the functional certification and key management processes.
The head of the authority is responsible for the availability of the operational CA and for the
trustworthiness of the certificates issued.
Only trustworthy personnel with the appropriate expertise and training are deployed in the certification
authority.
6.3.1
Operational CA
The operational CA is accommodated in a specially protected infrastructure. It comprises the service
components:



Certification Authority (CA)
Key Generator (KG)
Key Archive (KA)
6.3.1.1
Certification Authority (CA)
General overview of tasks
The technical/organizational/physical environment in which certificates are issued is referred to an
operational CA (also known as a Trust Center service). The technical unit responsible from a
cryptological perspective for certifying public keys in accordance with the rules and regulations is
called a CA.
Certificates are issued by the operational CA only. It uses its CA for this purpose. The CA is automatic
and unattended.
The CA signs the certificates with the private key of the operational CA and creates the associated
PSEs. The certification authority also creates the component key material and provides the component
certificates.
Details of tasks performed
The private keys used by the certification authority enjoy special protection and may only be used for
certification purposes.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
28
Key and certificate changes are necessary if there is reasonable suspicion that a certification authority
key has been compromised. In this case, the certificate18 in question must be revoked immediately.
The head of the certification authority decides whether operational CA certificates are revoked. The
relevant publication obligations within the EBIX PKI must be implemented. If a large number of
participants who run their own CAs is involved, Authority Revocation Lists (ARLs) must be provided.
The protocol and structure are now standardized. (When a CA key is compromised, however, this is
equivalent to an IT disaster of considerable consequence because all the keys issued by this CA are
invalid. The fall-back scenario is usually paper based. This IT disaster should be taken into account in
the company disaster manual).
The certification authority regularly monitors the validity of all the holder (user) certificates it issues19.
It creates a new key in good time before the normal validity period of a holder (user) certificate
expires, informs the holders concerned that the validity period is about to expire, and requests them to
contact a registration authority in good time so that new keys and certificates can be applied for. The
validity periods of certificates can overlap for a limited amount of time.
Validity monitoring mechanisms that are specifically process related must be specified for component
certificates.
Holder (user) certificates can, in principle, also be issued for business partners.
This should be initiated by a manager with the appropriate authorization.
An attribute in the certificate must indicate whether the holder is a member of staff or an external
holder.
Business partner certificates are basically the same as holder (user) certificates. The rules and
processes of the PKI apply. Other than publication of the certificates, no further disclosure duty is
defined.
Keys that have been generated by business partners themselves can be certified if they fulfill the
security requirements of the PKI Policy20. The decision regarding this is made by the CIO.
List of tasks performed by the CA
(1) Processes the requirements for key material
 Initiates key material generation in the key generation component
 Processes the certificate requirements
 Assigns the key material to the holder data (certificate creation)
 Creates the PSE
 Creates the PIN / super PIN
 Issues the PSE to the registration authority (RA)
 Creates the PIN letter and sends it to the certificate holder
 Enters the certificates in the corporate directory
 Initiates key archiving (KA)
(2) Processes the requirements for certificate revocation
18
Whether or not all certificates issued previously become invalid depends on which validity model has been
standardized on an international level. See Section 3.3.1 Validity Model
19
An appropriate requirement and suitable procedure for monitoring the certificates must be specified.
20
Whether or not key material generated by business partners has to be archived has yet to be specified. If it
does have to be archived, an appropriate agreement must be reached with the business partners in question.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector




29
Receives the revocation application and applicant identity and records these in line auditing
requirements
Creates the updated certificate revocation list
Transfers the certificate revocation list to the corporate directory
Initiates archiving of the certificate revocation list (KA)
6.3.1.2
Key Generation (KG)
Tasks
All key material to be generated centrally21 is generated in the KG component. When key pairs are
created, particular importance is attached to the cryptographic quality of the keys, especially with
regard to the random number generator, which should generate real and not pseudo random numbers22.
Duplicates of public keys are recognized as such and are discarded together with their private keys23.
Generating signature key material
The operational CA initiates generation of the keys for electronic signatures on the smart cards.
6.3.1.3
Key Archive (KA)24
Tasks of KA
The key archive (KA) stores keys and certificates on permanent long-term media. It is also used for
key recovery.
In the PKI, all encryption keys are archived to ensure that company data stored in encrypted form can
be accessed if this is required by the relevant authorities, if an internal audit is performed or in other
cases.
If applicable, legally prescribed minimum archiving periods must be observed.
Details of KA tasks
In the key archive, access to the stored keys and certificates can be provided at several levels:
More recent key material and certificates can be accessed more quickly; older key material and
certificates can, in certain cases, only be accessed once the appropriate organizational preparations
have been made.
The key archive can also be used to restore key material in cases where a holder has inadvertently (the
key has not been compromised) destroyed his keys (for example, a smart card is rendered useless as a
result of external mechanical influence). In general, encrypted data belongs to the company and not
the employee. A key archive for the encryption keys or card-specific keys is, therefore, recommended.
A signature must always be provided by the signature key holder irrespective of whether or not he is
authorized to do so. Care must be taken when signature keys for advanced signatures are restored. This
is not allowed for qualified signatures.
21
This includes key material for network users.
The conditions and recommendations in the German Federal Gazette no. 213, page 18.638 (or the relevant
valid official publication) must be taken into account.
23
Preventing duplicates of public keys is necessary because a duplicated public key means that the associated
private key is also duplicated. This function can only be provided within the sphere of confidence.
24
In countries where key archiving is not legally permitted, local legislation must be observed.
22
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
30
A high level of operational security and maximum long-term protection are important factors to be
taken into account for the purpose of setting up and operating a key archive.
The rules and restrictions for operating the key archive and for accessing and managing the archive
should be specified in a special archiving concept by the market participant in question25.
Tasks of KA





Archive the holder (user) certificates and key material with appropriate reference to the holder
Archive the component certificates and key material with appropriate reference to the user
components
Restore key material under conditions that must be defined in detail
Ensure long-term archiving and availability
Monitor expiry of the validity period of the certificates issued and initiate recertification in good
time
6.3.2
Smart Card Management Service (Optional)
This section only discusses high and medium security levels in conjunction with smart cards. Similar
requirements apply for low and, where appropriate, medium security levels with soft tokens (soft
PSEs).
The smart card management service comprises the personalization system and smart card
administration system. The smart card management service personalizes and manages operation of the
smart cards. The smart card administration system manages the entire life cycle of a smart card. The
personalization system supports either the


single-stage initialization and personalization process or a
multi-stage process.
In the case of the single-stage process, the smart cards are initialized and personalized centrally. In the
case of the multi-stage process, the various actions can be divided up among and configured by the
certification and registration authorities.
The single-stage process can be necessary during the implementation phase if large quantities of smart
cards need to personalized and issued to the holders at short notice. The multi-stage process is used
during ongoing operations if individual smart cards have to be personalized for new employees even if
the key material that complies with the Digital Signature Act is to be generated on the holder (user)
smart cards.
The personalization system works together with the smart card administration system.
Secure messaging is used for communicating with the certification authority, that is, sensitive
certification data and, where appropriate, key material is provided with full cryptographic protection
from the source equipment right through to the target equipment.
The smart card administration system uses standard database mechanisms and can, as a result, manage
the smart cards issued and their associated holder data in any combination.
In remote mode, the registration authorities use the PKCS#10 protocol for certification applications.
25
Specifications will be drawn up at a later point in time and separately from the specifications for the PKI
Policy.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
6.3.3
31
Time Stamp Service
A time stamp service is optional because certification service providers are now active on the market
where they have to offer this service publicly to each participant.
Participants are, however, recommended to set up their own time stamp service because each legally
relevant signing process (this includes all the certificates created) must be safeguarded by a time stamp
so that in the event of the CA certification key being compromised, all the certificates issued prior to
the CA certificate being revoked remain valid.
There is currently only one product on the market26 that is certified to the Digital Signature Act/Digital
Signature Ordinance and can be deployed. If a time stamp service is integrated:



The maximum permitted downtime can be regulated within appropriate service level agreements;
as a general rule, this should be less than three hours
The normal response time27 should, where possible, not exceed one minute.
The response time for creating a time stamp28 must not exceed ten minutes.
Separate signature keys are used for the time stamp service in order to provide sufficient security
should a CA certification key be compromised.
The time stamp service is available to all applications throughout the user group.
6.4
Registration Authority
The registration authorities are entities within the PKI system and are run by the respective group
companies or the accredited certification service provider. The registration authorities (RAs) are
supervised by the certification authority and the CIO.
Registration authorities represent the interface to the certification authority. They are set up locally
near the certificate holders and future holders.
The registration authorities check and document in a trustworthy manner that conforms with auditing
requirements the identities of the persons who apply for and are issued with key material and holder
(user) certificates.
