SlideShare ist ein Scribd-Unternehmen logo
1 von 52
© 2015, iText Group NV, iText Software Corp., iText Software BVBA© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital Signatures: how it’s done in PDF
UGent (July 1, 2015)
© 2015, iText Group NV, iText Software Corp., iText Software BVBA© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Agenda
• Why do we need digital signatures?
• Basic concepts…
• … applied to PDF
• Architectures: server-side vs. client-side
• Digital signatures and document workflow
• Long term validation
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF3
Why do we need digital signatures?
Integrity
Authenticity
Non-repudiation
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Integrity
Digital signatures: how it's done in PDF4
I paid a forged invoice
and lost 30K€ !
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Authenticity
Digital signatures: how it's done in PDF5
Why am I, Emperor Constantine I,
in this picture? I never transferred
authority to the Pope!
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Non-repudiation
Digital signatures: how it's done in PDF6
I didn’t do it!
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Three goals
Integrity — we want assurance that the document
hasn’t been changed somewhere in the workflow.
Authenticity — we want assurance that the author
of the document is who we think it is (and not
somebody else).
Non-repudiation — we want assurance that the
author can’t deny his authorship.
Digital signatures: how it's done in PDF7
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF8
Basic Concepts…
Hashing algorithms
Encryption algorithms
Certificate Authorities
Digital signatures
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 1: Integrity check using hash
Digital signatures: how it's done in PDF9
Document
Generate Hash
AF1B4C...D34E
Secure
Server /
Website
Retrieve Hash
AF1B4C...D34E
Compare!
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 1: Hashing
Hashing algorithm
a cryptographic hash function to turn an arbitrary block of data into a fixed-size
bit string.
Available algorithms
MD5: Ron Rivest (deprecated)
SHA:
SHA-1: NSA (phased out!)
SHA-2: NSA / NIST
SHA-3: Keccak (made in Belgium!)
RIPEMD: KULeuven
Digital signatures: how it's done in PDF10
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 2: Encryption
Assymetric key algorithms
Encryption
Digital signing
Digital signatures: how it's done in PDF11
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 2: Some name dropping
Public Key Cryptography Standards
PKCS#1: RSA Cryptography Standard (Rivest, Shamir, Adleman)
PKCS#7: Cryptographic Message Standard (CMS)
PKCS#11: Cryptographic Token Interface
PKCS#12: Personal Information Exchange Syntax Standard
PKCS#13: Elliptic Curve Cryptography Standard (ECDSA)
Federal Information Processing Standards (FIPS)
DSA: Digital Signature Algorithm (DSA)
European Telecommunications Standards Institute (ETSI)
CMS Advanced Electronic Signatures (CAdES)
Digital signatures: how it's done in PDF12
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 3: Certificate Authorities
Digital signatures: how it's done in PDF13
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 3: example
Digital signatures: how it's done in PDF14
Self-signed:
Signed by Adobe:
Signed by GlobalSign:
Signed by GlobalSign
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 3: example
Digital signatures: how it's done in PDF15
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 3: the green check mark
PKCS#12: Personal Information Exchange Syntax Standard
public and private key are stored in a file
PKCS#11: Cryptographic Token Interface
public and private key are stored on a device
In the context of PDF:
 Certified Document Services (CDS): Adobe’s root certificate
 Adobe Approved Trust List (AATL): Trusted root certificates (since Acrobat 9)
Digital signatures: how it's done in PDF16
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 1 + Concept 2 + Concept 3
Producer
Provides data as-is: [A]
Provides hash of data, encrypted using private key: [B]
Provides public key
Consumer
Creates hash from data [A]: hash1
Decrypts hash [B] using public key: hash2
If (hash1 == hash2) document OK!
Digital signatures: how it's done in PDF17
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Goals met?
Integrity
Hashes are identical
Authenticity
Identity is stored in public key provided by CA
A time-stamp can be added
Non-repudiation
If hash can be decrypted with public key, the document
was signed with the corresponding private key
Digital signatures: how it's done in PDF18
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Differences between EU and US
In the US, we make a distinction
Electronic signatures don’t necessarily involve PKI
Digital signatures when a PKI infrastructure is involved
In Europe, we speak of electronic signatures
As a synonym for digital signatures
All laws and regulations take this wording
There’s no sharp distinction between electronic and digital signatures (which
leads to confusion)
I always speak of digital signatures
Digital signatures: how it's done in PDF19
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF20
… Applied to PDF
ISO 32000-1
ETSI TS 102 778 (PAdES)
ISO 32000-2
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Standards
ISO
ISO-32000-1 (2008) based on PDF 1.7 (2006)
ISO-32000-2 will define PDF 2.0 (2016)
ETSI: TS 102 778 (2009 - 2010)
PAdES 1: Overview
PAdES 2: Basic – CMS based (ISO-32000-1)
PAdES 3: Enhanced – CAdES based (ISO-32000-2)
PAdES 4: LTV – Long Term Validation
PAdES 5: XAdES based (XML content)
PAdES 6: Visual representation guidelines
ETSI: TS 103 172 (2011 - 2013)
PAdES Baseline Profile
Digital signatures: how it's done in PDF21
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Signatures in PDF
There are no bytes in the PDF
that aren’t covered, other than
the PDF signature itself. (*)
The digital signature isn’t part
of the ByteRange.
The concept “to initial a
document” doesn’t exist; you
sign the complete document at
once, not on a page per page
basis. (*)
Digital signatures: how it's done in PDF22
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
What’s inside a signature?
Digital signatures: how it's done in PDF23
ISO-32000-2:
At minimum the PKCS#7 object shall include
the signer’s X.509 signing certificate. This
certificate shall be used to verify the
signature value in /Contents.
Best practices (“should” also have):
• Full certificate chain
• Revocation information (CRL / OCSP)
• Timestamp
%PDF-1.x
...
/ByteRange ...
/Contents<
>...
%%EOF
DIGITAL SIGNATURE
• Signed Message Digest
• Certificate chain
• Revocation information
• Timestamp
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF24
Architectures
Server-side signing
Client-side signing
Deferred signing
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Server-side signing
Digital signatures: how it's done in PDF25
