S 2.265 Proper use of digital signatures in archiving

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Archive Administrator, IT Security Officer, Administrator, Head of IT

Digital signatures are a challenge for electronic archiving since, for technical reasons, they have a limited lifetime which is not always known in advance. On the other hand, they are necessary if electronic documents have to be archived in such a way that their evidentiary value is ensured. The significance of digital signatures depends highly on the interpretation at the time of examination and therefore on the so-called validity model. Also, no long-term practical experience with the archiving of digitally signed documents is available to date since digital signatures haven only been used in practice for a few years.

Validity and evidentiary value

These two characteristics of a signature are usually defined as follows: A digital signature is valid, if

A digital signature has evidentiary value, if

Significance of digital signatures

Digital signatures can be used for various purposes, including:

The use and the significance of digital signatures must be specified for the specific application within the scope of a security policy. The following, among other things, should be specified in this policy:

The policy must be documented in writing and archived to ensure that the meaning (i.e. the evidentiary value) of the signature is obvious during a subsequent verification. In addition, it should be published in a suitable form so that all persons who need or want to trust this signature can refer to it.

Lifetime of digital signatures

The lifetime of digital signatures is restricted by the technical development of hardware and software as well as the progress in the field of cryptography (see T 2.79 Ineffectual regeneration of digital signatures during archiving and T 4.47 Obsolescence of cryptographic procedures). It must be assumed that digital signatures become obsolete after approx. 5 years due to their decreasing significance. For this reason, trust centres should issue key certificates and time stamps for a maximum of 5 years. However, they can also be declared invalid at short notice, if this should be necessary. This is referred to as blocking.

Blocking of key certificates

If key certificates are blocked by the certification instance, for example, because the signature keys are compromised, action must be taken quickly. All signatures generated with the corresponding key after that time lose their factual significance (e.g. evidentiary value). However, the validity of the signatures also depends on the validity model. In contrast to the shell model, the chain model initially does not require any further action in case of compromised keys.

This may have direct consequences on the significance of archived documents. If the archived documents affected are only signed with the invalid key, then, depending on the validity model used, this signature has no more evidentiary value.

Recommendation

There are currently no proven standards for the archiving of digitally signed documents which could be applied to ensure the long-term validity and evidentiary value of signatures. Therefore, the following recommendations should be taken into account with regard to the threats arising during long-term archiving until corresponding standards have been established:

Archiving models

The following describes different models for archiving of digitally signed documents. The archiving of key management information such as certificates or blocking lists will not be considered yet.

As long as it is not relevant for the described models whether the original document contains one or several signatures, reference will be made to one original signature. Multiple original signatures will only be mentioned if they change the method of operation of the archiving model.

The description of the models is structured according to the following aspects:

The description is followed by a brief discussion of the different models.

Model 1: Archiving body with receipt stamping

Model 2: Archiving body with confirmation stamping

Model 3: Trust centre with time stamp service

Model 4: Trust centre with archive stamp service

Discussion of the models

The lower the trust of the users in the archiving body is, the more effort is required for archiving of digitally signed documents with evidentiary value.

If full trust in the archiving body exists, model 2 can be applied. It is the most convenient model for a user because he/she is informed of the evidentiary value of the original signature upon retrieval of the archived document. The user trusts that the information provided by the archiving body is correct. He/she does not have any control capabilities beyond this. If the user wants to convince a third party of the evidentiary value of the original signature, he/she can merely refer to the answer by the archiving body and to their trustworthiness supported by archiving policies.

In model 1, the user must verify the evidentiary value of the original signature of the retrieved document. The archiving body merely supplies the time when it received the document. Just like the user, a third party can carry out the verification of the evidentiary value, but must trust the time indicated by the archiving body.

Both models have the advantage that the organisational effort by the archiving body is restricted to a minimum: No further treatment of the document is required after archiving. The archiving itself serves seals the original signature for the entire archiving period. According to this, the integrity of the database in the archive is critical. Unauthorised adding of data may result in forged signatures being recognised as having evidentiary value.

In models 3 and 4, however, the integrity of the archived data is protected by digital signatures. This prevents forged signed documents being recognised as having evidentiary value if they were introduced to the archive without authorisation.

Another trust-increasing safeguard in models 3 and 4 is the possibility to divide the responsibilities for document storage and signature sealing between different bodies: archiving body and trust centre.

The necessary trust in the archiving body, as usually is the case with archiving, is limited to the storage of documents. In addition, successful archiving of digitally signed documents requires regular communication with the trust centre. Every document received must first be provided with a time stamp by the trust centre since the time of document receipt by the archiving body is decisive for subsequent verification of the evidentiary value.

In model 4, the trust centre regularly confirms the proper archiving up to current time by verifying the evidentiary value of the previous archive signature of the document and replacing this signature by a new archive signature. As a result, the interval between the end of the evidentiary value of the time stamp and the time of the last archive stamp is continuously increased. Therefore, the archive signature confirms the evidentiary value of the time stamp only as long as archive stamping in the trust centre works properly. This applies in particular to the verification of the evidentiary value of the previous archive signature. Without this verification, the archiving body may submit forged signed documents for archive stamping which will then receive evidentiary value. The user must consequently trust that archive stamping by the trust centre is executed properly.

In model 3, the user can monitor the continuous execution of regular signature sealing. The only service required by the trust centre is time stamping. This time stamping is not specific for archiving and does not include any verification. The trust centre provides the presented document with the current time and a signature without looking at it. Trustworthy time stamping is therefore generally easier to implement than archive stamping with a comparable level of trust.

Models 3 and 4 offer a higher level of trustworthiness compared to models 1 and 2, but also make it more complicated for the user to verify the evidentiary value of the original signature. In model 3, an entire chain of time stamps needs to be checked for their evidentiary value in addition to the evidentiary value of the original signature at the time of the first time stamp, whereas in model 4 only the evidentiary value of the archive signature needs to be checked.

There are currently no proven standards for long-term archiving of digital signatures. Uniform concepts and standards still need to be established here, and the persons responsible for electronic archiving should therefore keep themselves informed of the developments in the field of digital signatures. Accordingly, the models described above are only intended as an example. Other methods for archiving of digitally signed documents may well be possible.

Review questions: