Digital signature

From Wikipedia, the free encyclopedia

Digital signature is a term with confusing reference. It is generally taken to be a 'subset' of electronic signatures.[1][2][3][4] But some people use the term to describe something equivalent to electronic signature. As does this legislation.

electronic signature means an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record.[5] This is the definition given by the U.S. Electronic Signatures in Global and National Commerce Act of 2000.

Or it can be used as a broader term encompassing message authentication codes, file integrity hashes and digital pen pad devices.

In this article digital signature is used to mean a cryptographically based signature assurance scheme. Many have been proposed, some have been found to be flawed and are not used. Some are covered by patents, some were covered by patents which have expired, and some are free of patent license requirements, though there is more than a little disagreement on this point amongst those with commercial interests.

Digital signatures are often used in the context of public key infrastructure (PKI) schemes in which the public key used in the signature scheme is tied to a user by a digital identity certificate issued by a certificate authority, usually run by a third party commercial firm. PKI systems use asymmetric key cryptography to unbreakably bind user information (name, address, phone number, ...) to a public key; the underlying idea is closely akin to that of a notary endorsement. There are several digital signature schemes; most establish two complementary algorithms, one for signing and the other for checking the signature at some later time. The output of the signature process (in principle, these are bit strings, though they can be represented in many ways) is also called a digital signature.

The term electronic signature, although sometimes used for the digital signatures discussed here, has had a distinct meaning in common law: it refers to any of several, not necessarily cryptographic, mechanisms for identifying the originator of an electronic message. Electronic signatures found valid by courts in various jurisdictions have included cable and Telex addresses, as well as fax transmission of handwritten signatures on a paper document. It is said that this is the reason both the Uniform Electronic Transactions Act (U.S. state law), and the U.S. Federal Electronic Signatures in Global and National Commerce Act refer only to electronic signatures. As the security (and workability) of the digital signatures discussed in this article are quite different than all other kinds of electronic signatures, these legal usages present problems in practice.

Contents

[edit] Benefits of digital signatures

There are three common reasons for applying a digital signature to communications:-

[edit] Authentication

Public-key cryptosystems allow encryption of a message with a user's private key. The message itself need not be sent in ciphertext. If a hash of the document is generated and then protected via encryption, the document cannot be altered in any way without changing the hash to match, which, if quality algorithms are properly used, will be quite difficult. By decrypting the hash using the sender's public key, and checking the result against a newly generated hash of the alleged plaintext, the recipient can confirm (with high confidence) that the encryption was done with the sender's private key (and so presumably by the user who should have been the only person able to use that key), and that the message hasn't been altered since it was signed. No recipient can ever be absolutely certain the purported sender is indeed the signer -- ie, the person who used the private key -- since the cryptosystem might have been broken, the key copied, or the whole scheme evaded using social engineering.

The importance of high confidence in both the message integrity and sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office in the form (a,b) where a is the account number and b is the amount to be credited to the account. A devious customer may deposit £100, observe the resulting transmission and repeatedly retransmit (a,b), getting a deposit each time and getting rich in the process. This is an example of a replay attack.

[edit] Integrity

Both parties will always wish to be confident that a message has not been altered during transmission. Encryption of the message makes it difficult for a third party to read it, but that third party may still be able to alter it, perhaps maliciously, without actually reading it. An example is the homomorphism attack: consider a bank which sends instructions from branch offices to the central office in the form (a,b) where a is the account number and b is the amount to be credited to the account. A devious customer may deposit £100, intercept the resulting transmission and then transmit (a,b3) to become an instant millionaire.

[edit] Non-repudiation

In a cryptographic context, the word repudiation refers to the act of disclaiming responsibility for a message (ie, claiming it was sent by some third party, certainly not me; "I repudiate this message and its contents!"). A message's recipient may insist the sender attach a signature in order to make later repudiation more difficult, since the recipient can show the signed message to a third party (eg, a court) to reinforce a claim as to its origin. However, loss of control over a user's private key will mean that all digital signatures using that key, and so 'from' that user, are suspect. Noticing that such a loss of control has occurred is not a cryptographic problem, but a human space one, and is unsolved. Short of special purpose protocols to address this issue, digital signatures alone cannot provide inherent non-repudiation.

[edit] Implementation of public-key digital signatures

Public-key digital signature schemes rely on public-key cryptography. In public-key cryptography, each user has a pair of keys: one public and one private. The public key is distributed freely, but the private key is kept secret by the user; another requirement is that it should be computationally infeasible to derive the private key from the public key.

Generally, digital signature schemes include three algorithms:

  • A key generation algorithm
  • A signing algorithm
  • A verification algorithm

For example, consider a situation in which Bob sends a message to Alice and she wants to be certain it came from him. Bob sends his message to Alice, attaching a digital signature. The digital signature was generated using Bob's private key, and takes the form of a string of bits (normally represented as a string of characters (ie, digits and letters)). On receipt, Alice can then check whether the message really came from Bob by running the verification algorithm on the message together with the signature, using Bob's public key. If they match, then Alice can be confident the message really was from Bob, because quality digital signature algorithms are so designed that it is very difficult to forge a signature to match a given message (unless one has knowledge of the private key, which Bob must keep secret).