<</Type/Sig/
/Contents <
%PDF-1.x
...
...
%%EOF
>>>
Signed Message
Digest
Application DeviceSERVER
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Use cases server-side signing
Company signature
Invoices
Contracts
…
Signing services in the Cloud
Docusign
Echosign
…
Security management responsibilities!
Digital signatures: how it's done in PDF26
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Client-side signing
Digital signatures: how it's done in PDF27
<</Type/Sig/
/Contents <
%PDF-1.x
...
...
%%EOF
>>>
Signed Message
Digest
ApplicationDevice CLIENT
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Use cases client-side signing
Desktop applications
Adobe Acrobat Pro
Adobe Reader (for Reader-enabled documents)
Home-made, e.g. using iText
In a web context
The PDF software runs on the client, e.g. using Java Web Start
Access to the token or smart card through
MSCAPI
PKCS#11
Custom smart card library
Security
User has smart card and PIN or USB token and passphrase
Digital signatures: how it's done in PDF28
1 signature / second
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Deferred signing
Digital signatures: how it's done in PDF29
Signed
Message
Digest
AppDevice
CLIENT
<</Type/Sig/
/Contents <
%PDF-1.x
...
...
%%EOF
>>>
Application
SERVER
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Use cases deferred signing
Signing on an iPad/Tablet
App on the device has a low footprint
Easy to integrate into a document management system
Example: eaZySign (Zetes)
Disadvantage
At most 1 signature / second
You need to trust the server that the hash you receive is actually the hash of the
document you want to sign.
ISAE 3000
the standard for assurance over non-financial information. ISAE3000 is issued by the
International Federation of Accountants (IFAC). The standard consists of guidelines for
the ethical behavior, quality management and performance of an ISAE3000
engagement. Generally ISAE3000 is applied for audits of internal control,
sustainability and compliance with laws and regulations.
Digital signatures: how it's done in PDF30
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF31
Digital signatures and workflow
Author signatures
Recipient signatures
Locking fields / documents
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Serial signatures
32
%PDF-1.x
% Original document
% Additional content 1
...
...
%%EOF
DIGITAL SIGNATURE 1
...
%%EOF
DIGITAL SIGNATURE 2
% Additional content 2
...
...
%%EOF
DIGITAL SIGNATURE 3
Rev1
Rev2
Rev3
A PDF document
can be signed more
than once, but
parallel signatures
aren’t supported,
only serial
signatures:
additional
signatures sign all
previous signatures.
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: types
Certification (aka author) signature
Only possible for the first revision
Involves modification detection permissions:
No changes allowed
Form filling and signing allowed
Form filling, signing and commenting allowed
Approval (aka recipient) signature
Workflow with subsequent signers
New in PDF 2.0: modification detection permissions
Digital signatures: how it's done in PDF33
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Other possible icons
Signer’s
identity is
unknown
Document
has been
altered or
corrupted
Digital signatures: how it's done in PDF34
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Certified by Alice
Digital signatures: how it's done in PDF35
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Read, approved and signed by Bob
Digital signatures: how it's done in PDF36
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Bob’s signature invalidated by Chuck
Digital signatures: how it's done in PDF37
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Read, approved and signed by Carol
Digital signatures: how it's done in PDF38
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Read, approved and signed by Dave
Digital signatures: how it's done in PDF39
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Signature and lock broken by Chuck
Digital signatures: how it's done in PDF40
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF41
Long-term validation
Revocation
Timestamps
LTV
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Certificates expire
Digital signatures: how it's done in PDF42
Expiration date
2013 2014 2015
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Certificates get revoked
Digital signatures: how it's done in PDF43
Expiration dateRevocation date
2013 2014 2015
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
CA: CRL and OCSP
Digital signatures: how it's done in PDF44
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Concept 3: example
Digital signatures: how it's done in PDF45
Self-signed:
Signed by Adobe:
Signed by GlobalSign:
Signed by GlobalSign
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
How to survive revocation / expiration?
Digital signatures: how it's done in PDF46
Expiration dateRevocation date
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Timestamps
Digital signatures: how it's done in PDF47
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
What to do when:
There’s no CRL/OCSP/TS in the document?
The certificate is about to expire in one of
your documents?
The hashing/encryption algorithm is about
to be deprecated?
Digital signatures: how it's done in PDF48
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Document Security Store (DSS)
Digital signatures: how it's done in PDF49
%PDF-1.x
...
/ByteRange ...
/Contents<
>...
%%EOF
DIGITAL SIGNATURE
• Signed Message Digest
• Certificate
%PDF-1.x
...
/ByteRange ...
/Contents<
>...
%%EOF
DSS for DIGITAL SIGNATURE
• VRI, Certs, OCSPs, CRLs
DIGITAL SIGNATURE
• Signed Message Digest
• Certificate
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Document-level timestamp
Digital signatures: how it's done in PDF50
%PDF-1.x
...
/ByteRange ...
/Contents<
>...
%%EOF
DSS for DIGITAL SIGNATURE
• VRI, Certs, OCSPs, CRLs
%PDF-1.x
...
/ByteRange ...
/Contents<
>...
%%EOF
DSS for DIGITAL SIGNATURE
• VRI, Certs, OCSPs, CRLs
DOCUMENT TIMESTAMP TS1
ETSI.RFC3161
DIGITAL SIGNATURE
• Signed Message Digest
• Certificate
DIGITAL SIGNATURE
• Signed Message Digest
• Certificate
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF51
%PDF-1.x
...
/ByteRange ...
/Contents<
>...
%%EOF
DSS for DIGITAL SIGNATURE
• VRI, Certs, OCSPs, CRLs
DOCUMENT TIMESTAMP TS1
%PDF-1.x
...
/ByteRange ...
/Contents<
>...
%%EOF
DSS for DIGITAL SIGNATURE
• VRI, Certs, OCSPs, CRLs
DOCUMENT TIMESTAMP TS1
DSS for TS1
DOCUMENT TIMESTAMP TS2
DIGITAL SIGNATURE
• Signed Message Digest
• Certificate
DIGITAL SIGNATURE
• Signed Message Digest
• Certificate
© 2015, iText Group NV, iText Software Corp., iText Software BVBA
Digital signatures: how it's done in PDF52
Questions?
itextpdf.com
SG: sales.isa@itextpdf.com +65 31 58 39 47
BE: sales.isb@itextpdf.com +32 92 98 02 31
US: sales.isc@itextpdf.com +1 617 982 646