Unique identification of the holder is an important cornerstone of trustworthiness throughout the entire
PKI. The head of the registration authority is responsible for reliably establishing the identity of the
applicants.
Only trustworthy personnel with the appropriate expertise and training are deployed in the registration
authorities29.
Tasks of RA
The registration authorities receive the applications for holder (user) certificates and supply the
applicants with the PSEs on the smart cards30.
26
TSS developed by Timeproof, Hamburg. No other product is known (as at 2002-04-29).
The time within which the time stamp is sent back to the participant.
28
The time within which the time stamp is created.
29
This task can also be carried out by the department in plant security responsible for employee identification.
30
PSEs should only be issued on diskettes (soft PSEs) in exceptional cases.
27
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
32
The registration authorities manage the pre-personalized smart cards submitted to them and keep them
in a safe place.
The registration authorities keep a record of the pre-personalized smart cards and the personalized
smart cards issued in a special smart card administration system.
The registration authority forwards the certification requests with the holder data to the certification
authority31. The communication channel to the operational CA is set up as a secure connection due to
special protection required for the holder data.
PSEs being sent from the operational CA to a registration authority are protected in such a way that
employees of the registration authority cannot access the content of the PSE, thus ensuring that the
confidentiality of the key material is maintained. (end-to-end security between the CA and smart card).
The registration authorities can also issue replacement smart cards that are limited in terms of
functionality and for a specific period of time to persons who have forgotten their personal smart cards
or do not have them at hand32.
The registration authority is supported by a special PKI service component, namely the smart card
issue component.
In the following graphic, the medium level registration process refers to advanced certificates being
issued at a high security level within a company PKI. This process differs from the registration process
that complies with the Digital Signature Act (high level) in that the latter requires a personal
document. Even with a low level process (for example, soft token), identity validation and a separate
channel for supplying the PIN/PUK must be ensured.
31
In the case of signature keys being generated locally on smart cards, the process for generating the keys on the
smart cards is initiated by the registration authorities followed by the certification process which is initiated by
the operational CA. The smart card which is in the care of the holder is “post-personalized” with the signature
certificate.
32
Registration authorities can also issue visitor cards.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
33
It is recommended that the registration process (one of the most vulnerable parts of the process in a
PKI from an organizational perspective) is based on the requirements mapped. Including a supervisor
in the process for issuing certificates is an optional dual control measure.
The Smart Card Issue Component
The smart card issue component is the tool used by the registration authority. This workplace
environment is set up with the necessary protection. The applicant and holder do not have direct
access to the smart card issue component33.
The smart card issue component comprises the following (at least):
A workstation computer on which the local registration authority software and the smart card
personalization and administration software is installed
A component for communicating securely with the operational CA
A smart card reader for the administrator smart card
A card printer (optional)34 that can write optical and electronic data to the holder (user) smart card to
be personalized
33
It is yet to be clarified how the smart card issue component can interact with the issue component for plant
security IDs (in future, multifunctional employee identity cards).
34
If a card printer is not available, just electronic data can be written to the smart cards using the smart card
reader.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
34
Smart Card Issue Component
• Workstation computer
•LRA software
•Two smart card readers
• Optional: card printer
•Pre-personalized smart cards
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
35
7 CORPORATE DIRECTORY
The corporate directory is a component outside the PKI. It must store and publish at least part of the
certificate directory and revocation list and supply them to the applications. Publish in this case means
making the necessary subset of information accessible to potentially relevant external communication
partners (for example, all market participants) required proactively for encryption and reactively for
signature verification. IP addresses or domain names can be used to restrict the circle of users to a
closed user group. Provision of this service must be agreed upon with the department responsible for
the corporate directory. Creating a corporate directory in conjunction with a PKI is recommended but
not essential. It is sufficient if a repository is set up in front of the company firewall that can be
accessed with the LDAP protocol. The appropriate ports must be opened and safeguarded for this
purpose. One alternative would be to set up http access to the repository data, which is usually
converted internally to LDAP access.
The certificates and revocation list must be made available to the applications so that the relevant
inspections can be performed. This service must be set up on a 24-hour basis and be accessible to all
users involved in the PKI. The certificates are stored and managed in X.509 format (version 3).
Repository Information is made Available from the
Directory by means of Shadowing or Chaining
Variant 1: Shadowing Þ All data copied locally
DIR server 1
Variant 2: Chaining Þ Distributed data storage
DIR server 2
DIR server 2
DIR server 1
Data copy
Link
Network
Network
Admin.
Admin.
Users
Admin.
Users
Users
• Central administration
• Periodic shadowing (automat. copy)
• Deployed in central organizational units
Original data
Users
• Local administration
• Distributed directory (log. 1 directory from
perspective of end user)
• Deployed in local organizational units;
predominantly local data is accessed
Data copy or data link
Only the operational CA is permitted to enter and, where appropriate, change or delete certificates and
revocation lists in the corporate directory.
The standardized LDAP protocol is used for access purposes. Access via the Online Certificate Status
Protocol (OCSP) can be set up if required.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
36
The PKI uses the person-specific entries as a reference when the certificates are created. The directory
service must, therefore, ensure that the data is consistent. The term repository is often used for the
PKI-relevant data subset.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
37
Appendix A REQUIREMENTS IN TABLE FORM
A.1 General Requirements
1.
2.
3.
4.
5.
Particularly in the case of electronic signatures, the PKI follows the line of the requirements
specified in European Digital Signature legislation; that is, the signature key is at the disposal of
the key holder only and a signature can, therefore, be uniquely assigned to a natural person. In
the case of advanced certificates, this refers to organizational measures for protection and
processing signature keys and certificates irrespective of the security token. Mass signatures
continue to be possible.
Organizational, IT and constructional measures shall ensure that misuse of the processes and
unauthorized access to sensitive information is, for the most part, ruled out. Authorizations shall
be restricted to a minimum. The principle of dual control shall apply for particularly sensitive
functions.
An upper limit for response times and a minimum availability of the PKI services shall be
defined with respect to the external market participants. Internally, any differences shall be
justifiable and definable.
Secure encryption methods shall be used as of the outset. RSA keys must be at least 1024 bits
long, symmetric keys at least 112 bits, and keys based on elliptical curves, for example for
SELMA, at least 160 bits. In Germany, for example, the specifications of the BSI in the German
Federal Gazette apply.
The usual standards shall be observed for the purpose of creating, distributing and using
keys/certificates. The technical details of these are described in a follow-up document
(Certification Practice Statement).
A.2 PKI Component Organization
1.
2.
3.
4.
5.
Exactly one central unit (with backup) that assumes the role of the Trust Center should be set up
for a market participant with its own CA. The Trust Center functions include generating all the
necessary asymmetric keys, initializing (pre-personalization) the smart cards (if used) and, if
requested by an RA, certifying the public keys.
RAs can be set up at the company sites. The tasks of the RAs include requesting certificates
from the CA as part of the smart card personalization process, identifying smart card recipients
and reliably issuing smart cards.
Communication between the RAs and CA must be secure to prevent abuse. All activities carried
out in the CA and RAs relevant to security must be logged in such a way that the time at which
they were carried out and the person that carried them out (documented by means of a signature)
are clearly indicated.
Certificates are transferred automatically to an LDAP directory (see Creating/Storing
Keys/Certificates for further requirements). An OCSP service is provided where appropriate in
order to check the validity of certificates. Detailed provisions are specified in the CPS.
In the event of a disaster in the PKI central unit, backup PKI services must be available. The
availability requirements should be fulfilled in these cases too.
A.3 Creating/Storing Keys/Certificates
1.
ebIX
The PKI is used to create keys and certificates for persons (employees) and processes within the
company. Keys and certificates can also be created for the employees and processes of business
partners providing a business relationship exists with the company. The company does not
establish itself as a public Trust Center on the market as this would afford it a special status
among the market participants.
May 16, 2006
Technical PKI interoperability in the European energy sector
2.
3.
4.
5.
6.
7
8.
9.
10.
11.
12.
13.
14.
15.
38
Keys for smart cards are generated on the cards themselves unless other technical requirements
have to be taken into account (for example, with regard to key storage; see below). Signature
keys should always be generated on the cards.
Keys and certificates generated for persons are usually stored on smart cards
which are then handed over to the user. No particular form is preferred for handing over keys
and certificates created for processes.
Keys and certificates that can be used for digital signatures must not be used for other purposes.
Secret signature keys should only be stored on secure data carriers (smart cards or secure
hardware modules) and should not be reproducible. This also applies to the keys for Trust
Center functions.
In the case of smart cards containing signature keys and certificates, the cards and PIN letters
must be created and distributed in such a way that parties other than the CA and end user (and
assuming that malpractice on their part is ruled out), not even an RA, is able to use the smart
card of another user.
PIN letters for smart cards with signature keys are created by the CA and are sent directly to the
user. They are enveloped in such a way that the contents can, under no circumstances, be
inferred from the outside.
If a user requires a smart card at short notice, it must be possible for a card to be personalized
and the PIN generated by an RA. These “emergency” cards contain authentication key material
only and must not contain a signature key.
The validity of certificates for employees and processes is limited to three years. The certificates
can, if necessary, be revoked before the validity period expires.
The validity of certificates for the CA functions is limited to five years. The certificates can, if
necessary, be revoked before the validity period expires.
If an employee leaves the company, all the certificates created for the employee to be able to
carry out his work are revoked immediately. This also applies if an employee of a business
partner leaves the company.
A certificate that has been revoked cannot be reinstated. Advanced certificates can be suspended
for a set time under specially defined conditions.
Certificates for employees of the company should not become invalid solely as a result of the
employees’ function, position within the organizational structure or location changing. The
name of a certificate holder should only be supplemented by a non-informative designation to
render the name unique.
In the case of secret keys that are used for storing data/documents in encrypted form,
mechanisms for storing them securely and restoring them can be provided. If secret keys are
stored, they cannot be generated on the smart cards. The procedure and authorizations for
restoring keys must be specified by the market participant or on his behalf.
The certificates are published in an LDAP directory. Detailed provisions are specified in the
CPS. Signature certificates can only be published (internally or externally) subject to national
legislation and, even then, only with the approval of the certificate holder (e. g. German Digital
Signature Act).
Due to the fact that the certificates are published, they must not contain any data, which if
published, violates the regulations of the Federal Data Protection Act. The certificates must, in
particular, not contain information assigned by the employer, for example personnel numbers or
organizational details.
A.4 Processing Keys in Client Software
To ensure that the key storage mechanisms are independent of the encryption programs, the
cryptographic functions shall be accessed by the client software via the PKCS#11 or Microsoft CSP
interface. Encryption program here refers to the signature function.
A.5 Cost Allocation
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
39
Certificates and/or smart cards can be allocated (at least within the company) in accordance with an
appropriate allocation method. No “external” costs are incurred for the market participants. Each party
establishes its own infrastructure in line with the requirements for security and interoperability and
bears the costs for this. Specific agreements may however be necessary for access to CRLs and/or
OCSP.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
40
Appendix B SUMMARY OF REQUIREMENTS FOR PERSONALIZATION
The following should also be possible in addition to smart cards being created and personalized
centrally by means of batch processing:
B.1 Central Card Initialization (Pre-Personalization)
1.
2.
3.
4.
5.
6.
Cards are initialized by the CA.
Each card is assigned a unique card number, which is also printed on the
card. If data for a card is to be stored at the CA, it shall be possible to locate it
using the card number.
The key pairs for signing and identification purposes are generated on the
card itself.
The key pair for data encryption is generated by the CA software or separate
hardware and is transferred to the card. The secret key is archived safely with
the card number.
Additional data (for example, for SSO) is generated at the CA, loaded to the
card and stored in a secure location. The data must be stored on the
mainframe or in such a way that the mainframe can access it by means of a
secure channel.
A transport PIN is created and stored in a secure location.
B.2 Sending the Initialized Cards to the LRAs (Where Appropriate with the Transport
PINs)
To be specified
B.3 Card Personalization at an LRA
1.
2.
The LRA informs the CA of the person the card is assigned to.
The LRA requests the certificates for the user for the public keys on the card.
B.4 Automatic Activities at the CA due to Card Personalization (Without Intervention
of a CA Operator)
1.
2.
3.
A certification request made by an LRA is processed. The certificates are stored in a directory
and transferred to the card by means of a secure channel. The data transferred to the card should
be encrypted by the CA and then not decrypted until it is on the card.
When a card is assigned to a user, a user PIN is generated and transferred to the card by means
of a secure channel. A PIN letter is also sent to the user. The Digital Signature Act specifies that
a PIN must contain 6 digits. PUKs should also be permissible.
The data stored under the card number is assigned to the person in question. An external process
is initiated with which further activities can be carried out for the user.
B.5 Card Application Procedure
1.
ebIX
Alternative 1: The user completes an application form and takes it to the LRA.
a)
The user identifies himself to the LRA.
b)
He confirms that the information on the application form is correct.
c)
The LRA operator personalizes a card on the basis of the information provided and issues
it to the user. The user provides his signature confirming that he has received the card.
d)
As a result of the personalization process, the CA sends a PIN letter to the user. The user
can then use the card once he has received the PIN.
May 16, 2006
Technical PKI interoperability in the European energy sector
41
2.
Alternative 2: The user sends the application data to the LRA in advance.
a)
The user completes a written or electronic application form and sends it to the LRA.
b)
The LRA operator personalizes a card on the basis of the information provided.
c)
As a result of the personalization process, the CA sends a PIN letter to the user.
d)
The user goes to the LRA (at which point he may have already received the PIN letter)
and identifies himself.
e)
He confirms in writing that the data provided is correct.
f)
The LRA hands over the card to the user. The user provides his signature confirming that
he has received the card.
The user can then use the card once he has received the PIN.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
42
Appendix C SUMMARY OF REQUIREMENTS FOR DIRECTORY/REPOSITORY
C.1 Requirements Regarding Validation
1.
2.
3.
It must be possible to find the certificate of a user on the basis of the user's name and
organizational details (name, physical name or Distinguished Name (DN), group company,
location, telephone number, e-mail address, and so on).
It must be possible to determine the user of a signature certificate.
A certificate shall not contain any organizational details to ensure that the certificate remains
valid if the employee is relocated within the company. The physical components of a name
should remain unique for at least 100 years.
C.2 Solution Proposal
1.
2.
3.
4.
5.
6.
The unique path of the user is entered in a directory tree. The path comprises the organizational
and/or local assignment of the user. The user can be found on the basis of this information when
a search is carried out.
The user data contains the certificates assigned to that user. A user can have several certificates
for different purposes or several certificates for the same purpose, of which only one is (still)
valid.
The DN of the certificates comprises the last and first name of the user and a unique noninformative number as a global ID which is valid for at least 100 years. Further provisions are
specified in the recommendations for the certificate content.
If the user’s organizational assignment or name changes, the same unique number is retained. It
identifies the user permanently and uniquely.
The process by which the number is assigned to the user still has to be elaborated. Companies
are distinguished from each other by means of an appropriate unique code number, e. g. GLN.
Lifetime e-mail addresses are being used to an ever increasing extent by companies.
The user data in the directory tree also contains the unique number enabling a link to be
established between the certificates and user.
C.3 Other Aspects
1.
2.
3.
4.
ebIX
If the personalization data does not contain a unique number when a certificate is created, a
search is made for it in the user entry in the directory tree. A decision must be made in advance
as to how a new number is to be assigned if a number has not been entered here either.
The recommendation regarding "vertical interoperability" in the declaration implies that
advanced and qualified signatures are upwards compatible (incl. provider accreditation in
accordance with section 17 of the Digital Signature Act). From a technical perspective, this
means that validation is carried out in accordance with the chain model as prescribed in the
Digital Signature Act. Suitable organizational provisions should be made to counteract
undesirable consequences (for example, as a result of company take-overs). The restrictions to
be observed in accordance with the Digital Signature Act for certificates being read by other
(unspecified) users must also be clarified. Provisions that conform with the Data Protection Act
must also be agreed upon for circulating certificates that are restricted with regard to publication
(if the market participants are further segmented) outside the target group.
It must be possible for the procedure to function with several CA keys (because, for example,
CA keys are valid for a limited period of time and new keys have to be created on a regular
basis). Only the CA is permitted to enter and change certificates and the unique user numbers.
The subset of employee data required for publication can be placed in a repository from an
X.500 entry that exists in practically all standard corporate directories by means of shadowing
mechanisms. Cross-certification would then use chaining mechanisms to mirror the contents for
the cross-certified partner in the partner’s repository.
May 16, 2006
Technical PKI interoperability in the European energy sector
ebIX
43
May 16, 2006
Technical PKI interoperability in the European energy sector
44
Appendix D NOTE ON POST-PERSONALIZATION
The following procedure is recommended for subsequent personalization steps which do not involve a
change of key material:
The identifier is written to the secure area of the card.
The identifier is the technically unique name of the card holder and is included in the certificate. The
link established by the identifier between the card and card holder is as unique as the link that must be
established between the key to be certified and the card holder. The identifier must be stored
temporarily in a secure location because it must be possible for the certificate to change without the
signature key pair changing (UPDATE NEV).
Recertification and other post-personalization activities are carried out at a separate location and at a
separate time.
They should, however, include the following steps:
The public key of the signature application (PK.CH.DS) is read from the card (and not from a directory
where it is stored).
PK.CH.DS is overwritten by the card-specific authentication key SK.ICC.AUT.
The identifier is read from the card (and not from a directory where it is stored).
The identifier is also overwritten by the card-specific authentication key SK.ICC.AUT and is,
therefore, cryptographically secure.
Both are transferred to the Trust Center by means of a secure channel.
The Trust Center provides a signature to confirm the link between the identifier and public key.
This can be carried out in a technically non-secure environment (without secure messaging) when the
data identifier and public key on the card have been signed using the certificate specific to the card
itself. This can take place individually or by means of a PKCS#10 request that is signed by the
authentication key.
Technical verification of the:


card origin of the public signature key
the relationship between the identifier and public key
can be performed in the Trust Center.
The card signature is an efficient means of ensuring that this is carried out securely.
Organizational verification of the card holder (technical name) together with the identity is carried out
at the registration authority by means of a personal document and is confirmed by the digital signature
of the registration officer.
In this process, the technical name plays a key role because it is a joint means of identification for both
data versions (before and after post-personalization).
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
45
The signature interoperability specifications, however, require the use of Distinguished Names that
can be deployed in a public legal framework (see SigI, Appendix I (Certificates), page 24 ff).
Using proprietary identifiers alone is, therefore, not recommended when considered from a migratory
perspective.
Because the identifier links both certificate policies and because the card itself is used to
cryptographically safeguard the link between the card origin and public key of the signature,
expensive business terminals should, therefore, not be necessary in the registration process.
Activities such as resetting the maloperation counter could then be carried out on a small number of
administration terminals with security modules and secure messaging.
This procedure ensures that future applications can be supported in a cost effective and reliable
manner without now having to plan all of these applications explicitly in the form of predefined card
structures.
The only requirement here that applies to all manufacturers is that the identifier and the authentication
key associated with the unique card identity are stored separately.
ebIX
May 16, 2006
Technical PKI interoperability in the European energy sector
46
Appendix E GLOSSARY
Archiving (digitally signed
documents)
Asymmetric cryptography
Authentication
Bridge CA
BSI
Business terminal
ebIX
Archiving is defined by law in different ways. Examples from
Germany:
The generally accepted principles of computerized accounting
(GoBS) of November 7, 1995 - IV A 8 - S 0316 - 52/95- Federal
Tax Gazette 1995 I page 738 specify the procedural documentation
and also apply for qualified electronic signatures and separation of
form and content. See also the principles for data access and
verifiability of digital documents (GDPdU) in which requirements
for the purpose of tax audits are explicitly defined.
See also section 257 of the German Commercial Code with regard
to WORM archiving.
Further (technical) consequences are currently being defined.
A mathematical data encryption procedure in which two different
mathematically related keys are used to encrypt and decrypt data.
Normally used in 2 different contexts:
User authentication
Users authenticate themselves vis-à-vis an application. The
signature key should not be used for this purpose because this
should (or must in accordance with the Digital Signature Act) be
reserved for the signing process.
Component authentication
Card-specific authentication key safeguards communication
between the card and the outside world, for example via secure
messaging.
Deutsche Bank and Deutsche Telekom founded the Bridge CA in
October 2000. The operator is TeleTrusT Germany. The Bridge CA
is neutral, international, spans all industries and is not profit
oriented. It enables all its members to exchange e-mails securely
with each other. The rules that govern its activities were defined
within the framework of a public/private partnership. In order to win
public confidence in the Bridge CA, an independent advisory board
comprising experts from trade and industry, management and the
scientific world is being set up to carry out supervisory duties.
Bridge CA is under the patronage of the German Minister of the
Interior and serves as a basis for secure e-government as part of the
“BundOnline2005” initiative of the Federal Government.
www.bridge-ca.org
The work carried out by Federal Office for Information Security
(BSI) on behalf of the German regulatory authority for
telecommunication and postal services (RegTP) involves defining
requirements for qualified electronic signatures.
Most important documents:
Catalog of measures for digital signatures, November 18, 1997.
Signature interoperability specifications (e.g. Section 1 Certificates;
Section 2 Signature; Section 3 User Infrastructure; Section 4, Time
Stamp, and so on).
All documents are available at www.bsi.bund.de, many in English.
Signature creation device in a public (that is, not private or
company) environment which must authenticate itself vis-à-vis a
smart card which, in turn, must authenticate itself vis-à-vis a
terminal before a signing process can be carried out. This procedure
May 16, 2006
Technical PKI interoperability in the European energy sector
CA
Certificate
Certificate user, relying
party, recipient, verifier
Chip card
Corporate directory
CRL
Crypto algorithm
ebIX
47
is called component authentication, and the communication that
takes place secure messaging. The business terminal is equipped
with a security module and a 2-row display for a user-specific
display message for checking the process. The process is described
in DIN 17.4 and has been included in the signature application by
the ZKA; see:
sg_ve07 Signaturanwendung V07, status: 180301.doc
Certification Authority: entity that establishes a link between a
public key and a user in the form of a certificate and certifies this
with its own digital signature.
According to the German Digital Signature Act, the following
certification authorities (including spin-offs) have been accredited
(since the start of 2002):
TeleSec Product Center of Deutsche Telekom AG, Netphen
Deutsche Post eBusiness GmbH (formerly Signtrust), Bonn
DATEV eG, Nuremberg
Chamber of German Tax Advisors, Nuremberg
Medizon AG, Berlin
Chamber of German Tax Advisors, Saarland, Saarbrücken
Hanseatic Chamber of Tax Advisors, Bremen
Federal Association of Notaries, Cologne
TCTrustcenter, Hamburg
A certificate is an electronic identifier containing a signature that
was created by a certification authority with a private key. The
authenticity of the key is checked by the recipient. The term
“certificate” is defined as follows in the Digital Signature Act:
Within the meaning of the Digital Signature Act, a certificate is a
digital attestation with a digital signature confirming that a public
signature key is assigned to a natural person (signature key
certificate) or a special digital attestation that contains further
information with unique reference to a signature key certificate
(attribute certificate).
The structure of certificates that comply with the Digital Signature
Act is described in the BSI signature interoperability specifications,
section A1, Certificates.
These are persons, organizations, processes or devices that use the
certificate or the public key it contains for encryption (before the
data is sent) or verification (after the signed data has been received)
purposes.
Credit-card format card with an embedded microchip accessed
externally as defined in ISO 7816. If this microchip is equipped with
a programmable controller (CPU), the card is called a smart card.
The corporate directory is a list containing employee-related
information that is available throughout the company. It is also used
to publish certificates and make these available throughout the
company or to make part of the information (for example, last name,
first name, e-mail address and certificate) available externally by
means of suitable mirroring mechanisms.
Certificate Revocation List, negative list of revoked certificates,
positive list = Certificate Positive List CPL
Provisions specified in X.509.
www.ietf.org/rfc/rfc2459.txt replaced by RFC 3280
Set of mathematical rules for carrying out cryptographic operations
(such as encryption and hashing) recursively on the basis of
May 16, 2006
Technical PKI interoperability in the European energy sector
CSP
DES
Digital signature
Digital Signature Act
Digital Signature
Ordinance
DIN standard, electr.
signature
Distinguished name
EESSI (European
Electronic Signature
Standardization Initiative)
ebIX
48
elementary mathematical functions (such as shift, multiplication,
calculate remainder) using keys and parameters.
Cryptographic Service Provider
A software module that performs cryptographic operations. The
CSP interface is the standard Windows interface to chip cards
equipped with cryptographic co-processors. It competes with the
PKCS#11 standard. Converters are available (from Secude).
The Data Encryption Standard (DES) is a cryptographic algorithm
(that is, a self-contained encryption calculation process with a
legitimacy that is repeated cyclically) developed by the American
National Bureau of Standards (NBS) for encrypting and decrypting
data. The DES algorithm was developed by IBM in the 1970s for
the National Bureau of Standards and uses a 64-bit key which
allows combinations of data substitutions, transformations and
exclusive OR functions. The 64-bit data record comprises an
effective key length of 56 bits and 8 parity bits. The Data
Encryption Standard, the most well known and tried-and-tested
symmetric encryption procedure, was published in 1974 and
standardized in the USA as an ANSI standard (ANSI X3.92-1981).
It has been used for many years, in particular, to transfer sensitive
data such as that encountered on capital markets and can be
regarded as an international quasi standard. The DES standard is
due to be replaced in 2001 by an improved version, namely the AES
standard.
A digital signature cryptographically converts data so that it cannot
be tampered with unnoticeably (protecting the integrity of the data).
Digital signature is usually associated with the process of digital
signing, which can be subject to regional laws and regulations. The
meaning here is more general, that is, it does not correspond to a
possible Digital Signature Act.
Version of the law published on May 21, 2001 in the Federal Law
Gazette governing general conditions and constraints for electronic
signatures and for amendments to further regulations, Federal Law
Gazette 2001 part I, no. 22, page 876 ff.
www.regtp.de/gesetze/start/fs_04.html
Ordinance for electronic signatures and for converting fees and
charges to euros, as at: November 30, 2000 – Ordinance of
November 16, 2001, Federal Law Gazette I p. 3074 enacted on
account of section 24 of the Digital Signature Act.
DIN NI-17.4, Version 1.0, 15.12.1998, available at BSI,
www.bsi.bund.de.
Technical name of a directory entry.
In line with the CCITT recommendations X.520, Selected Attribute
Types.
Most important European standardization committee for digital
signatures.
The purpose of the guideline of the European Union is to facilitate
use of the electronic signature and its legal recognition in the EU.
The aim here is to ensure that the common market can also function
in the field of electronic trading. In order for business partners
outside the EU to be able to provide legally valid electronic
signatures for partners within the EU, their issuing certification
authorities must be recognized (accredited) by a certification
authority in one of the EU member states. This does not, however,
May 16, 2006
Technical PKI interoperability in the European energy sector
Encryption
Form Adjustment Act
GDPdU
Global Identifier (GID)
Hash algorithms
ebIX
49
mean that interoperability is ensured. This also requires that
technical standards that must be defined by suitable workgroups are
adhered to. These standards make it possible for software products
and services to be offered on a freely competitive basis. The
European industrial and standardization committees launched the
European Electronic Signature Standardization Initiative (EESSI)
for this purpose. On July 1, 1999, a draft was presented that will be
developed further in conjunction with the Internet Engineering Task
Force (IETF).
http://www.ict.etsi.org/eessi/EESSI-homepage.htm
Encryption prevents unauthorized persons or third parties from
making use of the electronic data transferred. Mathematical methods
are used for this purpose that convert (encrypt) the data to a readable
yet unusable form. Conversion back to the original form
(decryption) can only be performed by authorized persons,
organizations, processes or devices.
Encryption prevents unauthorized access to protected information.
Different encryption methods are used for the three basic
cryptographic methods (Link-by-Link, Node-by-Node and End-toEnd): transformation, substitution, code book, DES and public key
systems such as RSA. Encryption can take place directly at the
higher protocol levels or by means of suitable additional equipment
connected between the data terminal equipment and data
transmission equipment. As work on international standardization
continues to progress rapidly, a standardization office of the ISO
was set up at the GMD in Bonn. Since January 1991, this has been
the Federal Office for Information Security (BSI) in Bonn with the
task of detecting possible causes of risk for computer systems.
The law for amending the formal requirements in private law and so
on specifies the changes in German law that are necessary as a result
of the Digital Signature Act and the options it offers with regard to
electronic signatures (Federal Law Gazette I 2001 no. 35, 1542,
August 1, 2001).
Principles of data access and verifiability of digital documents
(GDPdU), letter of the German Federal Ministry of Finance, dated
16 July 2001, - IV D 2 - S 0316 - 136/01 -).
This document specifies for the first time requirements for archiving
and accessing encrypted or signed documents and the associated key
material or certificates for the purpose of tax audits.
PKI is always closely associated with X.500 Directory Services.
Although technical naming conventions exist with X.520, there is
no unique namespace, such as for SMTP mail.
A unique identifier is, therefore, required within a PKI, often
referred to as a global identifier.
It should be stored in the cryptographic token (soft token, smart
card, and so on) outside the certificate.
When a document is hashed, a 160-bit number, for example, is first
created (one-way function). It is extremely unlikely that the same
hash value exists for different documents (collision resistant). The
hash value is then signed with the private signature key.
The document recipient validates the document using the public
signature key of the signee once the hash value has been calculated
for the document.
Secure hash algorithms include: MD2, MD5, SHA-1, RipeMd128,
RipeMd160
May 16, 2006
Technical PKI interoperability in the European energy sector
Identrus
ISIS
ISIS-MTT
Key archive
Key backup
Key certificate
Key escrow
ebIX
50
SHA-1 or RipeMd-160 are often used and are recommended by the
BSI.
For suitable crypto algorithms see: www.bsi.de/fachthem/index.htm
Identrus LLC headquartered in New York was founded in April
1999. 40 financial institutions are now members of Identrus. The
Identrus system is based on a legal and technical infrastructure,
which is regulated by means of legal and technical requirements.
The Identrus network is a closed user group which is open to banks
and their business customers. The basic aim here is the unique
identification of the trading partners in B2B business.
ISIS (Industrial Signature Interoperability Specification) was
developed by the working group Trust Center for digital signatures
(AGTC) in conjunction with the BSI. It defines standard formats for
files and messages that are used for services provided within the
meaning of the Digital Signature Act. ISIS currently includes
formats for certificates and directory services and will be extended
to include other formats such as those for time stamps. The ISISMTT standard was adopted together with the Teletrust association.
ISIS-MTT is a joint specification of TeleTrusT and the T7 group
(Trust Center association) for electronic signatures, encryption and
Public Key Infrastructures. It comprises a:
basic specification containing the following parts:
Part 1: Certificate and CRL Profiles,
Part 2: PKI Management,
Part 3: Message Formats,
Part 4: Operational Protocols,
Part 5: Certificate Path Validation,
Part 6: Cryptographic Algorithms,
Part 7: Cryptographic Token Interface
and an optional Digital Signature Act profile.
A test suite/test bed has been developed for the specification, which
provides a basis for ensuring conformity for manufacturer and user
interoperability tests.
KA
Entity in the Trust Center responsible for key archiving, see also
Key Generation (KG).
“Key backup” is an entity in the enterprise PKI organization
responsible for backing up private keys with which data, of which
the non-encrypted original version is no longer available, is to be
decrypted. This component of the PKI accepts, stores and provides
access to private keys and enables the requirement for recovering
original data to be fulfilled. Only the company in question is
responsible for key backup.
A certificate links a public key to information that identifies a
person, organization, process or device as the user of the associated
private key. In the case of a certificate for a personal key, this
information basically comprises the identity data of the key owner.
In the case of a certificate for a key that is not linked to a person,
this information identifies a department, a function, a server, an IT
system, or a process that is authorized to use the associated key.
Also called lawful access. Access keys for encrypted documents are
held by a third, fiduciary entity outside the company. This can be a
notarial or government entity. Lawful access is not used or is not
permitted in Germany. This function is, however, necessary on
May 16, 2006
Technical PKI interoperability in the European energy sector
Key generation
Key holder
Key material
Key recovery
Key user
Key, key pair
LDAP
ebIX
51
account of the cryptographic export guidelines in other countries.
(See also the Wassenaar agreement).
KG
Entity in the Trust Center responsible for generating keys. Signature
keys should be generated on the card using the latest available
technology. If the key generation process with later chip generations
is fast enough to ensure that no considerable delays (in the vicinity
of seconds) occur in the personalization process, all asymmetric key
pairs should be generated on the card so that the private key never
leaves the secure area of the chip.
The holder of a key is the end user who is assigned a private key (in
the form of a Personal Security Environment, or PSE) and is
responsible for its correct use.
In the case of a personal key pair, the owner is also the holder
because it is forbidden to make the personal key available to anyone
else.
In the case of a non-personal key (for example, function key, server
key, and so on), the owner and holder can be different persons. Such
a key is sent from the owner to the holder and then back from the
holder to the owner.
Server keys (that is, keys for authenticating servers), process keys
(for example, code signing) or keys for IT systems and equipment
are generally imported into these where they can then be used
independently. The import is carried out by the owner or by the
holder on behalf of the owner.
Personal key material (Personal Security Environment) and the
associated (public) key certificate.
Key recovery is the process by which key material is made available
again. Key recovery for a company can be carried out for a number
of different reasons (for example, loss of key material, business data
accessed by management, and so on). Access to the archived key
material is always governed by special provisions. In the case of
signature keys, recovery outside the legal framework of the Digital
Signature Act should not be possible.
See also Key holder.
In the case of stored encryption keys, the key holder is not
necessarily the key user; “key holder” here can refer to the legal
person (for example, the employer), who provides the natural person
(as key user) with the key material. Signature keys cannot be stored.
In this case, the natural person is both the key holder and the key
user; this person has full control over the private key and must be
uniquely identifiable.
Two keys comprising a private and a public key required for the
purpose of asymmetric cryptography are referred to here as a key
pair, or key for short.
Lightweight Directory Access Protocol
LDAP is a TCP/IP-based directory access protocol which has
become a standard solution on the Internet and in company
intranets. It is derived from the X.500 directory access protocol
(DAP) and provides simple access to X.500-based and non-X.500based directory systems. The LDAP protocol does not define
directory content nor does it specify how directory services are to be
provided. It builds on TCP/IP and uses a client/server model where
the server is an X.500 server. LDAP has a globally unique format
May 16, 2006
Technical PKI interoperability in the European energy sector
LRA
Maßnahmenkatalog für Dig
Sig (catalog of measures for
dig. sig.)
Message authentication
code
Message recovery
MeT (Mobile Electronic
Transaction Forum)
MoSign (Mobile Signature)
mSign (Mobile Electronic
Signature Consortium)
ebIX
52
that supports any kind of name; it provides different layouts and a
unique relationship between the name and its internal
representation. LDAP is specified in RFCs 1777, 1778, 1779 and
1781. The protocol was standardized in 1999 by the IETF.
Local Registration Authority;
Authorized, user-oriented authority which identifies and
authenticates users and which manages and hands over the key
material to the users.
The central reference point for legal requirements according to the
German Digital Signature Act and their interpretation as well as
information on organizational and technical implementation.
www.bsi.de/fachthem/index.htm
MAC
Information that ensures the integrity of a message. The MAC can
also be used in a symmetric key system to verify the authenticity of
the sender.
Messages are encrypted “normally” with the public key of the
recipient. A copy of the message is also encrypted with the client
key of an administrative unit within the company (Corporate
Security Officer, CSO); see also Key Escrow.
The MeT was founded in April 2000 by Ericsson, Motorola and
Nokia. The MeT is now also supported by Panasonic, Siemens and
Sony. The forum aims to develop a framework for secure mobile
transactions to ensure that e-services, e-commerce and egovernment can be used consistently by the consumer irrespective
of the terminal equipment, service or network deployed. MeT is
based on WAP technology. Like most of the other forums, MeT
intends to promote interoperability between the companies involved
in the value chain and between different countries.
http://www.mobiletransaction.org
The 4 major German banks Commerzbank, Deutsche Bank,
Dresdner Bank and HypoVereinsbank formed a collaborative
partnership for the purpose of implementing a “mobile digital
signature”. The aim of the “MoSign” project is to provide business
and private customers with a joint, open standard for secure online
transactions via cellular phones and organizers. Within the
framework of the ”MoSign” initiative, banks work with the
international system vendors, and terminal equipment/software
vendors Compaq, CoCoNet, emagine, Ericsson, Hewlett Packard,
Materna, Microsoft, Sema, Siemens and the TC Trust Center. The
development of proprietary solutions has been consciously avoided.
Smart cards are currently being used with certificates that are
Identrus compliant. http://www.mosign.de
The mSign consortium was founded at the end of 1999 by Brokat
and today includes 35 members form all areas of the value chain for
mobile digital signatures. The members include mobile network
operators (T-Mobile, D2 Vodafone, E-Plus, etc.), financial institutes
(Advance Bank, HypoVereinsbank, etc.), service providers (NSE,
PAGO, etc.), smart card providers (ORGA, Gemplus, etc.), terminal
equipment manufacturers (Siemens, etc.) and Trust Centers
(TCTrustCenter etc.). As an international association, mSign aims to
provide a basis for developing a global de facto standard for an
interoperable application infrastructure for mobile digital signatures
between the companies involved in the value chain. mSign and
May 16, 2006
Technical PKI interoperability in the European energy sector
OCSP
Operator, of a PKI IT
system
Owner, key owner
PC/SC interface
PEM
Personal key
Personal key, private key
Personal Security
ebIX
53
Radicchio formed a strategic partnership in February 2001.
OCSP (Online Certificate Status Protocol) is a protocol for online
certificate validation.
When OCSP is used for certificate status checks, the OCSP client
sends an OCSP request to an OCSP responder. This OCSP
responder must be authorized to provide information on the current
certificate status. The OCSP is transport independent which means
that it can be based on any Internet protocol.
The request includes the following information:
Protocol version
List of certificate identifiers
Name and signature of the client requesting the status (optional)
Optional extensions that may be processed by the OCSP responder.
A normal response comprises the following information:
Version and type of response
Name of the OCSP responder
List with status information: Each certificate identifier is assigned
the status "good”, “revoked” or “unknown”.
Time stamp
Optional extensions
Signature of the OCSP responder computed across the hash value
of the response: In addition to the signature, information
(certificates) can be supplied for the purpose of verifying authority.
The protocol does not specify how status information is obtained by
the OCSP responder. OCSP responder input usually takes the form
of a CRL.
ASN.1 is used to define the data structures of the protocol.
An operator within the meaning of this policy is the operator of an
IT system, or the party that provides a service or runs an application,
who is responsible for introducing and removing key material
(function, server, or other non-personal key) and for ensuring that it
is used securely. This task can be delegated to an administrator, who
as the holder is then responsible for the key material and its use.
The owner of a key pair is the end user who is responsible for
ensuring that the private key is used correctly and that its integrity is
protected. The owner is also responsible for revoking the key pair.
The personal computer/smart card interface is a software
architecture with application programming interfaces that allow
applications to work with smart cards.
PEM, Privacy Enhanced Mail, is a standard for transmitting e-mails
securely. It was developed by the PSRG and published in 1989 by
the IETF with a request for comments (RFC 1421 to 1424). The
DES is used for encryption purposes.
Key management is based on RSA, DES, or Triple DES. PEM
accepts X.509 certificates. Since the standard is only supported by
industry (in contrast to S/MIME) in a few cases, there is little
prospect for it being used in future.
An asymmetric key pair is a personal key pair when the holder and
owner of the associated Personal Security Environment have to be
the same person, and the name of that person is certified in the
certificate.
The private key is the secret part of the key pair (of a personal key
or function key) that is used in asymmetric cryptography.
PSE
May 16, 2006
Technical PKI interoperability in the European energy sector
Environment
Personalization
PGP
PIN
PIN, Personal Identity
Number
PKCS
ebIX
54
The key material in its entirety: in particular the private key,
certificates and other information used to identify a user.
The main components of the Personal Security Environment (PSE)
are the private key and other information belonging to the user who
has sole access to the private key. For this reason, the PSE must be
protected against unauthorized access. Smart cards, chip cards and
diskettes are examples of data carriers on which the PSE is stored.
Personal data consolidated to form card data.
Pretty Good Privacy is a computer program developed by Phil
Zimmermann in 1991 at RSA, which encrypts and decrypts data. It
is the most widely used cryptographic software on the Internet.
Programmers from all over the world have collaborated on
subsequent PGP versions and user interfaces. The software has been
available since 1994 without a license being required. PGP uses
RSA’s public key encryption system. PGP also uses an encryption
system called IDEA, developed in 1990 by Xuejia Lai and James
Massey.
Personal Identification Number
A combination of numbers that authenticates a user and is used to
keep the PSE, in particular the private key stored in it, secret.
A distinction is made between a transport PIN and a user PIN.
6-digit user PINs are prescribed for signatures that conform with the
Digital Signature Act.
The PINs are stored securely in the dedicated file of the signature
application. A counter (often 1) counts the number of signatures
after the PIN has been entered.
The PIN is a password with which an end user authenticates himself
when he accesses the Personal Security Environment. The PIN is
used to protect the PSE, in particular the private key it contains.
Public Key Cryptography Standards from RSA Labs.
PKCS #1: Describes the RSA Encryption Standard. Incorporates
and provides recommendations for implementing public key
cryptographic systems based on the RSA algorithm.
PKCS #2 and PKCS #4 have been integrated in PKCS #1.
PKCS #3: Diffie-Hellman key agreement standard. Version 1.4,
November 1993. Contains a method for implementing the DiffieHellman protocol.
PKCS #5: Password-Based Encryption Standard. Version 1.5,
November 1993. Provides recommendations for implementing
password-based cryptography.
PKCS #6: Extended-Certificate Syntax Standard.
Describes the syntax for extended certificates comprising a
certificate and a set of attributes collectively signed by the holder of
the certificate.
PKCS# 7 (Cryptographic Message Syntax Standard) describes the
general syntax for data that can be processed using cryptographic
methods and therefore describes the combination of signed
document and digital signature.
PKCS #8: Private-Key Information Syntax Standard describes the
syntax for symmetric cryptography. It also describes the syntax for
private keys for a number of asymmetric algorithms and a set of
attributes.
PKCS #9: Selected Attribute Types defines selected attribute types
for use in extended certificates to PKCS #6, digitally signed
messages to PKCS #7, private keys to PKCS #8 and certification
May 16, 2006
Technical PKI interoperability in the European energy sector
PKI Forum
Policy, PKI
Private key
ebIX
55
requests to PKCS#10.
PKCS #10: Certification Request Syntax Standard describes the
syntax for requesting certification of a public key, a name, and
possibly a set of attributes.
PKCS#11 defines a program interface to cryptographic functions
such as chip cards with a cryptographic co-processor and isolates
the application from the middleware.
PKCS#12 defines the file format of software-based cryptographic
tokens (soft tokens). It specifies a portable format for storing or
transporting a user’s private keys, certificates and other secret data.
PKCS #13 (Elliptic Curve Cryptography Standard) is still being
developed. It will address many aspects of elliptic curve
cryptography, including parameter and key generation and
validation, digital signatures, asymmetric encryption, key
agreement, and ASN.1 syntax in conjunction with elliptic curves.
PKCS #14 (Pseudorandom Number Generation Standard) is still
being developed. It will address many aspects of pseudo random
numbers.
PKCS#15 describes a file structure for chip cards in a PKI for
identification vis-à-vis various standards-aware applications
regardless of the application's cryptoki provider.
International committee for PKI issues (founded by manufacturers
in the USA).
TeleTrusT Germany has been a member since June 2000.
TCTrustCenter is also a member.
www.trustcenter.de
MailTrusT specification 2 based on S/MIME was introduced by
TeleTrust in the PKI forum.
www.teletrust.de (new URL:
http://212.185.192.36/default.asp?hi=1)
www.pkiforum.org
See also the European e-business committee EEMA – European
Forum for E-business (www.eema.org)
The PKI Challenge launched by the EEMA
www.eema.org/pki-challenge
in which TeleTrusT Germany is involved, is the largest European
PKI interoperability project.
A security concept comprises organizational and technical measures
and is generally stipulated in a security policy.
The Public Key Infrastructure is stipulated in a PKI policy and
describes the organizational rules and technical components and
explains how they interact. The PKI Policy is the central document
of a PKI and defines the security level of the PKI. Certificates and
security measures must be documented in such a way that they can
be reconstructed. Certain criteria are crucial for transitions from one
PKI to another to establish mutual confidence and can, in certain
cases, even be automated.
A Certification Practice Statement must also be drawn up,
particularly if different certificate structures are involved (e.g.
signature and encryption).
The Digital Signature Act or Digital Signature Ordinance-compliant
audits to section 13 of the Digital Signature Act and section 15 of
the Digital Signature Ordinance includes documentation of the
security measures.
Symmetric cryptography is based on a secret key which is owned by
May 16, 2006
Technical PKI interoperability in the European energy sector
Public key
Public key cryptography
Public Key Infrastructure
RA
Registration
RegTP
Revocation
Revoking (a signature
certificate)
ebIX
56
both communication partners.
In asymmetric cryptography, each participant has a public key and a
private key.
The private key is used to sign the document and the public key to
check (validate) the signature.
Using the private key, the recipient can decrypt the message
encrypted with the public key of the recipient (see also public key
cryptography).
The public key is the generally accessible part of a key pair that is
used in asymmetric cryptography.
Encryption method in which 2 different keys are used to encrypt and
decrypt a message (this explains the term asymmetric
cryptography).
In practice, one of these keys is published with the identification
data of the holder (= public key); the other key is made available to
the holder using a secure means (usually on a smart card) or is
generated on the smart card itself.
An important application of public key cryptography is the
electronic signature where a document is signed with the private key
after which the recipient then checks the signature with the public
key.
PKI
The PKI groups together all the entities and processes that are
necessary for using public key cryptography.
They are usually described in a policy.
Registration authority, also called Local Registration Authority
(LRA)
Authority at which registration is carried out.
Establishing the identity of a user in the personalization process at
an (L)RA and passing on the data (signed) to the Trust Center by
means of a secure channel. An application must have been
submitted for this purpose.
The participant involved in the procedure for digital signatures is
assigned a suitable and, as far as possible, unique name. This name
should be based on the standard X.520 for Distinguished Names.
According to the Digital Signature Act, it can be a pseudonym.
German regulatory authority for telecommunication and postal
services.
www.regtp.de
The RegTP is the root entity for qualified electronic signatures that
conform with the Digital Signature Act. The keys for the
Certification Authorities are certified with its original key.
Certificates can or must in certain cases be revoked by the owner,
holder or a third party before the period of validity comes to an end.
Possible reasons that necessitate revocation of a certificate include
disclosure of the Personal Security Environment (PSE), theft or loss
of the PSE or all cases in which misuse of a PSE must be suspected.
When a certificate is revoked, use of the certificate and the
associated PSE is permanently prevented because it is not possible
to reinstate a revoked certificate.
Process used to identify the certificate as invalid (online) when the
signature is being checked/validated by the CA or replicated
information services.
The participant or his representative can have the certificate
May 16, 2006
Technical PKI interoperability in the European energy sector
RSA algorithm
S/MIME
SECCOS
Security policy
SET (Secure Electronic
Transaction)
Signature Alliance
Signature application of the
ebIX
57
revoked. The card-issuing entity or the CA as the certificate-issuing
entity must act as a representative here. The revocation must contain
the time at which it was carried out and must not be retroactive.
Information is obligatory.
Further requirements regarding revocation management are defined
in the Digital Signature Act.
RSA was introduced in 1977 by its inventors: Ronald Rivest from
MIT, Adi Shamir from the Weizmann Institute in Israel and
Leonard Adelman from USC. The name of the algorithm is based on
the initial letters of their last names. Its security is based on the
difficulty of factoring large integers.
At present, it normally uses key lengths of 1024 bits. According to
BSI specifications, the key length will have to be at least 2048 by
the middle of 2004. RSA is currently the most widely used crypto
algorithm for generating digital signatures using the public key
method. Other algorithms recommended by the BSI include DSA
and DSA with elliptical curves based on finite number fields. Due to
cut-backs in resources (key length), elliptical curves (EC) will be
used in future for higher levels of security.
Secure Multipurpose Internet Mail Extensions
Enables e-mails to be sent and received securely and is based on the
MIME standard.
Secure Chip Card Operating System of the ZKA. Asymmetric
cryptography is supported for the first time as of Version 5.0.
Binding document that describes the security policy of a company.
Potential business risks are assessed and, where appropriate, suitable
measures are defined. Risks are unexpected negative events and
business opportunities that have not been realized. IT security is part
of the Security Policy; the PKI Policy is part of the Security Policy.
SET specifies a secure protocol for credit card payments with the
following services:
Authenticates the customer as the registered card holder,
authenticates the dealer as an authorized card receiving agent,
authenticates the clearing agencies and banks involved, guarantees
the integrity and confidentiality of the payment information
transmitted.
The German Signature Alliance was formed on April 3, 2003
between authorities and companies with the aim of promoting
electronic signatures. Terms of reference and convergence
objectives were elaborated for this purpose. The purpose of the
Signature Alliance is to promote the use, propagation and
introduction of chip-card-based electronic signatures and other PKI
applications. To this end, the members of the Alliance undertake to
develop a stable foundation for interoperable structures on the basis
of jointly accepted standards. Aspects which might influence the
propagation of electronic signatures are to be clarified in the course
of these efforts.
A distinction is made between two categories of signature
application:
- Applications of the qualified signature pursuant to the Digital
Signature Act which enable form-maintaining transactions and
- Applications of advanced signatures which are employed to ensure
authenticity and integrity.
Contained in the interface specification for the ZKA chip card.
May 16, 2006
Technical PKI interoperability in the European energy sector
ZKA
Signature component
Signature, accredited (in
Germany, signature that
conforms with the Digital
Signature Act)
Signature, qualified
electronic
Signature, simple and
advanced
Signatures, qualified
Single sign on
Smart card
ebIX
58
In general, a smart card with key material.
Usage in compliance with the Digital Signature Act is described in
the BSI signature interoperability specifications, section B2,
Signature component.
A distinction is made between five statuses:
Initialization status (Z0), authentication mechanism CA/PSE
Pre-personalization status (Z1), assignment of PSE participants
Key generation status (Z2) (keygen and safeguarding)
Personalization status (Z3) (up until certificate is loaded)
Control status (Z4) (signing possible)
Accredited signatures are qualified signatures, the issuer of which
(the certification authority) must have successfully completed an
accreditation procedure in accordance with the Digital Signature
Act.
Only the private key is signed by the RegTP.
www.regtp.de/gesetze/start/fs_04.html
Electronic signature with asymmetric cryptography, certificates and
Public Key Infrastructure.
Conforms with the Digital Signature Act: 2-level hierarchy,
uppermost root entity is the RegTP.
Although the terms “simple” and “advanced” signatures have been
defined, they are not regulated in any way and can be used as
required (this includes, for example, the widely-used Pretty Good
Privacy method (PGP)).
According to the wording of the guideline, these are “advanced”
signatures created with a secure signature creation device and which
are at the disposal of the holder only.
Qualified electronic signatures with provider accreditation are those
signatures that are equivalent to a manual signature within the scope
of the Form Adjustment Act.
Provisions and mechanisms that allow a user to authenticate himself
just once vis-à-vis a system yet gain access to other processes and
resources.
Minicomputer the size of a credit card. The card is equipped with a
chip (mounted on a module) containing a processor, data memory
(file system) and an operating system. One important feature of the
operating system is the integrated access protection for data in the
file system. The user must enter a correct pin or authenticate himself
in order to achieve the appropriate access status so that the data in
the file can be made accessible to the outside world. The processor
also performs cryptographic arithmetic operations autonomously. A
crypto co-processor is required for cryptographic operations in
security-critical applications, the bus width of which should be
greater than the key length (for example, 1100 bits with 1024 bit
RSA keys). The key length defines the modulus n=p q (p,q prime
numbers) in the RSA procedure.
The chip used must (in Germany) be certified to ITSEC E4 Hoch;
that is, a test laboratory accredited by the BSI has performed black
box tests (for example, different time responses of cryptographic
operations) and, following disclosure of the infrastructure of the
chip, white box penetration tests (microprobing, Bellcore attacks,
and so on) and did not establish any weaknesses with regard to the
attacks defined for level 4 "Hoch". The infrastructure of the chip is
May 16, 2006
Technical PKI interoperability in the European energy sector
Soft PSE, software PSE
SPHINX
SSL (Secure Socket Layer
for TCP/IP)
Time stamp service
ebIX
59
disclosed right down to the circuit diagram level and physical
layers.
Personal Security Environment (in particular, private keys) which is
stored on diskette and not on non-readable hardware (chip card), or
is sent to the key holder by e-mail.
In the SPHINX pilot project, products from various manufacturers
are tested in order to achieve end-to-end security in public
authorities. Selected workstations are equipped with a chip card
reader and security software.
Deploying the manufacturer-neutral standard MailTrusT from
TeleTrust e.V. ensures that products from different manufactures
can communicate with each other.
The key material required is made available in a pilot Public Key
Infrastructure. This is set up and operated for SPHINX at the BSI
and Competence Center Informatik GmbH.
The Public Key Infrastructure comprises three certification entities.
These use certificates to ensure the authenticity of the public keys
and the identity of the owner. SPHINX supports both central and
local key generation. The key material is stored on chip cards or on
diskette.
Objectives of the SPHINX pilot project:
To test the cross-product interoperability of solutions from different
vendors
To establish the extent to which the products are accepted by users
To determine the outlay for implementing products tested within
SPHINX in public authorities.
Details of the experience gathered so far from implementing the
interoperability requirements in a real-world environment have been
published.
sphinx@bsi.bund.de and
www.bsi.bund.de/aufgaben/projekte/sphinx/index.htm
Protocol for encrypting messages on the Internet. SSL can be used
in conjunction with the application programs SMTP, Telnet, FTP
and HTTP and is based on TCP / IP. The protocol was developed by
Netscape and uses complex 128-bit encryption for the data
transferred on the Internet. SSL encodes the data with public keys
that are confirmed by a third party in accordance with the X.509
standard. The high level of security is guaranteed by the fact that the
key used for decryption has to be specified separately and is stored
only for the user (that is, it is not transferred on the Internet); see
also TLS.
TSS, Time Stamp Service.
In addition to document integrity, which is confirmed by means of a
signature, time-related integrity is often relevant from a legal
perspective.
This is achieved by means of a time stamp which takes the form of a
certificate signed by the time stamp service. The Digital Signature
Act does not specify any requirements regarding the time source or
time zone. All that is important is that no ambiguity prevails. A time
stamp is enforceable when the time is of considerable importance.
UTC time (Universal Time Coordinated) is normally used. This
corresponds to Greenwich Mean Time (GMT) and is represented in
15 bytes.
The time stamp service is generally a participant in its own CA.
Manufacturer note:
May 16, 2006
Technical PKI interoperability in the European energy sector
TLS, Transport Layer
Security
Token, cryptographic
Trust Center, TC
Users of cryptographic
methods in the PKI
Verify, verification,
validation
Visualization
WTLS (Wireless Transport
Layer Security)
ebIX
60
Products are available and are also used outside the PKI (for
example, from Utimaco for receiving lottery tickets electronically).
www.timeproof.de
The encryption method TLS is an advanced version of SSL. TLS is
used to encrypt mails and uses certificate-based authentication to
monitor the integrity of mails and to prevent authorized access to
the mail server.
Key memory used for accessing a secure area. Applications can
access an external device (cryptographic token) via a common
logical view. A distinction is made between hardware tokens and
soft tokens. Hardware tokens include smart cards, USB tokens, and
hardware security modules (HSM). Soft tokens are usually
generated in PKCS#12 format. The neutralizing interface is often
PKCS#11. Cryptoki (Cryptographic Token Interface) is an interface
defined in PKCS #11 for exchanging cryptographic data.
Entity entrusted with the possible tasks of generating key pairs, the
safekeeping of key material, as well as issuing, publishing and
withdrawing public key certificates. See also BSI signature
interoperability specifications, section A5, Directory service.
 Person (also: end user): Employee, student trainee, apprentice,
consultant (working in a company or for a business partner)
 Organization: Project group (within or outside the company),
administrative department, business partner company, and so on.
 Process: Service, client, server, certification authority, LRA, and
so on.
 Equipment: Computer, router, firewall, and so on.
 A user such as this is either the user of a Personal Security
Environment (PSE) or a certificate, or is himself the purpose for
which certificates are used.
When a digital signature is verified, a check is carried out to
determine whether the signed data has been falsified and to establish
that it originates from the person, organization, process or device
that created the digital signature.
In this context: authentically displayed document which is to be
signed.
Refer to the BSI catalog of measures, Version 1.0 of November 18,
1997, p. 175 ff text, section16(3) with an interpretation of the BSI
and
The catalog of measures for technical components in accordance
with the Digital Signature Act, as at: July 15, 1998, chapter 3.
Published by the German regulatory authority for
telecommunication and postal services (RegTP).
WTLS is a security protocol that resides in the WAP protocol
architecture above the transport layer and provides confidentiality
(encryption), data integrity and authentication (of the terminal
equipment) for the application layer above. WTLS is not only the
counterpart of SSL/TLS in the Internet (TCP/IP) protocol
architecture but is in fact derived from SSL/TLS.
A distinction is made between WTLS Class 2 and WTLS Class 3.
Both use the WAP Identity Module (WIM) to carry out their
functions. WTLS Class 2 offers 2-phase security and end-to-end
security at the transport layer (Transport Layer Security). WTLS
Class 3 is the same as WTLS Class 2 and also supports user
authentication at the application layer. WTLS Class 3 uses the
May 16, 2006
Technical PKI interoperability in the European energy sector
X.500
X.509
X.520
XML DSIG
ZKA
ebIX
61
WMLScript function signText for this purpose.
CCITT recommendation for directory system/directory services.
www.ietf.org/rfc/rfc1309.txt
Each object known to the directory service is represented by means
of an entry in the Directory Information Base. These requirements
are fulfilled in the X.500 standard in that the hierarchical
dependencies are transferred to the entries by means of a tree
structure (Directory Information Tree). This tree structure enables
each entry to be assigned uniquely to a higher-level entry.
According to the data distribution concept in the X.500 standard, the
Information Base can be distributed among any number of systems.
Each system features an application process, the Directory System
Agent (DSA), which accesses the part of the Directory Information
Base that it manages. A directory user is represented by a user
agent, the Directory User Agent (DUA) – this is similar to an
electronic mail system based on X.400. The directory model to
X.500 includes functions for checking the identity of a user. Two
authentication levels are provided. Simple authentication is based on
simple password verification, while strong authentication uses
encryption based on the public key method. The directory system,
which is generally known under the name Directory Services (DS)
is also referred to as ITU recommendation X.500 and ISO standard
9594.
CCITT recommendation for the Directory Authentication
Framework.
V1 contains binding fields, V2 and V3 are defined in relatively
general terms and are specified in greater detail within the
framework of the interoperability requirements.
See Distinguished Name
XML Extensible Markup Language
An open standard which now enjoys wide acceptance
Allows content to be separated from its presentation form
Is text based
Is self descriptive
Can be extended
Can be internationalized
Is platform and language neutral
Can be processed automatically
Is suitable for long-term data storage
Can be easily transformed
Provisions for the digital signature of XML documents are specified
in RFC 3075.
There are three versions (enveloping, enveloped, detached
signature).
www.dsml.org
DSML is an effort to establish a standard for combining LDAP with
XML.
Central loans committee of the German banking industry.
The money cards issued are bank cards with a chip based on
symmetric cryptography. The chip operating system used has been
enhanced considerably (SECCOS) as a result of asymmetric
cryptography and includes mechanisms that support electronic
signatures.
May 16, 2006
Download