ImageVerifierCode 换一换
格式:PDF , 页数:15 ,大小:749.11KB ,
资源ID:735699      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735699.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 102 153-2003 Electronic Signatures and Infrastructures (ESI) Pre-study on certificate profiles (V1 1 1)《电子签名和基础结构(ESI) 认证模式的预研究(版本1 1 1)》.pdf)为本站会员(confusegate185)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 102 153-2003 Electronic Signatures and Infrastructures (ESI) Pre-study on certificate profiles (V1 1 1)《电子签名和基础结构(ESI) 认证模式的预研究(版本1 1 1)》.pdf

1、ETSI TR 102 153 1.1.1 (2003-02) Technical Repor Electronic Signatures and Infrastructures (ESI); Pre-study on certificate profiles 2 ETSI TR 102 153 VI .I .I (2003-02) Reference DTR/ESI-000015 Keywords authentication, e-commerce, electronic signature, secu rity ETSI 650 Route des Lucioles F-O6921 So

2、phia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 O0 Fax: +33 4 93 65 47 16 Siret No 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-prfecture de Grasse (06) No 7803/88 Important notice Individual copies of the present document can be downloaded from: http:lwmv.etsi .a

3、rq The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ET

4、SI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at ha p:/pa rta I.

5、etsi I a rgltbistat uslstatus .as p If you find errors in the present document, send your comment to: Cori vriaht Notifica tion No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O European Telecommun

6、ications Standards Institute 2003. All rights reserved. DECTTM, PLUGTESTSTMand UMTSTMare Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI regis

7、tered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI 3 ETSI TR 102 153 VI . 1 . 1 (2003-02) Contents Intellectual Property Rights 4 Foreword . 4 1 2 3 3.1 3.2 4 5 6 6.1 6.2 6.2.1 6.2.2 7 Scope 5 References 5 Definitions and abbreviations . 6 Definitions 6 Abbreviations

8、. 6 Implications from the requirements of the Directive . 6 Documents scrutinized . 7 Analysis outcomes 7 Profile comparison . 7 Profiles inconsistencies 11 Inconsistencies list 11 Comments on the findings 12 Proposed strategy and implementation phases . 13 Annex A: Participation to the task . 14 Hi

9、story 15 ETSI 4 ETSI TR 102 153 VI .I .I (2003-02) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can

10、be found in ETSI SR O00 314: “Intellectual Property Rights (7PRs); Essential, orpotentially Essential, IPRs notlJied to ETSI in respect ofETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (5). All published ETSI deliverables shall incl

11、ude information which directs the reader to the above source of information. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Electronic Signatures and Infrastructures (ESI). ETSI TC ES1 has remarked that existing certificate profiles, among them TS 101 862 6, are co

12、nsidered too open, allowing too many choices, which lead to incompatible implementations. It has then agreed to launch a pre-study to assess the preconditions for an action to further profile the certificate formats. The purpose of this study is to cover, but not be limited to, qualified certificate

13、s. The main finding of this study is that more rigid profiles are deemed necessary to actually achieve interoperability and, therefore, “to ensure the free movement within the internal market and to build trust in electronic signature“ (see Directive 1999/93/EC recital (5) i). Therefore the next ste

14、p should be to issue a Technical Standard speciSl the full format of a Qualified Certificate both from an issuer point of view and from a verifier point of view. Formats for “citizen“ certificates (Electronic Identity Certificates (EIC) could also be indicated. ETSI 5 ETSI TR 102 153 VI .I .I (2003-

15、02) 1 Scope The study was intended to include: Investigation on the major sources of incompatibility. Review of existing certificate configurations in the public domain, i.e. for open user communities. Review of proposed profiles. Conclusion whether a normative task is feasible and meaningful. Since

16、 the conclusion reached is that a normative task is required, the study also covers the rest of what the TOR required: Proposed strategy for harmonization with existing standards in the area, notably with the IETF and ETSI QC-profiles. Proposal for the way of publishing, e.g. annex to existing stand

17、ard or stand-alone document. TOR of the task to be carried out, including estimated effort and time. The following two certificate types have been covered: certificates to be used in a qualified signature; 1) 2) authentication certificates. It is to be noted that the purpose of the study was mainly

18、to investigate if there actually are risks of major incompatibilities among existing profiles. In other words, the survey was not intended to take into exam all existing profiles, which would have been too broad an effort for the limited resources available. The goal was instead to collect, if appli

19、cable, sufficient evidence of such risks. When it has been achieved, no additional certificate profiles have been taken into exam. For this reason a few certificate profiles have been left out; for example: the Italian Electronic Identity Document (EID) certificate profile and the corresponding expe

20、rimental French one. This simply means that the purpose had been achieved before their turn to be taken in exam had arrived. 2 References For the purposes of this Technical Report (TR), the following references apply: il Directive 1999/93/EC of the European Parliament and of the Council of 13 Decemb

21、er 1999 on a Community framework for electronic signatures. IETF RFC 3279: “Algorithms and Identifiers for the Internet X.509 Public Key Infiastructure Certificate and Certificate Revocation List (CRL) Profile“, W. Polk, R. Housley, L. Bassham. April 2002. 21 31 41 51 IETF RFC 3280: “Internet X.509

22、Public Key Infiastructure Certificate and Certificate Revocation List (CRL) Profile“. R.Housley, W. Ford, W. Polk, D. Solo. April 2002. IETF RFC 3039: “Internet X.509 Public Key Infrastructure - Qualified Certificates Profile“. S. Santesson, W. Polk, P. Barzin, M. Nystrom. January 2001. ISO/IEC 9594

23、-8: “Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks“ - Fourth Edition 200 1-08-0 1. ETSI TS 101 862: “Qualified certificate profile“ IETF RFC 2459: “Internet X.509 Public Key Infrastructure Certificate and CRL Profile“. ETSI 6 E

24、TSI TR 102 153 VI .I .I (2003-02) 3 3.1 Definitions and abbreviations Definitions For the purposes of the present document, the following terms and definitions apply: authentication certificate: Public Key Certificate (PKC) intended to be used in an electronic signature which serves as a method of a

25、uthentication, as specified in Directive i, article 2.1. Certification Authority: authority trusted by one or more users to create and assign public key certificates Public Key Certificate (PKC): data structure containing the public key of an end-entity and some other information, which is digitally

26、 signed with the private key of the CA which issued it Qualified Certificate: Public Key Certificate (PKC) that conforms to Directive i, annex I and that is issued by a Certification Authority that conforms to the requirements of Annex II of the same Directive. 3.2 Abbreviations For the purposes of

27、the present document, the following abbreviations apply: CA CRL CSP EESSI EIC EID IETF IS0 PKC PKI PKIX TOR QC Certification Authority Certificate Revocation List Certificate Service Provider European Electronic Signature Standardization Initiative Electronic Identity Certificates Electronic Identit

28、y Document Internet Engineering Task Force International Organization for Standardization Public Key Certificate Public Key Infiastructure Public Key Infrastructure X.509 based Qualified Certificate Terms of Reference 4 Implications from the requirements of the Directive Directive 11 whereas (5) pro

29、vides a clear hint to interoperability: “The interoperability of electronic-signature products should bepromoted; in accordance with Article 14 of the Treaty, the internal market comprises an area without internal frontiers in which the free movement of goods is ensured; essential requirements speci

30、fic to electronic-signature products must be met in order to ensure free movement within the internal market and to build trust in electronic signatures,. . . I. Directive 11 whereas (7) stresses the need to promote international communications: “The internal market ensures the free movement ofperso

31、ns, as a result of which citizens and residents of the European Union increasingly need to deal with authorities in Member States other than the one in which they reside; the availability of electronic communication could be of great sewice in this respect“. Similarly whereas (10) states: “The inter

32、nal market enables certification-service providers to develop their cross-border activities with a view to increasing their competitiveness, and thus to offer consumers and businesses new opportunities to exchange information and trade electronically in a secure way, regardless of frontiers. From th

33、e above quotations a strong need stems for interoperability that has as a first pillar the certificate profile. Other main pillars are: signature formats, certificate status information format, Certificate Service Provider (CSP) status information format, time stamping format. From the Directive i,

34、article 5 both subsections, both qualified certificates and non qualified certificates appear to be subject to interoperability issues and therefore both deserve an interoperability focussed study. Actually it is impossible to profile every non qualified certificate type. Furthermore such an effort

35、would be somewhat questionable. ETSI 7 ETSI TR 102 153 VI .I .I (2003-02) Document name A-Trust - Certificate and CRL Specification FINEID S4-1 - Implementation profile 1 of the To focus on a feasible and useful purpose, thus endeavouring in an effort both effective and efficient, this study address

36、ed only two meaningful certificate types: 1) 2) certificate to be used in qualified signatures; authentication certificates (for both purposes: “peer entity authentication“ and “data origin authentication“). Organization A-Trust Gesellschaft fr Sicherheitssysteme im ele kt ron isc hen Zahl u ngsverk

37、e h r Gm bH . Population Register Centre 5 Documents scrutinized The following profiles and documents have been analysed by the task components. FINEID - SI specification. FINEID S4-2 - Implementation profile 2 (for organizational usage) of the FINEID SI specification. Common ISIS-MTT specification

38、for PKI applications from T7 dateofBirth; placeofBirth; gender; countryOfCitizenship; and countryOfResidence. This information most likely will be necessary to better specify the certificate users information. digitalsignature topic. Ce yUsage Su bjectDirectoryAttributes rivate extensions IAlso in t

39、his case additional investigation is to be performed. IThese extensions are still in their infancy, so no definite S3 assessment is reasonable to be done. Additional investigation is therefore recommended. 6.2.2 Comments on the findings Major concerns arise from the previous table: 1) 2) non full in

40、teroperability among certificates; questionable choices, mostly in the authentication certificate profile. Both concerns may lead to major problems in exchanging signed electronic documents across frontiers and in mutually recognizing Member States electronic identification documents. It is therefor

41、e highly recommended that a thorough investigation is implemented across European Member States to overcome the previous problems. ETSI 13 ETSI TR 102 153 VI .I .I (2003-02) 7 Proposed strategy and implementation phases It has already been pointed out that an actual interoperability is indispensable

42、 to achieve the Directive purposes, as specified in clause 4. It is a common belief of those who took part in the study that a task force is to be charged of working out certificate profiles that meet the following requirements: 1) 2) 3) achieve acceptance and consensus throughout Europe; leave open

43、 only options that do not give way to interoperability issues with a higher than level 3 Severity; meet the recognized specifications, namely ISO/IEC 9594-8 (2001) 5, RFC 3039 4, RFC 3279 2, RFC 3280 3, TS 101 862 6 or their follow on; 4) achieve consensus on formats compliant with generally deemed

44、“best practice“ specifications. These requirements imply the following implementation specifications: a) Since profiles are to be developed so that all Member States will de facto implement them in their regulations, team members must have suitable political clout and standing as well as diplomatic

45、skill and undisputed technical knowledge. If necessary, EESSI SG may be involved as well by providing its support. At first sight, interoperability issues appear not to stem out of RFC 3280 3, RFC 3039 4, TS 101 862 6 themselves; rather, from misunderstanding of their provisions or from having certi

46、ficates been issued before them. A more thorough investigation is therefore required to ascertain, jointly with the national bodies responsible for each certificate profile, the rationale of their choices alongside the mentioned specifications. Should the outcomes demonstrate the latter are to be am

47、ended, such amendments must achieve consensus among at least the majority of the involved bodies, prior to be proposed to the IETF PKIX as well. However, completely new profiles, complying with the requirements agreed upon with the bodies, will have to be defined and will need achieve TC ES1 consens

48、us before being submitted to the involved bodies for their approval. It will also be necessary to work out with each and all involved bodies a harmonized phase-idphase-out plan of current and newhevised profiles. All Member States relevant bodies will be made aware of such each others profiles and r

49、elevant phasing in and out plan. The outcome of the above effort will be a new ETSI Technical Specification. b) ETSI 14 ETSI TR 102 153 VI .I .I (2003-02) Annex A: Participation to the task Although it is the ETSI habit not to mention the components of a task that drafted one document, given this task peculiarity of voluntary participation and, moreover, in order to give a better understanding of the profiles assessment relevance, name, country and organization of those who enlisted as volunteers are hereafter specified. ETSI 15 ETSI TR 10

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1