Mag. Dipl.-Ing. Dr. Michael Sonntag Electronic Signatures Legal and Technical Aspects of E-Commerce, Budapest, 7.-11.10.2002 E-Mail: sonntag@fim.uni-linz.ac.at WWW: http://www.fim.uni-linz.ac.at/staff/sonntag.htm Copyright, 2002 © Michael Sonntag ? ? ? Questions? ? Please ask them immediately! ? Michael Sonntag ? Legal and Technical Aspects of E-Commerce 2 Content Why the need? Cryptography basics Symmetric, asymmetric, hash; types of attacks Key distribution / Signature systems Requirements for and functions of signatures Legal requirements EU signature directive Implementation in Austria US Electronic Signatures Act Michael Sonntag Legal and Technical Aspects of E-Commerce 3 Why electronic signatures? Certain contracts / acts require a signature These should be also available online Secure identification of the partner Allows prosecution in case of fraud Create evidence of transactions E-Mail can easily be forged (or claimed to be) Security & Trust Know, whom you communicated with, and be able to provide evidence accordingly Michael Sonntag Legal and Technical Aspects of E-Commerce 4 Types of attacks System for public transmission of data must cope with the following attacks: Eavesdropping: Reading data during transmission Manipulation: Changing data during transmission Replay: Copying (legitimate) data and sending it again Pretending different identity: Claiming to be someone else Repudiation: Denying to have sent/received some data Denial of service: Cutting off communication Traffic analysis: Analyzing patterns of communication Michael Sonntag Legal and Technical Aspects of E-Commerce 5 Types of protection The following methods can be used for protecting systems for public transmission: Authentication: Verifying the identity of a party Isolation: Attributing rights of persons to objects and preventing unauthorized access Encryption: Coding of data to be unreadable without some secret information Checksums: Verifying no changes have been introduced Signatures: Relating identities to messages Steganography/Anonymizers: Hiding of a message Michael Sonntag Legal and Technical Aspects of E-Commerce 6 Attacks vs. Protection Protection AuthentiAttacks Isolation Encryption Checksums Signatures cation Eavesdropping Manipulation (D) Replay (D) Pretending different P Steganography (D, P) P (D, P) D P (D) P D D P D D P (D) D (D) P identity Repudiation Denial of service Traffic analysis D D, (P) (P) P D… Detection, P…Prevention, ()…restricted/partly/certain sense Michael Sonntag Legal and Technical Aspects of E-Commerce 7 Cryptography basics: Symmetrical cryptosyst. Symmetrical cryptography uses the same key for encryption and decryption This key MUST be kept secret! (Relatively) short key length Always vulnerable to brute-force attack Only knowledge of the key allows encryption Michael Sonntag Decryption Plain Encryption Cipher Plain Secret key Legal and Technical Aspects of E-Commerce 8 Cryptography basics: Asymmetrical cryptosyst. Asymmetrical cryptography uses different (but related) keys for encryption and decryption The public key is really PUBLIC (directories, ...) Long key length Most vulnerable to new mathematical methods Everyone can encrypt, only intended receiver decrypt Michael Sonntag Private key Decryption Plain Encryption Related Cipher Plain Public key Legal and Technical Aspects of E-Commerce 9 Cryptography basics: Hash functions One-way functions (= No recreating the input)! Loss of information » Examples: Checksums (CRC), MAC, /etc/passwd, … Used to reduced the amount of data to be signed Problems: Must be hard to find a document matching the hash-value Should be rather large (at least 128 bit) DATA Michael Sonntag Hashing Hash » Testing slight modifications for a matching hash-value! X ??? DATA Legal and Technical Aspects of E-Commerce 10 Cryptography basics: Encryption / Signatures Based on asymmetric cryptography Usually (e. g. RSA): Signing = Encryption with private key, verification = decryption with public key » Some signature algorithms DO NOT allow encryption, e. g. DSA! Everyone can verify the signature’s validity Two functions of a signature: Verifying the knowledge of the private key = Identity of the signer Checking that no later modifications took place Problem: How do you verify the public key? Michael Sonntag Legal and Technical Aspects of E-Commerce 11 Cryptography basics: Encryption / Signatures Certificate = Connects a public key to a person Must be from a trusted source Is usually signed itself ( Verify this signature, ...) Different systems for distributing these certificates » See key distribution later! Certificate Michael Sonntag Signing Related Plain + Signature Plain Private key Public key Valid Verification Invalid Plain Legal and Technical Aspects of E-Commerce 12 Key storage (1) Keys for encryption/signatures should be... stored encrypted to be useless if stolen on physical tokens: Much harder to loose, importance of use is clearer if a card (or something else) is inserted immediately marked as “invalid” if lost in any way regularly changed to avoid too large sets of data used only for one service: Encryption OR signatures; business OR private, door locks OR file encryption, ... PBE: Passphrase Based Encryption For avoiding the hen-egg problem when encrypting keys Michael Sonntag Legal and Technical Aspects of Long (>20 characters) passwords are used asE-Commerce key 13 Key storage (2) Important areas in life-cycle of keys + examples: » Generation: Use “real” randomness (physical generator), who/where are they created » Distribution: How to publish public keys/transmit secret keys » Storage: Preventing unauthorized access (tokens, encryption; see above) » Usage: Is the software / environment secure, viewer problem, usability » Administration: Which key(s) are used/required for an operation » Disposal: Secure destroying of keys, access to backups, buffers, storage for random identical keys, ... Michael Sonntag Legal and Technical Aspects of E-Commerce 14 Key distribution: Trusted channels Easiest way of distributing keys: Trusted channels Known to be secure / no eavesdropping Examples: Couriers, personal meetings Not usable for large groups, initially unknown partners, or when in a hurry Can NEVER be exchanged using the untrusted channel on which they shall be used later » Except when a previous secret is shared, which is still secure Only very rarely used ONLY possibility for Vernam cipher Michael Sonntag Legal and Technical Aspects of E-Commerce 15 Key distribution: Certificate Authorities (1) Central authority vouches for the association of a public key to an individual Depends on the trust of the users to this authority Important to note, what the authority verifies/guarantees » Certification policy » E. g. Certificates for signing code DO NOT guarantee ANYTHING about the code; only the identity of the signer (which need NOT be the programmer!) Usually under supervision by public administration This model is used for signatures accepted by public administration in the EU E-Government Michael Sonntag Legal and Technical Aspects of E-Commerce 16 Key distribution: Certificate Authorities (2) In theory, the hierarchy can be very deep, but in practice, it’s rather shallow: » CA=Certification Authority Certificates Root-CA CA 1 Message Michael Sonntag ... CA n User 1 ... User n Program Legal and Technical Aspects of E-Commerce 17 Key distribution: Web of Trust No central authority; replaced by the users If you know someone personally, you sign his public key and publish this combination This results in a chain/web of trust: A knows&trusts B, B k&t C; therefore A knows&trusts C Based on transitivity of trust Problem, if malicious users sign keys; if trusted by a single person, illegal certificates are introduced » Works rather well; seems to be only minor problem in practice Might be impossible to verify the key of an unknown user Advantage: No single point of failure Michael Sonntag Legal and Technical Aspects of E-Commerce 18 Re-Signing Electronic signatures loose their reliability over time Today’s secure keys can be broken/forged easily in several years Some signatures must be valid for long periods » E. g. Austria: Statute of limitations 30/40 years Contracts are still valid, but the proof is lost! Solution: Before method (not: certificate!) expires, a signature with a new (longer/more secure) key must be Michael Sonntag created, which includes 19 Legal and Technical Aspects of E-Commerce a secure timestamp. Systems for el. signatures An electronic signature cannot be easily created; a whole system is needed Every chain is only as strong as its weakest link! 2048 Bit RSA are of no use if the private key is secured with a 4 digit password! Main problems: Technical: Signature terminals must be secure » =Trusted hardware + trusted software Organizational: Verifying persons for issuing certificates » Lots of trusted persons needed in any scheme Legal: Reduction of needs for signatures Michael Sonntag Legal and Technical Aspects of E-Commerce » At least in Austria signature-requirements were reduced later 20 Requirements for signatures What something must fulfill to be called “signature” Dependence on document: The signature cannot be transferred to another document Unchangeability: The document cannot be changed anymore after the signature was created Association with person: The signature is associated with exactly one singular person Verifiability: Anybody can verify whether the signer is the person he/she claims to be Unforgeable: Can only be created by a single person. The signer cannot deny having signed it Michael Sonntag Legal and Technical Aspects of E-Commerce 21 Functions of signatures What a signature should provide Conclusion: Applying the signature changes the document from draft to final status (Unchangeability) Authenticity: The signature serves as evidence that a certain person agreed with a declaration (=the content) (Association with person, legal presumptions) Warning: Avoiding rashness by the signer; importance of the act Identity: Allows identifying the person (Text of signature and non-repudiability, association with person, verifyability, unforgeable) Michael Sonntag Legal and Technical Aspects of E-Commerce 22 EU Signature directive: Signatures According to the directive, two major classes of signatures exist: “El. signature”: Every data used for authentication » E. g. name at the end of an E-Mail “Advanced el. signature”: Complicated, secure Unique link to signatory » Cannot be forged Capable of identifying the signator » Must include the name or some other characteristic Created with means, which can be kept under sole control Linked to data so no later changes are possible Michael Sonntag Legal and Technical Aspects of E-Commerce 23 EU Signature directive: Certificates Two types of certificates: » “Certificate” and “Qualified certificate” “Qualified certificate”: Adv. signa. only with these 10 requirements for the certificate itself Issued by an CA for qualified certificates » 12 requirements + lots of rules Allows limitations of scope or value of transactions Pseudonym instead of name possible Must contain country of CA (no central EU registry!) Additional attributes can be incorporated » CA must explicitly verify those before issuing the certificate Michael Sonntag Legal and Technical Aspects of E-Commerce 24 EU Signature directive: Revocation Sometimes certificates must be revoked Private key lost, chipcard stolen, password disclosed, ... Technical problems No generally agreed upon standard; different solutions No offline check for revocation possible Legal regulations (Austria): » EU: CA must provide “secure & immediate revocation service” Must also be possible in (hand-)written form At most after 3 hours completed Two types: Preliminary (Lock) and final (Revocation) Michael Sonntag Legal and Technical Aspects of E-Commerce 25 EU Signature directive: Legal effects (1) Advanced signature + qualified certificate + secure signature-creation device: Must satisfy legal requirements in same manner as handwritten signatures on paper » Can be used as a replacement Must be admissible as evidence in legal proceedings » But might be of less or more “value” than signatures on paper! NO legal presumptions » Austria: Presumption that signed content is from the signator Certificates: Admissible in proceedings and non-discrimination Michael Sonntag Legal and Technical Aspects of E-Commerce 26 EU Signature directive: Legal effects (2) Area where el. signatures are equal to handwritten ones (and have the same effect) are open to states Restrictions are in the E-Commerce directive: It must be possible to conclude everything electronically, except All real estate contracts excluding rental rights All contracts requiring courts, public authorities or professions exercising public authority (e.g. notaries) Contracts of suretyship by persons acting for purposes outside their trade, business or profession Contracts of family law or the law of succession Michael Sonntag Legal and Technical Aspects of E-Commerce 27 EU Signature directive: Liability CA is liable to ANYONE who reasonably relied on a qualified certificate, for all information in the certificate at the time of issuing, that it is a valid qualified certificate, the signator held the private key private and public key match unless the CA proves, he did not act negligently failure to register revocation of a certificate No liability over/outside limitations in the certificate Michael Sonntag Legal and Technical Aspects of E-Commerce 28 EU Signature directive: Requirements for CA General reliability Ensure operation of secure and reliable directory and revocation services Personnel with expert knowledge Trustworthy systems and products Sufficient financial resources Extensive logging of all relevant actions Informing customers Requires a secure computing center, large organization and numerous experts Rare! Michael Sonntag Legal and Technical Aspects of E-Commerce 29 EU Signature directive: Accreditation Purely optional A kind of “official seal” States can set higher standards than in the directive for these CA’s Austria: Exactly the same “Replacement” for model “no licensing required” Seal is only awarded AFTER verification! Michael Sonntag Legal and Technical Aspects of E-Commerce 30 EU Signature directive: Various For public sector additional requirements for el. signatures can be prescribed No prior authorization required for CA’s CA’s may operate within the whole EU Cert. from foreign CA’s are equal to national ones Special rules for data protection » CA may collect ANY information ONLY from the subject itself … See the directive and the local laws/ordinances! Michael Sonntag Legal and Technical Aspects of E-Commerce 31 Implementation in Austria RTR: Broadcast & Telecomm. Regulation Incorp. Public supervision, registration of CA’s A-SIT: Secure Inform. Technology Center-Austria Technical part: Inspection of CA’s for RTR Association: University Graz, Ministry of Finance, Austrian National Bank Currently 5 CA’s; 2 offering advanced signatures Few certificates in use Lack of applications Only very recently advanced signatures available Michael Sonntag Legal and Technical Aspects of E-Commerce 32 US El. Signatures Act (1) Much broader than EU directive, much less technical Electronic records » Allows electronic archiving of papers Transferable electronic records » Person stated in evidencing system is the current owner » Single authoritative copy Electronic signatures » = Sound, symbol, process attached to or logically associated with a record and attached with the intent to sign the record. Non-discrimination of both No invalidity solely because of electronic form! Michael Sonntag Legal and Technical Aspects of E-Commerce 33 US El. Signatures Act (2) Exemptions: Creation/Execution of wills, codicils or testamentary trusts Adoption, divorce or other matters of family law All commercial transactions except sales, leases, waivers of renunciation Court documents (orders, notices, pleadings, …) Cancellation or termination of utility services, health insurance or life insurance Certain notices regarding primary residences of individuals (repossession, eviction, ...) Accompanying documents for hazardous goods Michael Sonntag Legal and Technical Aspects of E-Commerce 34 US El. Signatures Act (3) Transferable records: Prove for ownership of a right is a record » E. g. “classic” shares, cash, … Problem of perfect copies: » » » » » » “Authoritative” copy needed Owner / Later owner must be shown on it System for evidencing transactions required Actual control needed Unalterable Changes only possible with consent of current owner Can be solved by signatures and trusted systems Unknown whether actually in use or not! Michael Sonntag Legal and Technical Aspects of E-Commerce 35 Literature/Links: EU Signature directive: 1999/93/EC, L 13/12-20 19.1.2000 EU E-Commerce directive: 2000/31/EC, L 178/1-16 17.7.2000 Austrian Signature Law: SigG BgBl I Nr. 190/1999 idF BgBl I Nr. 152/2001 Austrian Signature Ordinance: SigVO BgBl II Nr. 30/2000 US El. Signature Act: http://www.dud.de/dud/documents/usesignact0608.pdf Mayr-Schönberger/Pilz/Reiser/Schmölzer: Praxiskommentar Signaturgesetz. Wien: Orac 1999 Michael Sonntag Legal and Technical Aspects of E-Commerce 36