[edit] Association of digital signatures and encryption

Enlarge

Digital signatures use encryption techniques but the algorithms are not typically suited for direct encryption of bulk plaintexts; more efficient methods are available. Of course a signed document may be sent encrypted over a public communication channel (eg, the Internet) just as might be any other message.

More usually, Bob first applies a quality cryptographic hash function to the message, and then digitally signs the resulting hash (see diagram). An insecure hash can compromise the digital signature. For example, if it is possible to generate hash collisions, it might be feasible to forge digital signatures.

There are several reasons to sign such a hash (or message digest) instead of the whole document.

  • For efficiency: The signature will be much shorter and thus save time since hashing is generally much faster than signing in practice.
  • The document is intended to be read by others: E.g., diplomas, birth certificates, identity certificates, driver's licenses, a contract establishing ownership of something, etc... These documents will be in cleartext, but an accompanying digital signature can be used to verify that they are neither forged nor altered.
  • For integrity: Without the hash function, the text "to be signed" must be split (separated) in blocks with a size shorter than the length of the private key. Then each block has to be signed and sent to the receiver. However, the receiver of the signed blocks is not able to recognize if one or more blocks have been erased during the transmission.

[edit] Using separate key pairs for signing and encryption

In several countries, a digital signature has a status somewhat like that of a traditional pen and paper signature. Generally, these provisions mean that what is digitally signed legally binds the signer of the document to the terms therein. For that reason, it is often thought best to use separate key pairs for encrypting and signing. Using the encryption key pair a person can engage in an encrypted conversation (eg, about buying a house), but does not legally sign every message he sends. Only when both parties come to an agreement do they sign a contract with their signing keys, and only then are they legally bound by the terms of a specific document. After signing, the document can be sent over the encrypted link.

[edit] Association of digital signatures and trusted time stamping

Digital signature algorithms and protocols do not inherently provide certainty about the date and time at which the underlying document was signed. The signer might, or might not, have included a time stamp with the signature, or the document itself might have a date mentioned on it, but a later reader cannot be certain the signer did not, for instance, backdate the date or time of the signature. Such misuse can be made impracticable by using trusted time stamping in addition to digital signatures.

[edit] Additional security precautions

[edit] Putting the private key on a smart card

All public key / private key cryptosystems depend entirely on keeping the private key secret. A private key can be stored on a user's computer, and protected by, for instance, a local password, but this has two disadvantages:

  • the user can only sign documents on that particular computer and
  • the security of the private key completely depends on the security of the computer, which is notoriously unreliable for many PCs and operating systems.

A more secure alternative is to store the private key on a smart card. Many smart cards are deliberately designed to be tamper resistant (however, quite a few designs have been broken, notably by Ross Anderson and his students). In a typical implementation, the hash calculated from the document is sent to the smart card, whose CPU encrypts the hash using the stored private key of the user and returns it. Typically, a user must activate his smart card by entering a personal identification number or PIN code (thus providing a two-factor authentication). Note that it can be sensibly arranged (but is not always done) that the private key never leaves the smart card. If the smart card is stolen, the thief will still need the PIN code to generate a digital signature. This reduces the security of the scheme to that of the PIN system, but is nevertheless more secure than are many PCs.

[edit] Using smart card readers with a separate keyboard

Entering a PIN code to activate the smart card, commonly requires a numeric keypad. Some card readers have their own numeric keypad. This is safer than using a card reader integrated into a PC, and then entering the PIN using that computer's keyboard. The computer might be running a keystroke logger (by its owner/operators intention or otherwise -- due to a virus, for instance) so that the PIN code becomes compromised. Specialized card readers are less vulnerable, though not invulnerable, against tampering with their software or hardware. And, of course, eavesdropping attacks against all such equipment are possible.

[edit] Other smart card designs

Smart card design is an active field, and there are smart card schemes which are intended to avoid these particular problems, though so far with little security proofs.

[edit] Using digital signatures only with trusted applications

One of the main differences between a digital signature and a written signature is that the user does not "see" what he signs. It's the application that presents a hash code to be encrypted with the private key, but in the case of a malicious application a hash code of another document might be presented so that the users thinks he is signing the document he sees on the screen but is actually unwillingly signing another (probably less favorable).


[edit] Some digital signature algorithms

[edit] The current state of use — legal and practical

Digital signature schemes all have several prior requirements without which no such signature can mean anything, whatever the cryptographic theory or legal provision.

  • First, quality algorithms. Some public-key algorithms are known to be insecure, practicable attacks against them having been discovered.
  • Second, quality implementations. An implementation of a good algorithm (or protocol) with mistake(s) will not work.
  • Third, the private key must remain actually secret; if it becomes known to any other party, that party can produce perfect digital signatures of anything whatsoever.
  • Fourth, distribution of public keys must be done in such a way that the public key claimed to belong to, say, Bob actually belongs to Bob, and vice versa. This is commonly done using a public key infrastructure and the public key\leftrightarrowuser association is attested by the operator of the PKI (called a certificate authority). For 'open' PKIs in which anyone can request such an attestation (universally embodied in a cryptographically protected identity certificate), the possibility of mistaken attestation is non trivial. Commercial PKI operators have suffered several publicly known problems. Such mistakes could lead to falsely signed, and thus wrongly attributed, documents. 'closed' PKI systems are more expensive, but less easily subverted in this way.
  • Fifth, users (and their software) must carry out the signature protocol properly.

Only if all of these conditions are met will a digital signature actually be any evidence of who sent the message, and therefore of their assent to its contents. Legal enactment cannot change this reality of the existing engineering possibilities, though some such have not reflected this actuality.

Legislatures, being importuned by businesses expecting to profit from operating a PKI, or by the technological avant-garde advocating new solutions to old problems, have enacted statutes and/or regulations in many jurisdictions authorizing, endorsing, encouraging, or permitting digital signatures and providing for (or limiting) their legal effect. The first appears to have been in Utah in the United States, followed closely by the states Massachusetts and California. Other countries have also passed statutes or issued regulations in this area as well and the UN has had an active model law project for some time. These enactments (or proposed enactments) vary from place to place, have typically embodied expectations at variance (optimistically or pessimistically) with the state of the underlying cryptographic engineering, and have had the net effect of confusing potential users and specifiers, nearly all of whom are not cryptographically knowledgeable. Adoption of technical standards for digital signatures have lagged behind much of the legislation, delaying a more or less unified engineering position on interoperability, algorithm choice, key lengths, and so on what the engineering is attempting to provide.

See also: ABA digital signature guidelines

[edit] Legal aspects

Legislation concerning the effect and validity of digital signatures includes:

[edit] Brazil

  • Medida provisória 2.200-2 (Portuguese) - Brazilian law states that any digital document is valid for the law if it is certified by ICP-Brasil (the official Brazilian PKI) or if it is certified by other PKI and the concerned parties agree as to the validity of the document.

[edit] China

[edit] European Union and the European Economic Area

[edit] India

[edit] New Zealand

For an overview of the New Zealand law refer: - The Laws of New Zealand, Electronic Transactions, paras 16-18; or - Commercial Law, paras 8A.7.1-8A.7.4. (these sources are available on the LexisNexis subscription-only website)

[edit] Pakistan

[edit] Russian Federation

Federal Law of Russian Federation about Electronic Digital Signature (10.01.2002)

[edit] United Nations Commission on International Trade Law

[edit] United States

The Law regulates the activity of Certificate Authorities and conditions for practical application of Digital Signature. However, the Law does not correspond to the recommendations of WTO, UNCITRAL and other influential organizations. Digital Signature Systems described in this Law are not compatible with international standards. This is the main reason, why the Law will be overwritten. Amendments should simplify the procedure of Digital Signature use.

[edit] Switzerland

[edit] Uruguay

Uruguay laws include both, electronic and digital signatures:

[edit] Turkey

Turkey has an Electronik Signature Law (in Turkish) since 2004. This law in fact imlements European Union Directive 1999/93/EC, but not stated. Turkey has a Government Certificate Authority for all government units.

[edit] Legal cases

Court decisions discussing the effect and validity of digital signatures or digital signature-related legislation:

  • In re Piranha, Inc., 2003 WL 21468504 (N.D. Tex) (UETA does not preclude a person from contesting that he executed, adopted, or authorized an electronic signature that is purportedly his).
  • Cloud Corp. v. Hasbro, 314 F.3d 289 (7th Cir., 2002)[1] (E-SIGN does not apply retroactively to contracts formed before it took effect in 2000. Nevertheless, the statute of frauds was satisfied by the text of E-mail plus an (apparently) written notation.)
  • Sea-Land Service, Inc. v. Lozen International, 285 F.3d 808 (9th Cir., 2002) [2] (Internal corporate E-mail with signature block, forwarded to a third party by another employee, was admissible over hearsay objection as a party-admission, where the statement was apparently within the scope of the author's and forwarder's employment.)

[edit] References

  1. ^ The University of Virginia
  2. ^ State of WI
  3. ^ National Archives of Australia
  4. ^ CIO
  5. ^ US ESIGN Act of 2000

[edit] External links

Public-key cryptography
v  d  e
Algorithms: Cramer-Shoup | DH | DSA | ECDH | ECDSA | EKE | ElGamal | GMR | IES | Lamport | MQV | NTRUEncrypt | NTRUSign | Paillier | Rabin | Rabin-Williams | RSA | Schnorr | SPEKE | SRP | XTR
Theory: Discrete logarithm | Elliptic curve cryptography | RSA problem
Standardization: ANS X9F1 | CRYPTREC | IEEE P1363 | NESSIE | NSA Suite B   Misc: Digital signature | Fingerprint | PKI | Web of trust | Key size
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers