2024-12-27 | Work Programme | Version 2.3.3 |
Work Item Reference | ETSI Doc. Number |
STF | Technical Body in Charge |
Download Standard |
|||
RTS/ESI-000039-2 | TS 102 176-2 | 263ext | ESI | ||||
Current Status (Click to View Full Schedule) |
Latest Version |
Cover Date | Standstill | Creation Date | |||
|
1.2.1 | 2005-07-12 | View Standstill Information | 2004-10-08 | |||
Rapporteur | Technical Officer | Harmonised Standard | |||||
Denis Pinkas | Dionisio Zumerle | No | |||||
Title |
Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms for signature creation devices "Algo" paper |
||||||
Scope and Field of Application |
This document defines an initial set of algorithms and the corresponding parameters to be included in a list of approved methods for producing or verifying Electronic Signatures during the signature creation and validation process and environment, in trusted CSP components and other technical components and related areas. The purpose of the WI is to provide common specifications to be referenced by the set of standards, which cover systems and services involving electronic signatures. The standards addressed in the first place are the EESSI deliverables by ETSI and CEN. The objective of the specification is to provide for technical interoperability and for consistency of cryptographic strength of electronic signatures used within those systems and services. The document defines a list of approved cryptographic algorithms combined with the requirements on their parameters, as well as the approved combinations of algorithms in the form of "signature suites". To support the management activities, a numbering scheme for cryptographic algorithms and their parameters is defined. Part 1 will be targeted to define a list of cryptographic algorithms together with the requirements on their parameters, as well as the recommended combinations of algorithms in the form of "signature suites" to be used with the data structures defined in the documents developed under the EESSI (European Electronic Signature Standardization Initiative). Part 2 aims to define a list of protocols and symmetric algorithms to be used to construct a secure channel between an application and a signature creation device providing either only integrity or both integrity and confidentiality. Such a secure channel may be used during the operational phase of a signature creation device to remotely download a private key in the signature creation device, remotely extract a public key from the signature creation device when the key pair has been generated by the signature creation device or/and remotely download a public key certificate and associate it with a private key already stored in the signature creation device. |
||||||
Supporting Organizations |
Deutsche Telekom, SNG, Telenor, TeliaSonera |
|
Keywords | Projects | Clusters | Frequencies | Mandates | Directives | ||||
e-commerce ELECTRONIC SIGNATURE SECURITY |
e-commerce eEurope eEurope2005_Security Electronic Signatures |
Security |
||||||||
Official Journal |
|
|||||||||
Remarks |
|
Any comments or problems with this application? Please let us know... | ||