UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ETSI - TS 102 176-1

Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms

active, Most Current
Organization: ETSI
Publication Date: 1 July 2011
Status: active
Page Count: 66
scope:

The present document is targeted to support advanced electronic signatures and the related infrastructure.

The present document defines a list of hash functions and a list of signature schemes, as well as the recommended combinations of hash functions and signatures schemes in the form of "signature suites".

The primary criteria for inclusion of an algorithm in the present document are:

the algorithm is considered as secure;

the algorithm is commonly used; and

the algorithm can easily be referenced (for example by means of an OID).

This does not mean that other hash functions and signature suites cannot be used, but either they do not correspond to the above criteria or their security has not been assessed.

The document also provides guidance on the hash functions, signature schemes and signature suites to be used with the data structures used in the context of electronic signatures. For each data structure, the set of algorithms to be used is specified. Each set is identified by an identifier which is either an OID (Object IDENTIFIER) or a URI /URN.

The use of such identifiers is necessary so that interoperability can be achieved. In order to allow for data interchange, the document references algorithms in terms of OIDs and URIs / URNs together with algorithm parameters.

Different requirements apply to the issuers and to the users of the data structures in order to allow for interoperability.

RFC documents use the terms SHALL, SHOULD, MAY, RECOMMENDED in order to allow for interoperability. The same terminology is used in the present document (see RFC 2119 [25]).

Issuers of the data structures (e.g. CSPs, CRL Issuers, OCSP responders, TSUs) need to know the algorithms and key sizes they SHOULD or MAY support. There SHOULD be at least one algorithm recommended to support, but may be more than one.

Users of the data structures (i.e. signers or verifiers of electronic signatures) need to know the algorithms and key sizes they SHALL, SHOULD or MAY support. Users may support more than one algorithm for each data structure.

These requirements are listed in annex A.

Annex B provides historical information on the recommended hash functions, algorithms and key sizes for the generation and verification of electronic signatures. This annex will be periodically updated.

Annex C provides more information on the generation of RSA modulus.

Annex D provides more information on the generation of elliptic curve domain parameters.

Annex E addresses the generation of random data.

Annex F lists the algorithm identifiers defined in various documents.

Annex G provides a short abstract of ISO/IEC 10118-3 [3] and ISO/IEC 9796-2 [17].

Annex H provides some guidance on signature maintenance.

Annex I lists the major changes from the previous versions.

The present document defines a set of algorithms (i.e. hash functions, signature schemes and signature suites) and the corresponding parameters that are recommended to be used. If such algorithms are used according to the context where they are expected to be used, then a reasonable security level can be assumed.

The algorithms defined in the present document are usable in particular with the following documents:

• TS 101 733 [18]: "Electronic Signatures and Infrastructures (ESI); Electronic Signature Formats";

• TS 101 903 [19]: "XML Advanced Electronic Signatures (XAdES)";

NOTE: XML language is defined in RFC 3275 [10].

• TS 101 861 [20]: "Time stamping profile";

• TS 101 456 [32]: "Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates";

• TS 102 042 [33]: "Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates";

• EN 14169 [34]: Protection profiles for Secure signature creation device;

• CWA 14170 [35]: "Security requirements for signature creation applications";

• CWA 14171 [36]: "Procedures for electronic signature verification";

• CWA 14167-1 [37]: "Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - Part 1: System Security Requirements";

• CWA 14167-2 [38]: "Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - Part 2: Cryptographic module for CSP Signing Operations with Backup - Protection Profile";

• CWA 14167-3 [39]: "Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - Part 3: Cryptographic module for CSP key generation services - Protection profile (CMCKG-PP)";

• CWA 14167-4 [40]: "Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - Part 4: Cryptographic module for CSP signing operations - Protection profile - CMCSO PP";

• RFC 5280 [2]: "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile";

• RFC 5755 [i.22]: "An Internet Attribute Certificate profile for authorization";

• RFC 3161 [9]: "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)";

• RFC 2560 [22]: "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP".

The CWA documents are processed by CEN/TC224 for re-issuing as European Norms.

Patent related issues are out of the scope of the present document.

Document History

TS 102 176-1
July 1, 2011
Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms
The present document is targeted to support advanced electronic signatures and the related infrastructure. The present document defines a list of hash functions and a list of signature schemes, as...
November 1, 2007
Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms
The present document is targeted to support advanced electronic signatures and the related infrastructure. The present document defines a list of hash functions and a list of signature schemes, as...
July 1, 2005
Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms
The present document is targeted to support advanced electronic signatures and the related infrastructure. The present document defines a list of hash functions and a list of signature schemes, as...

References

Advertisement