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basicsRomit Bose
 
Titulos valores incompletos 2015
Titulos valores incompletos 2015Titulos valores incompletos 2015
Titulos valores incompletos 2015Alex Paredes
 
Building a blockchain on tendermint
Building a blockchain on tendermintBuilding a blockchain on tendermint
Building a blockchain on tendermintLviv Startup Club
 
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)Svetlin Nakov
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
 
Brand New Web3 Wallet
Brand New Web3 WalletBrand New Web3 Wallet
Brand New Web3 Walletssuser7259e6
 
Financial crimes compliance and enforcement trends 2019
Financial crimes compliance and enforcement trends 2019Financial crimes compliance and enforcement trends 2019
Financial crimes compliance and enforcement trends 2019Joseph V. Moreno
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Blockchain, cryptography, and consensus
Blockchain, cryptography, and consensusBlockchain, cryptography, and consensus
Blockchain, cryptography, and consensusITU
 
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemParas Jain
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer SecurityByronKimani
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionRoland Stadler
 

Was ist angesagt? (20)

Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
 
Titulos valores incompletos 2015
Titulos valores incompletos 2015Titulos valores incompletos 2015
Titulos valores incompletos 2015
 
Building a blockchain on tendermint
Building a blockchain on tendermintBuilding a blockchain on tendermint
Building a blockchain on tendermint
 
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
Blockchain Cryptography for Developers (Nakov @ BGWebSummit 2018)
 
SSL
SSLSSL
SSL
 
Public private key
Public private keyPublic private key
Public private key
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
El cheque
El chequeEl cheque
El cheque
 
Brand New Web3 Wallet
Brand New Web3 WalletBrand New Web3 Wallet
Brand New Web3 Wallet
 
Financial crimes compliance and enforcement trends 2019
Financial crimes compliance and enforcement trends 2019Financial crimes compliance and enforcement trends 2019
Financial crimes compliance and enforcement trends 2019
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Syslog Protocols
Syslog ProtocolsSyslog Protocols
Syslog Protocols
 
Blockchain, cryptography, and consensus
Blockchain, cryptography, and consensusBlockchain, cryptography, and consensus
Blockchain, cryptography, and consensus
 
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
El pagaré
El pagaréEl pagaré
El pagaré
 
