ImageVerifierCode 换一换
格式:PDF , 页数:39 ,大小:158.40KB ,
资源ID:735755      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735755.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 102 272-2003 Electronic Signatures and Infrastructures (ESI) ASN 1 format for signature policies (V1 1 1)《电子签名和基础结构(ESI) 签字策略的ASN 1格式(版本1 1 1)》.pdf)为本站会员(fatcommittee260)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 102 272-2003 Electronic Signatures and Infrastructures (ESI) ASN 1 format for signature policies (V1 1 1)《电子签名和基础结构(ESI) 签字策略的ASN 1格式(版本1 1 1)》.pdf

1、 ETSI TR 102 272 V1.1.1 (2003-12)Technical Report Electronic Signatures and Infrastructures (ESI);ASN.1 format for signature policiesETSI ETSI TR 102 272 V1.1.1 (2003-12) 2 Reference DTR/ESI-000022 Keywords ASN.1, IP, electronic signature, security, e-commerce ETSI 650 Route des Lucioles F-06921 Sop

2、hia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org T

3、he present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI p

4、rinters of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.or

5、g/tb/status/status.asp If you find errors in the present document, send your comment to: editoretsi.org Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunica

6、tions Standards Institute 2003. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registe

7、red for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TR 102 272 V1.1.1 (2003-12) 3 Contents Intellectual Property Rights5 Foreword.5 Introduction 5 1 Scope 6 2 References 6 3 Definitions and abbreviations.7 3.1 Definitions7 3.2 Abbreviations .8 4 Signature Policy ove

8、rview8 5 Signature policy specification in informal free text form.9 6 Signature policy specification in ASN.1 12 6.1 Overall ASN.1 structure .13 6.2 Signature validation policy.13 6.3 Common Rules.14 6.4 Commitment Rules.14 6.5 Signer and Verifier Rules .15 6.5.1 Signer rules .15 6.5.2 Verifier rul

9、es.16 6.6 Certificate and revocation requirement 16 6.6.1 Certificate requirements16 6.6.2 Revocation requirements 17 6.7 Signing certificate trust conditions.18 6.8 Time-Stamp trust conditions 18 6.9 Attribute trust conditions19 6.10 Algorithm constraints .19 6.11 Signature policy extensions20 Anne

10、x A: ASN.1 modules.21 A.1 Signature policies definitions using X.208 (1988) ASN.1 syntax21 A.2 Signature policy definitions using X.680 (2002) ASN.1 syntax 24 Annex B: What is a signature policy and signature validation policy .29 B.0 Introduction 29 B.1 Identification of signature policy .30 B.2 Ge

11、neral signature policy information.31 B.3 Recognized commitment types 31 B.4 Rules for use of certification authorities 32 B.4.1 Trust points.32 B.4.2 Certification path32 B.5 Rules for the use of time-stamping and time-marking .33 B.5.1 Trust points and certificate paths33 B.5.2 Time-stamping autho

12、rity names .33 B.5.3 Timing constraints - cautionary period.33 B.5.4 Timing constraints - time-stamp delay .33 B.6 Revocation rules.34 B.7 Rules for the use of roles34 ETSI ETSI TR 102 272 V1.1.1 (2003-12) 4 B.7.1 Attribute values 34 B.7.2 Trust points for certified attributes .34 B.7.3 Certificatio

13、n path for certified attributes 34 B.8 Rules for verification data to be followed 35 B.9 Rules for algorithm constraints and key lengths 35 B.10 Other signature policy rules .35 B.11 Signature policy protection 35 Annex C: Bibliography 36 History 39 ETSI ETSI TR 102 272 V1.1.1 (2003-12) 5 Intellectu

14、al Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (I

15、PRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR sea

16、rches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by

17、ETSI Technical Committee Electronic Signatures and Infrastructures (ESI). Introduction Electronic commerce is emerging as the future way of doing business between companies across local, wide area and global networks. Trust in this way of doing business is essential for the success and continued dev

18、elopment of electronic commerce. It is therefore important that companies using this electronic means of doing business have suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with their business partners. In this respect the electroni

19、c signature is an important security component that can be used to protect information and provide trust in electronic business. The European Directive on a community framework for Electronic Signatures defines an electronic signature as: “data in electronic form which is attached to or logically as

20、sociated with other electronic data and which serves as a method of authentication“. An electronic signature as used in TS 101 733 and TS 101 903 (XAdES) (see bibliography) is a form of advanced electronic signature as defined in the Directive. An electronic signature produced in accordance with tho

21、se documents provides evidence that can be processed to get confidence that some commitment has been explicitly endorsed under a Signature policy, at a given time, by a signer under an identifier, e.g. a name or a pseudonym, and optionally a role. Although neither document does not mandate any form

22、of Signature Policy specification, TS 101 733 originally specified an ASN.1 based syntax that may be used to define a structured Signature Policy in a way that machines can read and process. Since TS 101 733 V1.4.0 only contains the description of the formats of Electronic Signatures using the ASN.1

23、 syntax, this document is basically an extract from the Signature Policy specification found in the original versions of TS 101 733 and using the ASN.1 syntax. At the time of publication of the present document, no implementation of the Signature Policy format using the ASN.1 syntax has been reporte

24、d. At the time of publication of the present document, two documents exist describing in detail the various components of a signature policy: using an XML syntax: TR 102 038 (XML format of signature policies), see bibliography; using an ASN.1 syntax: TR 102 272 (ASN.1 format of signature policies),

25、i.e. the present document. Further explanations and use of signature policies requirements for multiples signatures over a single document are published in TR 102 045 (see bibliography). ETSI ETSI TR 102 272 V1.1.1 (2003-12) 6 1 Scope The present document covers the aspects of Electronic Signature P

26、olicies that were defined in TS 101 733 v1 and other older versions of that document. No specific format is mandated for a signature policy specification. A signature policy may be specified either: in a free form document for human interpretation; or in a structured form using an agreed syntax and

27、encoding. The present document specifies the various components of a signature policy and one specific format using an ASN.1 syntax and DER encoding. 2 References For the purposes of this Technical Report (TR) the following references apply: 1 ITU-T Recommendation X.509 (1997) | ISO/IEC 9594-8 (1998

28、): “Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks“. 2 ITU-T Recommendation X.208 (1988): “Specification of Abstract Syntax Notation One (ASN.1)“. (withdrawn) 3 ITU-T Recommendation X.690 (2002) / ISO/IEC 8825-1 (2002): “Informa

29、tion technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)“. 4 ITU-T Recommendation F.1 (1998): “Operational provisions for the international public telegram service“. 5 IETF RFC 3494: “Lightweight Direct

30、ory Access Protocol“. 6 IETF RFC 3280: “Internet X.509 Public Key Infrastructure Certificate and CRL Profile“, see also RFC 3280 (April 2002). 7 IETF RFC 2560 (1999): “X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP“. 8 IETF RFC 3369: “Cryptographic Message Syntax“

31、. 9 IETF RFC 2634 (1999): “Enhanced Security Services for S/MIME“. 10 ISO 7498-2 (1989): “Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture“. 11 ISO/IEC 13888-1 (1997): “Information technology - Security techniques - Non-repudiation

32、 - Part 1: General“. 12 ITU-T Recommendation X.400 (1999): “Message handling services: Message handling system and service overview“. 13 ITU-T Recommendation X.500 (2001): “Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services“. 14 ITU-T Rec

33、ommendation X.501 (2001): “Information technology - Open Systems Interconnection - The Directory: Models“. 15 IETF RFC 2587 (1999): “Internet X.509 Public Key Infrastructure LDAPv2 Schema“. 16 ITU-T Recommendation X.680 (2002) / ISO/IEC 8824-1 (2002): “Information technology - Abstract Syntax Notati

34、on One (ASN.1): Specification of basic notation“. ETSI ETSI TR 102 272 V1.1.1 (2003-12) 7 17 IETF RFC 2450: “Proposed TLA and NLA Assignment Rule“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: arbitrator: arbitra

35、tor entity may be used to arbitrate a dispute between a signer and verifier when there is a disagreement on the validity of a digital signature Attribute Authority (AA): authority which assigns privileges by issuing attribute certificates Attribute Authority Revocation List (AARL): references to att

36、ribute certificates issued to AAs, that are no longer considered valid by the issuing authority Attribute Certificate Revocation List (ARL): revocation list containing a list of references to attribute certificates that are no longer considered valid by the issuing authority authority certificate: c

37、ertificate issued to an authority (e.g. either to a certification authority or to an attribute authority) cautionary period: period after the signing time that it is mandated the verifier shall wait to get high assurance of the validity of the signers key and that any relevant revocation has been no

38、tified Certificate Revocation List (CRL): signed list indicating a set of certificates that are no longer considered valid by the certificate issuer Certification Authority (CA): authority trusted by one or more users to create and assign certificates. Optionally the certification authority may crea

39、te the users keys NOTE: See ITU-T Recommendation X.509 1. digital signature: data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient NOTE: See IS

40、O 7498-2 10. public key certificate: public keys of a user, together with some other information, rendered unforgeable by encipherment with the private key of the certification authority which issued it NOTE: See ITU-T Recommendation X.509 1. Rivest-Shamir-Adleman (RSA): highly secure cryptography m

41、ethod using a two-part key signature policy: set of rules for the creation and validation of an electronic signature, under which the signature can be determined to be valid signature policy issuer: entity that defines the technical and procedural requirements for electronic signature creation and v

42、alidation, in order to meet a particular business need signature validation policy: part of the signature policy which specifies the technical requirements on the signer in creating a signature and verifier when validating a signature signer: entity that creates an electronic signature Time-Stamping

43、 Authority (TSA): trusted third party that creates time stamp tokens in order to indicate that a datum existed at a particular point in time Trusted Service Provider (TSP): entity that helps to build trust relationships by making available or providing some information upon request valid electronic

44、signature: electronic signature which passes validation according to a signature validation policy ETSI ETSI TR 102 272 V1.1.1 (2003-12) 8 verifier: entity that verifies an evidence NOTE 1: See ISO/IEC 13888-1 11. NOTE 2: Within the context of the present document this is an entity that validates an

45、 electronic signature. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: AA Attribute Authority API Application Program Interface ARL Authority Revocation List ASN.1 Abstract Syntax Notation 1 CA Certification AuthorityCAD Card Accepting Device CMS Crypto

46、graphic Message Syntax CRL Certificate Revocation List DER Distinguished Encoding Rules (for ASN.1) ES Electronic Signature ES-T Electronic Signature with Timestamp MIME Multipurpose Internet Mail Extensions OCSP Online Certificate Status Provider OID Object Identifier PKIX internet X.509 Public Key

47、 Infrastructure RSA Rivest-Shamir-Adleman SHA-1 Secure Hash Algorithm 1 (see annex E on cryptographic algorithms) TSA Time-Stamping Authority TSP Trusted Service Provider URI Uniform Resource Identifier URL Uniform Resource Locator XML eXtensible Markup Language 4 Signature Policy overview The Signa

48、ture Policy is a set of rules for the creation and validation of an electronic signature, under which the signature can be determined to be valid. A given legal/contractual context may recognize a particular signature policy as meeting its requirements. The signature policy may be explicitly identif

49、ied or may be implied by the semantics of the data being signed and other external data like a contract being referenced which itself refers to a signature policy. An explicit signature policy has a globally unique reference, which is bound to an electronic signature by the signer as part of the signature calculation. The signature policy needs to be available in human readable form so that it can be assessed to meet the requirements of the legal and contractual context in which it is being applied. To facilitate the automatic

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1