| overview 
 basis
 adoption 
                        
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  related
 Guides:
 
 Security &
 InfoCrime
 
 Governance
 
 Information
 Economy
 
 Consumers
 & Trust
 
 e-Publishing
 
 
 
  related
 Profiles:
 
 Forgery
 & Fraud
 
 Identity
 Theft
 
 
 
 
 
 
 
 |  basis 
 This page deals with the operation of digital signature 
                        schemes.
 
 It covers -
  public and private keys 
 E-signature schemes typically centre on creation and verification 
                        via public key cryptography, 
                        with an algorithm using two discrete but mathematically 
                        related keys -
 
                        one 
                          is used for generation of the digital signature or encryption 
                          of a document/communication so that it is unintelligible. 
                          another 
                          key is used for verification of the signature or decryption 
                          of the data by/for the intended recipient.  Hardware 
                        and software with two such keys forms an asymmetric cryptosystem, 
                        with a private key (known only to the 'signer' and used 
                        to generate the digital signature) and the public key. 
                        The public key is often widely available as it is needed 
                        for verification of the e-signature, typically through 
                        publication to many people through an online repository. 
                        
 In practice, although both keys are mathematically related, 
                        if the system has been designed - and, as importantly, 
                        implemented - securely it is not feasible to derive the 
                        private key from knowledge of the public key.
 
 As a result, in what is commonly characterised as the 
                        principle of 'irreversibility', although many people may 
                        know a given signer's public key (and rely on it for validating 
                        that entity's signature) they cannot determine the private 
                        key and use it to forge the e-signature.
 
 
  the hash function 
 The hash function is used both for creation and verification 
                        of an e-signature.
 
 It is an algorithm that creates a digital 'fingerprint' 
                        through a "hash value" of a standard length 
                        which is usually much smaller than the message but nevertheless 
                        substantially unique to it. Any change to the message 
                        invariably produces a different hash result when the same 
                        hash function is used.
 
 In the case of a secure hash function (sometimes referred 
                        to as a one-way hash function) it is "computationally 
                        infeasible" to derive the original message from knowledge 
                        of its hash value.
 
 Hash functions therefore enable the software for creating 
                        e-signatures to operate on smaller and predictable amounts 
                        of data, while still providing robust evidentiary correlation 
                        to the data in the original communication/document. They 
                        serve as an efficient mechanism for assuring the integrity 
                        of a document or communication, indicating that it has 
                        not been tampered with since it was digitally signed.
 
 
  generation and verification processes 
 Use of e-signatures involves two processes: creation and 
                        verification.
 
 Creation is performed by the signer. Verification is undertaken 
                        by the recipient of the signature and/or another party, 
                        including a forensic consultant or court.
 
 Creation uses a hash result derived from 
                        and unique to both the signed document/communication and 
                        a specific private key. For that hash result to be secure 
                        there must be only a negligible possibility that the same 
                        digital signature could be created by combination of any 
                        other message or private key.
 
 Some e-signature schemes predicate creation on registration 
                        of the signer, with a registration authority (RA) for 
                        example determining the identity of an individual or organisation 
                        seeking to participate in the particular scheme. The RA 
                        might be a commercial vetting 
                        service, credit reference 
                        service, a government agency or data broker such as Choicepoint. 
                        Participation is often dependent on the signer entering 
                        into a contract with the scheme operator; such schemes 
                        generally limit the operator's liability.
 
 Verification is the process of checking 
                        the digital signature by reference to the original item 
                        and a given public key, thereby determining whether the 
                        e-signature was generated for that document, communication 
                        or transaction using the private key that corresponds 
                        to the referenced public key.
 
 As noted in the more detailed discussion 
                        of authentication in the separate Security & InfoCrime 
                        guide elsewhere on this site, that verification may
 
                        form 
                          one element of broader personal identification and authorisation 
                          schemes (eg this person has the valid signature but 
                          lacks the requisite authorisation for a particular transaction) 
                           
                          be accompanied by biometric identifiers, smart 
                          cards and other identification technologies What 
                        is involved in signing?
 To sign a document or communication (eg an email message) 
                        or authorise a transaction such as a payment or release 
                        of health records the 
                        signer first delimits the boundaries of what is to be 
                        signed. A hash function in the signer's e-signature software 
                        (held on a personal computer or other device 
                        that is assumed to be protected from unauthorised access) 
                        automatically computes a hash result that in practice 
                        is unique and specific to the message. The hash is entirely 
                        independent of the user's handwritten signature and is 
                        not, for example, a digital image derived from a scan 
                        of an ink on paper signature.
 
 The software then transforms the hash result into an e-signature 
                        using the signer's private key. It is expected that the 
                        resultant signature will be unique both to the document/communication 
                        or transaction and to the private key used to create it.
 
 Typically, an e-signature (a digitally signed hash result 
                        of the message) is attached to the particular signed data 
                        and transmitted as part of that document/communication 
                        or transaction. It may, however, be transmitted as a separate 
                        data element or stored separately, subject to preservation 
                        of a reliable association with the particular document, 
                        message or authorisation. Given that a digital signature 
                        is unique to the signed data, it is useless if wholly 
                        disassociated from that document/communication.
 
 Verification of a digital signature is accomplished by 
                        computing a new hash result of the original message by 
                        means of the same hash function used to create the signature. 
                        Using the public key and the new hash result, the verifier 
                        checks whether the e-signature was generated through use 
                        of the corresponding private key and whether the newly 
                        computed hash result matches the original hash result 
                        (ie the hash that was transformed into the e-signature 
                        during the signing process).
 
 Confirmation of the e-signature by that verification software 
                        is dependent on two factors.
 
 The signer's private key must have been used to digitally 
                        sign the message, assumed to be the case if the signer's 
                        public key was used to verify the signature - the signer's 
                        public key will verify only a digital signature generated 
                        with the signer's private key.
 
 The integrity of the document/communication must also 
                        be intact. That is signified if the hash result computed 
                        by the verifier is identical to the hash result extracted 
                        from the e-signature during the verification process.
 
 Various asymmetric cryptosystems create and verify digital 
                        signatures using different algorithms and procedures, 
                        but share this overall operational pattern.
 
 
  association 
 To verify a digital signature, the verifier must have 
                        access to the signer's public key and have assurance that 
                        it corresponds to the signer's private key. However, a 
                        public and private key pair has no intrinsic association 
                        with any person; it is simply a pair of numbers. It is 
                        therefore necessary to reliably and easily associate a 
                        particular person or entity to the key pair. That association 
                        is integral to the use of e-signatures.
 
 In relationships involving only a few parties (particularly 
                        where there are recurrent transactions), each party can 
                        simply communicate the public key by a secure mechanism 
                        such as face to face contact or a courier.
 
 That mechanism for associating the keys is not viable 
                        for much activity on the net, distinguished by -
 
                        a 
                          large number of transactions (including one-off and 
                          recurrent interactions that may be minutes or months 
                          apart)parties 
                          that are geographically distant from each otherdealings 
                          between individuals, government agencies, SMEs and major 
                          corporations or their agents (eg payment processors 
                          and fulfilment specialists)concerns 
                          about trust, reliability and repudiationconcerns 
                          about speed of verification and reduction of transaction 
                          costs  
                        Signers have accordingly adopted two approaches. 
 One approach, favoured by some members of the ICT community, 
                        has been to self-publish their public keys - typically 
                        with a statement such as "signatures verifiable by 
                        the following public key are mine".
 
 That approach has not had mass acceptance, given that 
                        reliance upon an essentially self-referential statement 
                        involves risks of
 
                        trusting 
                          a phantom (does the individual or organisation really 
                          exist) being 
                          the victim of personal or corporate identity theft attempting 
                          to disprove a false denial of a digital signature if 
                          a transaction should turn out to prove disadvantageous 
                          for the purported signer.  
                        A common response to that problem is use of one or more 
                        trusted third parties (TTP) to associate an identified 
                        signer with a specific public key. 
 
  certification authorities 
 That trusted third party - which generally operates on 
                        a commercial basis, is often independent of government 
                        and may operate across national boundaries - is commonly 
                        characterised as a certification authority (CA).
 
 To associate a key pair with a prospective signer, the 
                        CA typically issues a certificate - an electronic record 
                        that lists a public key as the 'subject' of the certificate 
                        and confirms that the prospective signer (aka the subscriber) 
                        identified in the certificate holds the corresponding 
                        private key.
 
 A certificate serves to bind a key pair with a particular 
                        subscriber. A "recipient" of the certificate 
                        desiring to rely upon a digital signature created by the 
                        subscriber named in the certificate (whereupon the recipient 
                        becomes a "relying party") can use the public 
                        key listed in the certificate to verify that the digital 
                        signature was created with the corresponding private key.
 
 If such verification is successful, it offers some assurance 
                        that the corresponding private key is held by the subscriber 
                        identified in the certificate and that the e-signature 
                        was created by the particular subscriber.
 
 The CA digitally signs the certificate to ensure its authenticity, 
                        with that signature being verified through the CA's public 
                        key listed in another certificate by another CA. That 
                        other certificate can in turn be authenticated by the 
                        public key listed in a further certificate. The issuing 
                        CA must digitally sign its own certificate during the 
                        operational period of the other certificate used to verify 
                        the CA's digital signature.
 
 To make a public key and its identification with a specific 
                        subscriber readily available for use in verification, 
                        the certificate may be published in a repository or made 
                        available by other means.
 
 Repositories are online databases of certificates and 
                        other information available for retrieval and use in verifying 
                        e-signatures. That retrieval can be undertaken automatically 
                        by having the verification program interact with the repository 
                        to obtain certificates as needed.
 
 
  timeframes 
 An ink on paper signature lasts until the ink fades, paper 
                        decays or characters are erased. E-signatures, in contrast, 
                        are generally expected to have a finite life, rather than 
                        being current and valid for all time.
 
 As a result e-signatures generated by a subscriber to 
                        authenticate a document and by a CA to validate its certificate 
                        are usually time-stamped (in some instances by TTP timestamp 
                        providers) to assist verification of whether the digital 
                        signature was created during the 'operational period' 
                        identified in the certificate.
 
 
  reliability and liability 
 Once issued, a certificate may prove to be unreliable.
 
 That may be because the subscriber loses control of the 
                        private key after issue or one or more TTPs are compromised, 
                        eg through inappropriate release of information by staff 
                        or a hacker.
 
 As with passports and 
                        other official documents, it is conceivable that a subscriber 
                        might gain a certificate by supplying false information 
                        to the CA at the time of issue (eg misrepresenting 
                        personal identity).
 
 When alerted to unreliability the certification authority 
                        should then
 
                        revoke 
                          (permanently invalidate) the certificatesuspend 
                          (temporarily invalidate) the certificate  
                        with or without the subscriber's request, depending on 
                        the circumstances. 
 Most e-signature regimes accordingly envisage that immediately 
                        after revoking/suspending a certificate - with information 
                        being added to a Certificate Revocation List (CRL) or 
                        Suspension List (CSL) - the CA will
 
                        publish 
                          notice of that revocation or suspension  
                          notify entities who inquire or who are known to have 
                          received an e-signature verifiable by reference to the 
                          unreliable certificateadvise 
                          entities who inquire about the status of the e-signature.  Public Key Infrastructure (PKI) 
 As the following page of this note suggests, much discussion 
                        regarding e-signatures has been conceptualised as disagreement 
                        about public key infrastructure or merely the ambitions 
                        of bodies such as Australia's Government Public Key Agency 
                        (GPKA) 
                        and 1998 Gatekeeper report.
 
 Like digital signatures and e-signatures the concept in 
                        practice means different things to different people. It 
                        can most profitably be characterised as a set of relationships 
                        and assumptions rather than a physical entity. PKI involves 
                        the interaction of document signers and recipients, government 
                        regulatory agencies, standard setting and auditing bodies, 
                        entities involved in issuing and verifying certificates 
                        (including agents such as ISPs, accountants and law firms), 
                        courts and mediation bodies, and IT or other service providers.
 
 PKI regimes thus encompass -
 
                         
                          national, international and nongovernment legal frameworks 
                          and industry codesidentification 
                          and maintenance of global best practice standards for 
                          internet interactions 
                          a transparent and appropriate balance of risks and liabilities 
                          among all participants in the schemeeffective 
                          quality control protocols and practices, including maintenance 
                          of security and respect for fiduciary dutiesdelivery 
                          of services on a commercial or non-commercial basis, 
                          within and across jurisdictionspromotion 
                          of the scheme, since in practice it is not cost effective 
                          if (as in Australia) it is perceived as costly or inappropriate 
                          and is therefore adopted by only a handful of participants.   
 
 
 
 
 
  next page  
                        (adoption) 
 
 
 
 |  
                          |