Doumentación mercantil 2013
Doumentación mercantil 2013Doumentación mercantil 2013
Doumentación mercantil 2013
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introduction
 

Andere mochten auch

Four failures and one hit
Four failures and one hitFour failures and one hit
Four failures and one hitBruno Lowagie
 
A Hippopotamus for Christmas
A Hippopotamus for ChristmasA Hippopotamus for Christmas
A Hippopotamus for ChristmasBruno Lowagie
 
Startup Legal and IP
Startup Legal and IPStartup Legal and IP
Startup Legal and IPBruno Lowagie
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFiText Group nv
 
Doing business in the US: Yes, You Can!
Doing business in the US: Yes, You Can!Doing business in the US: Yes, You Can!
Doing business in the US: Yes, You Can!Bruno Lowagie
 

Andere mochten auch (6)

Four failures and one hit
Four failures and one hitFour failures and one hit
Four failures and one hit
 
A Hippopotamus for Christmas
A Hippopotamus for ChristmasA Hippopotamus for Christmas
A Hippopotamus for Christmas
 
ZUGFeRD: an overview
ZUGFeRD: an overviewZUGFeRD: an overview
ZUGFeRD: an overview
 
Startup Legal and IP
Startup Legal and IPStartup Legal and IP
Startup Legal and IP
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
Doing business in the US: Yes, You Can!
Doing business in the US: Yes, You Can!Doing business in the US: Yes, You Can!
Doing business in the US: Yes, You Can!
 

Ähnlich wie Digital Signatures in PDF: how it's done

ETDA Conference - Digital signatures: how it's done in PDF
ETDA Conference - Digital signatures: how it's done in PDFETDA Conference - Digital signatures: how it's done in PDF
ETDA Conference - Digital signatures: how it's done in PDFiText Group nv
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFiText Group nv
 
Digital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case StudyDigital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case StudyiText Group nv
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)Dania Rashid
 
[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise apps[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise appsOWASP EEE
 
Digital leadership event ipt und swisscom 28.10.2015
Digital leadership event ipt und swisscom 28.10.2015Digital leadership event ipt und swisscom 28.10.2015
Digital leadership event ipt und swisscom 28.10.2015Noemi Haag
 
IANAL: what developers should know about IP and Legal
IANAL: what developers should know about IP and LegalIANAL: what developers should know about IP and Legal
IANAL: what developers should know about IP and LegaliText Group nv
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO Alliance
 
Xybermotive introduction (en) 092014
Xybermotive introduction (en) 092014Xybermotive introduction (en) 092014
Xybermotive introduction (en) 092014Hans-Chr. Brockmann
 
V3.1.Ds Generic Presentation Pptshow [Autosaved]
V3.1.Ds Generic Presentation Pptshow [Autosaved]V3.1.Ds Generic Presentation Pptshow [Autosaved]
V3.1.Ds Generic Presentation Pptshow [Autosaved]Robert Grawet
 
Docuten Webinar: Get ready for your vacations with the digital signature inte...
Docuten Webinar: Get ready for your vacations with the digital signature inte...Docuten Webinar: Get ready for your vacations with the digital signature inte...
Docuten Webinar: Get ready for your vacations with the digital signature inte...Innova Advanced Consulting
 
Sinadura Cebit 2012
Sinadura Cebit 2012Sinadura Cebit 2012
Sinadura Cebit 2012zylk net
 

Ähnlich wie Digital Signatures in PDF: how it's done (20)

ETDA Conference - Digital signatures: how it's done in PDF
ETDA Conference - Digital signatures: how it's done in PDFETDA Conference - Digital signatures: how it's done in PDF
ETDA Conference - Digital signatures: how it's done in PDF
 
Document Processing Made Better - Hadi Harb, Apryse
Document Processing Made Better - Hadi Harb, ApryseDocument Processing Made Better - Hadi Harb, Apryse
Document Processing Made Better - Hadi Harb, Apryse
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
ECM & Digital Signature
ECM & Digital SignatureECM & Digital Signature
ECM & Digital Signature
 
Digital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case StudyDigital Signatures in the Cloud: A B2C Case Study
Digital Signatures in the Cloud: A B2C Case Study
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)
 
[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise apps[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise apps
 
Owasp digi ms_v1_
Owasp digi ms_v1_Owasp digi ms_v1_
Owasp digi ms_v1_
 
Digital leadership event ipt und swisscom 28.10.2015
Digital leadership event ipt und swisscom 28.10.2015Digital leadership event ipt und swisscom 28.10.2015
Digital leadership event ipt und swisscom 28.10.2015
 
IANAL: what developers should know about IP and Legal
IANAL: what developers should know about IP and LegalIANAL: what developers should know about IP and Legal
IANAL: what developers should know about IP and Legal
 
BeingSign blockchain-based online signing system|Introduction
BeingSign blockchain-based online signing system|IntroductionBeingSign blockchain-based online signing system|Introduction
BeingSign blockchain-based online signing system|Introduction
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
 
GBM Digital Hub
GBM Digital HubGBM Digital Hub
GBM Digital Hub
 
Xybermotive introduction (en) 092014
Xybermotive introduction (en) 092014Xybermotive introduction (en) 092014
Xybermotive introduction (en) 092014
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
V3.1.Ds Generic Presentation Pptshow [Autosaved]
V3.1.Ds Generic Presentation Pptshow [Autosaved]V3.1.Ds Generic Presentation Pptshow [Autosaved]
V3.1.Ds Generic Presentation Pptshow [Autosaved]
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
Docuten Webinar: Get ready for your vacations with the digital signature inte...
Docuten Webinar: Get ready for your vacations with the digital signature inte...Docuten Webinar: Get ready for your vacations with the digital signature inte...
Docuten Webinar: Get ready for your vacations with the digital signature inte...
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Sinadura Cebit 2012
Sinadura Cebit 2012Sinadura Cebit 2012
Sinadura Cebit 2012
 

Mehr von Bruno Lowagie

The Dark Magic of Start-Up Valuation
The Dark Magic of Start-Up ValuationThe Dark Magic of Start-Up Valuation
The Dark Magic of Start-Up ValuationBruno Lowagie
 
Open Source Survival: A Story from the Trenches
Open Source Survival: A Story from the TrenchesOpen Source Survival: A Story from the Trenches
Open Source Survival: A Story from the TrenchesBruno Lowagie
 
Entreprenerd: presenting the book
Entreprenerd: presenting the bookEntreprenerd: presenting the book
Entreprenerd: presenting the bookBruno Lowagie
 
The Secret of your Success
The Secret of your SuccessThe Secret of your Success
The Secret of your SuccessBruno Lowagie
 
Blockchain: use cases for the future
Blockchain: use cases for the futureBlockchain: use cases for the future
Blockchain: use cases for the futureBruno Lowagie
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain FundamentalsBruno Lowagie
 
How can large open source projects be monetized?
How can large open source projects be monetized?How can large open source projects be monetized?
How can large open source projects be monetized?Bruno Lowagie
 
Open source: an introduction to IP and Legal
Open source: an introduction to IP and LegalOpen source: an introduction to IP and Legal
Open source: an introduction to IP and LegalBruno Lowagie
 
How can large open source projects be monetized?
How can large open source projects be monetized?How can large open source projects be monetized?
How can large open source projects be monetized?Bruno Lowagie
 
Waarom iText de Leeuw van de Export 2016 moet winnen
Waarom iText de Leeuw van de Export 2016 moet winnenWaarom iText de Leeuw van de Export 2016 moet winnen
Waarom iText de Leeuw van de Export 2016 moet winnenBruno Lowagie
 
Belgium and the US: a mutual introduction
Belgium and the US: a mutual introductionBelgium and the US: a mutual introduction
Belgium and the US: a mutual introductionBruno Lowagie
 
Startup Weekend Ghent
Startup Weekend GhentStartup Weekend Ghent
Startup Weekend GhentBruno Lowagie
 
Community Leadership Summit - Calistoga March 2013
Community Leadership Summit - Calistoga March 2013Community Leadership Summit - Calistoga March 2013
Community Leadership Summit - Calistoga March 2013Bruno Lowagie
 
Bizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisions
Bizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisionsBizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisions
Bizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisionsBruno Lowagie
 
Kruispunt Brugsepoortstraat
Kruispunt BrugsepoortstraatKruispunt Brugsepoortstraat
Kruispunt BrugsepoortstraatBruno Lowagie
 
What's new in PDF 2.0 regarding digital signatures
What's new in PDF 2.0 regarding digital signaturesWhat's new in PDF 2.0 regarding digital signatures
What's new in PDF 2.0 regarding digital signaturesBruno Lowagie
 
GentM #9: Business Angels
GentM #9: Business AngelsGentM #9: Business Angels
GentM #9: Business AngelsBruno Lowagie
 
Zenika - iText in Action
Zenika - iText in ActionZenika - iText in Action
Zenika - iText in ActionBruno Lowagie
 
PDF Digital signatures
PDF Digital signaturesPDF Digital signatures
PDF Digital signaturesBruno Lowagie
 

Mehr von Bruno Lowagie (20)

The Dark Magic of Start-Up Valuation
The Dark Magic of Start-Up ValuationThe Dark Magic of Start-Up Valuation
The Dark Magic of Start-Up Valuation
 
Open Source Survival: A Story from the Trenches
Open Source Survival: A Story from the TrenchesOpen Source Survival: A Story from the Trenches
Open Source Survival: A Story from the Trenches
 
Entreprenerd: presenting the book
Entreprenerd: presenting the bookEntreprenerd: presenting the book
Entreprenerd: presenting the book
 
The Secret of your Success
The Secret of your SuccessThe Secret of your Success
The Secret of your Success
 
Blockchain: use cases for the future
Blockchain: use cases for the futureBlockchain: use cases for the future
Blockchain: use cases for the future
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain Fundamentals
 
How can large open source projects be monetized?
How can large open source projects be monetized?How can large open source projects be monetized?
How can large open source projects be monetized?
 
Open source: an introduction to IP and Legal
Open source: an introduction to IP and LegalOpen source: an introduction to IP and Legal
Open source: an introduction to IP and Legal
 
How can large open source projects be monetized?
How can large open source projects be monetized?How can large open source projects be monetized?
How can large open source projects be monetized?
 
Waarom iText de Leeuw van de Export 2016 moet winnen
Waarom iText de Leeuw van de Export 2016 moet winnenWaarom iText de Leeuw van de Export 2016 moet winnen
Waarom iText de Leeuw van de Export 2016 moet winnen
 
Belgium and the US: a mutual introduction
Belgium and the US: a mutual introductionBelgium and the US: a mutual introduction
Belgium and the US: a mutual introduction
 
Startup Weekend Ghent
Startup Weekend GhentStartup Weekend Ghent
Startup Weekend Ghent
 
Community Leadership Summit - Calistoga March 2013
Community Leadership Summit - Calistoga March 2013Community Leadership Summit - Calistoga March 2013
Community Leadership Summit - Calistoga March 2013
 
Bizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisions
Bizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisionsBizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisions
Bizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisions
 
Kruispunt Brugsepoortstraat
Kruispunt BrugsepoortstraatKruispunt Brugsepoortstraat
Kruispunt Brugsepoortstraat
 
What's new in PDF 2.0 regarding digital signatures
What's new in PDF 2.0 regarding digital signaturesWhat's new in PDF 2.0 regarding digital signatures
What's new in PDF 2.0 regarding digital signatures
 
GentM #9: Business Angels
GentM #9: Business AngelsGentM #9: Business Angels
GentM #9: Business Angels
 
De lijn
De lijnDe lijn
De lijn
 
Zenika - iText in Action
Zenika - iText in ActionZenika - iText in Action
Zenika - iText in Action
 
PDF Digital signatures
PDF Digital signaturesPDF Digital signatures
PDF Digital signatures
 

Kürzlich hochgeladen

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Digital Signatures in PDF: how it's done

  • 1. © 2015, iText Group NV, iText Software Corp., iText Software BVBA© 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital Signatures: how it’s done in PDF UGent (July 1, 2015)
  • 2. © 2015, iText Group NV, iText Software Corp., iText Software BVBA© 2015, iText Group NV, iText Software Corp., iText Software BVBA Agenda • Why do we need digital signatures? • Basic concepts… • … applied to PDF • Architectures: server-side vs. client-side • Digital signatures and document workflow • Long term validation
  • 3. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF3 Why do we need digital signatures? Integrity Authenticity Non-repudiation
  • 4. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Integrity Digital signatures: how it's done in PDF4 I paid a forged invoice and lost 30K€ !
  • 5. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Authenticity Digital signatures: how it's done in PDF5 Why am I, Emperor Constantine I, in this picture? I never transferred authority to the Pope!
  • 6. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Non-repudiation Digital signatures: how it's done in PDF6 I didn’t do it!
  • 7. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Three goals Integrity — we want assurance that the document hasn’t been changed somewhere in the workflow. Authenticity — we want assurance that the author of the document is who we think it is (and not somebody else). Non-repudiation — we want assurance that the author can’t deny his authorship. Digital signatures: how it's done in PDF7
  • 8. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF8 Basic Concepts… Hashing algorithms Encryption algorithms Certificate Authorities Digital signatures
  • 9. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 1: Integrity check using hash Digital signatures: how it's done in PDF9 Document Generate Hash AF1B4C...D34E Secure Server / Website Retrieve Hash AF1B4C...D34E Compare!
  • 10. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 1: Hashing Hashing algorithm a cryptographic hash function to turn an arbitrary block of data into a fixed-size bit string. Available algorithms MD5: Ron Rivest (deprecated) SHA: SHA-1: NSA (phased out!) SHA-2: NSA / NIST SHA-3: Keccak (made in Belgium!) RIPEMD: KULeuven Digital signatures: how it's done in PDF10
  • 11. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 2: Encryption Assymetric key algorithms Encryption Digital signing Digital signatures: how it's done in PDF11
  • 12. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 2: Some name dropping Public Key Cryptography Standards PKCS#1: RSA Cryptography Standard (Rivest, Shamir, Adleman) PKCS#7: Cryptographic Message Standard (CMS) PKCS#11: Cryptographic Token Interface PKCS#12: Personal Information Exchange Syntax Standard PKCS#13: Elliptic Curve Cryptography Standard (ECDSA) Federal Information Processing Standards (FIPS) DSA: Digital Signature Algorithm (DSA) European Telecommunications Standards Institute (ETSI) CMS Advanced Electronic Signatures (CAdES) Digital signatures: how it's done in PDF12
  • 13. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 3: Certificate Authorities Digital signatures: how it's done in PDF13
  • 14. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 3: example Digital signatures: how it's done in PDF14 Self-signed: Signed by Adobe: Signed by GlobalSign: Signed by GlobalSign
  • 15. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 3: example Digital signatures: how it's done in PDF15
  • 16. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 3: the green check mark PKCS#12: Personal Information Exchange Syntax Standard public and private key are stored in a file PKCS#11: Cryptographic Token Interface public and private key are stored on a device In the context of PDF:  Certified Document Services (CDS): Adobe’s root certificate  Adobe Approved Trust List (AATL): Trusted root certificates (since Acrobat 9) Digital signatures: how it's done in PDF16
  • 17. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 1 + Concept 2 + Concept 3 Producer Provides data as-is: [A] Provides hash of data, encrypted using private key: [B] Provides public key Consumer Creates hash from data [A]: hash1 Decrypts hash [B] using public key: hash2 If (hash1 == hash2) document OK! Digital signatures: how it's done in PDF17
  • 18. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Goals met? Integrity Hashes are identical Authenticity Identity is stored in public key provided by CA A time-stamp can be added Non-repudiation If hash can be decrypted with public key, the document was signed with the corresponding private key Digital signatures: how it's done in PDF18
  • 19. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Differences between EU and US In the US, we make a distinction Electronic signatures don’t necessarily involve PKI Digital signatures when a PKI infrastructure is involved In Europe, we speak of electronic signatures As a synonym for digital signatures All laws and regulations take this wording There’s no sharp distinction between electronic and digital signatures (which leads to confusion) I always speak of digital signatures Digital signatures: how it's done in PDF19
  • 20. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF20 … Applied to PDF ISO 32000-1 ETSI TS 102 778 (PAdES) ISO 32000-2
  • 21. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Standards ISO ISO-32000-1 (2008) based on PDF 1.7 (2006) ISO-32000-2 will define PDF 2.0 (2016) ETSI: TS 102 778 (2009 - 2010) PAdES 1: Overview PAdES 2: Basic – CMS based (ISO-32000-1) PAdES 3: Enhanced – CAdES based (ISO-32000-2) PAdES 4: LTV – Long Term Validation PAdES 5: XAdES based (XML content) PAdES 6: Visual representation guidelines ETSI: TS 103 172 (2011 - 2013) PAdES Baseline Profile Digital signatures: how it's done in PDF21
  • 22. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Signatures in PDF There are no bytes in the PDF that aren’t covered, other than the PDF signature itself. (*) The digital signature isn’t part of the ByteRange. The concept “to initial a document” doesn’t exist; you sign the complete document at once, not on a page per page basis. (*) Digital signatures: how it's done in PDF22
  • 23. © 2015, iText Group NV, iText Software Corp., iText Software BVBA What’s inside a signature? Digital signatures: how it's done in PDF23 ISO-32000-2: At minimum the PKCS#7 object shall include the signer’s X.509 signing certificate. This certificate shall be used to verify the signature value in /Contents. Best practices (“should” also have): • Full certificate chain • Revocation information (CRL / OCSP) • Timestamp %PDF-1.x ... /ByteRange ... /Contents< >... %%EOF DIGITAL SIGNATURE • Signed Message Digest • Certificate chain • Revocation information • Timestamp
  • 24. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF24 Architectures Server-side signing Client-side signing Deferred signing
  • 25. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Server-side signing Digital signatures: how it's done in PDF25 <</Type/Sig/ /Contents < %PDF-1.x ... ... %%EOF >>> Signed Message Digest Application DeviceSERVER
  • 26. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Use cases server-side signing Company signature Invoices Contracts … Signing services in the Cloud Docusign Echosign … Security management responsibilities! Digital signatures: how it's done in PDF26
  • 27. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Client-side signing Digital signatures: how it's done in PDF27 <</Type/Sig/ /Contents < %PDF-1.x ... ... %%EOF >>> Signed Message Digest ApplicationDevice CLIENT
  • 28. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Use cases client-side signing Desktop applications Adobe Acrobat Pro Adobe Reader (for Reader-enabled documents) Home-made, e.g. using iText In a web context The PDF software runs on the client, e.g. using Java Web Start Access to the token or smart card through MSCAPI PKCS#11 Custom smart card library Security User has smart card and PIN or USB token and passphrase Digital signatures: how it's done in PDF28 1 signature / second
  • 29. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Deferred signing Digital signatures: how it's done in PDF29 Signed Message Digest AppDevice CLIENT <</Type/Sig/ /Contents < %PDF-1.x ... ... %%EOF >>> Application SERVER
  • 30. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Use cases deferred signing Signing on an iPad/Tablet App on the device has a low footprint Easy to integrate into a document management system Example: eaZySign (Zetes) Disadvantage At most 1 signature / second You need to trust the server that the hash you receive is actually the hash of the document you want to sign. ISAE 3000 the standard for assurance over non-financial information. ISAE3000 is issued by the International Federation of Accountants (IFAC). The standard consists of guidelines for the ethical behavior, quality management and performance of an ISAE3000 engagement. Generally ISAE3000 is applied for audits of internal control, sustainability and compliance with laws and regulations. Digital signatures: how it's done in PDF30
  • 31. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF31 Digital signatures and workflow Author signatures Recipient signatures Locking fields / documents
  • 32. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Serial signatures 32 %PDF-1.x % Original document % Additional content 1 ... ... %%EOF DIGITAL SIGNATURE 1 ... %%EOF DIGITAL SIGNATURE 2 % Additional content 2 ... ... %%EOF DIGITAL SIGNATURE 3 Rev1 Rev2 Rev3 A PDF document can be signed more than once, but parallel signatures aren’t supported, only serial signatures: additional signatures sign all previous signatures.
  • 33. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: types Certification (aka author) signature Only possible for the first revision Involves modification detection permissions: No changes allowed Form filling and signing allowed Form filling, signing and commenting allowed Approval (aka recipient) signature Workflow with subsequent signers New in PDF 2.0: modification detection permissions Digital signatures: how it's done in PDF33
  • 34. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Other possible icons Signer’s identity is unknown Document has been altered or corrupted Digital signatures: how it's done in PDF34
  • 35. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Certified by Alice Digital signatures: how it's done in PDF35
  • 36. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Read, approved and signed by Bob Digital signatures: how it's done in PDF36
  • 37. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Bob’s signature invalidated by Chuck Digital signatures: how it's done in PDF37
  • 38. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Read, approved and signed by Carol Digital signatures: how it's done in PDF38
  • 39. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Read, approved and signed by Dave Digital signatures: how it's done in PDF39
  • 40. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Signature and lock broken by Chuck Digital signatures: how it's done in PDF40
  • 41. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF41 Long-term validation Revocation Timestamps LTV
  • 42. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Certificates expire Digital signatures: how it's done in PDF42 Expiration date 2013 2014 2015
  • 43. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Certificates get revoked Digital signatures: how it's done in PDF43 Expiration dateRevocation date 2013 2014 2015
  • 44. © 2015, iText Group NV, iText Software Corp., iText Software BVBA CA: CRL and OCSP Digital signatures: how it's done in PDF44
  • 45. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Concept 3: example Digital signatures: how it's done in PDF45 Self-signed: Signed by Adobe: Signed by GlobalSign: Signed by GlobalSign
  • 46. © 2015, iText Group NV, iText Software Corp., iText Software BVBA How to survive revocation / expiration? Digital signatures: how it's done in PDF46 Expiration dateRevocation date
  • 47. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Timestamps Digital signatures: how it's done in PDF47
  • 48. © 2015, iText Group NV, iText Software Corp., iText Software BVBA What to do when: There’s no CRL/OCSP/TS in the document? The certificate is about to expire in one of your documents? The hashing/encryption algorithm is about to be deprecated? Digital signatures: how it's done in PDF48
  • 49. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Document Security Store (DSS) Digital signatures: how it's done in PDF49 %PDF-1.x ... /ByteRange ... /Contents< >... %%EOF DIGITAL SIGNATURE • Signed Message Digest • Certificate %PDF-1.x ... /ByteRange ... /Contents< >... %%EOF DSS for DIGITAL SIGNATURE • VRI, Certs, OCSPs, CRLs DIGITAL SIGNATURE • Signed Message Digest • Certificate
  • 50. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Document-level timestamp Digital signatures: how it's done in PDF50 %PDF-1.x ... /ByteRange ... /Contents< >... %%EOF DSS for DIGITAL SIGNATURE • VRI, Certs, OCSPs, CRLs %PDF-1.x ... /ByteRange ... /Contents< >... %%EOF DSS for DIGITAL SIGNATURE • VRI, Certs, OCSPs, CRLs DOCUMENT TIMESTAMP TS1 ETSI.RFC3161 DIGITAL SIGNATURE • Signed Message Digest • Certificate DIGITAL SIGNATURE • Signed Message Digest • Certificate
  • 51. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF51 %PDF-1.x ... /ByteRange ... /Contents< >... %%EOF DSS for DIGITAL SIGNATURE • VRI, Certs, OCSPs, CRLs DOCUMENT TIMESTAMP TS1 %PDF-1.x ... /ByteRange ... /Contents< >... %%EOF DSS for DIGITAL SIGNATURE • VRI, Certs, OCSPs, CRLs DOCUMENT TIMESTAMP TS1 DSS for TS1 DOCUMENT TIMESTAMP TS2 DIGITAL SIGNATURE • Signed Message Digest • Certificate DIGITAL SIGNATURE • Signed Message Digest • Certificate
  • 52. © 2015, iText Group NV, iText Software Corp., iText Software BVBA Digital signatures: how it's done in PDF52 Questions? itextpdf.com SG: sales.isa@itextpdf.com +65 31 58 39 47 BE: sales.isb@itextpdf.com +32 92 98 02 31 US: sales.isc@itextpdf.com +1 617 982 646