Cryptomathic Signer
Total Page:16
File Type:pdf, Size:1020Kb
White Paper Cryptomathic Signer Enabling a Unique Digital Signing Experience 1 Introduction This paper presents the business case for centralised digital signatures and explores how a business can: Being able to provide trust and convenience is critical for any organisation or business offering its services online. This applies • Offer a unique signing experience for all digital channels incl. web portals, desktop applications and mobile in particular to the crucial step of the customer journey, where the customer commits to a transaction or a document. Electronic • Issue advanced or qualified electronic signatures in compliance transactions, such as online shopping or personal e-banking, are with European ETSI and CEN technical standards and the commonplace. Nevertheless, many other transactions or agreements, eIDAS regulation such as high value transactions or sensitive documents need higher security assurances and must be legally binding. In the • Make PKI transparent for the end-user and implement policies for different assurance standards. physical world, such transactions can typically be settled by shaking hands and applying your handwritten signature to a document/ • Leverage existing 2-Factor Authentication deployment contract. In the digital world, a digital signature can carry the same non-repudiable weight. • Achieve non-repudiation • Reduce operational costs Digital signatures can enable: • The end-to-end digital customer journey 2 Signing in the cloud - the drivers • Non-repudiation • Enhanced security and legal value What is driving successful Electronic Commerce and e-Government • End-user convenience and mobility solutions? The answer is simple: Useful applications with superior user • Cost efficiency for all stakeholders experience that provide operational cost savings and enhanced security • What You See Is What You Sign functionality (WYSIWYS) and control. Cryptomathic Signer is an award winning centralised signing solution Cryptomathic Signer addresses these drivers with its patented that offers these exact benefits. Delivering a unique signing experience, technology for delivering digital signatures. Our approach is based on Signer gives users the freedom to sign exactly what they see on any the concept of virtual smartcards, or central server signing as we call device, anytime and from anywhere in the world. Users can simply sign them – introduced by Cryptomathic in the year 2000 long before cloud what they see without disrupting their browsing experience. solutions became fashionable. Cryptomathic Signer 2 White paper 2.1 Bring online what was previously offline All stakeholders can benefit from such a move, including: There are enormous savings for government, companies, individuals and the environment if we can communicate – and not least commit The business people and be held liable – electronically rather than by paper. • Seamless user experience. This ensures higher conversion and 2.1.1 The traditional digital journey satisfaction rates for clients • Cost and time saving (fully digitalised processes) • Business development opportunity (beyond your main area PREPARE of coverage) BROWSE WITH ENTER TRANSACTION Dead AN APPLICATION PRIVATE - CONTENT - PROVIDER AREA CONTRACT End The legal and compliance department User connects • eIDAS, the EU regulation on electronic identification and trust from their Typically with User and services for electronic transactions in the internal market, has set a device application increased Move back offline clear legal framework on digital signing - nationally and cross-borders (browser or privacy provider pre- - Print, sign, stamp, mobile app) pare the data send, receive, verify, • Digital signatures that comply with the eIDAS standard of User authenti- to be signed. scan, archive a Qualified Electronic Signature (QES) are legally equivalent to a - Costly and tedious pro- cation with hand-written signature 1FA or 2FA User is invited cess to accepted • Digital signatures that comply with the eIDAS standard of an Work without legally the terms and Advanced Electronic Signature (AdES) cannot be refused conditions binding consent - Accept terms and con- ditions IT and integration - Non repudiation diffi- cult to prove (no audit trail, no WYSIWYS) • Leverage existing processes (around 2FA, document management, customer journey) • Zero footprint signing experience working on any device 2.1.2 The end-to-end digital journey • Strong security design with separation of duties (3-tier model) 2.1.3 Use cases PREPARE BROWSE WITH ENTER Tremendous resources have been invested to make business TRANSACTION SIGNING AN APPLICATION PRIVATE EXECUTION - CONTENT - PROCESS applications available online, but there is an urgent need to focus PROVIDER AREA CONTRACT more on the overall protection of these services and establish a coherent value proposition: Where the entire customer journey is User connects from their Typically with digitalised, including the last step where the user commits in a legally User and User reviews device increased application content binding way to a document or transaction. (browser or privacy The transac- provider pre- • WYSIWYS tion may now mobile app) pare the data experience User authenti- to be signed. be executed. cation with Banking: User signs what 1FA or 2FA The signature User is invited he sees • Most banking forms require a signature from the end-user, generated is to accepted •Under his sole ranging from loans and credit card applications the terms and control equivalent to conditions •Signature is a hand written • Digitalisation of banking processes is a strong business driver, which rendered one •Document is requires data integrity and non-repudation of online transactions. archived This can be achieved with digital signatures. E-government: • Processing of paper based documents is error prone and resource intensive • Digitalising the processes for numerous documents, which Cryptomathic Signer 3 White paper In the financial industry, these weaknesses are acknowledged Health Services and most supervisory bodies demand that the authentication is context specific. The most elegant way to ensure transaction data Internet integrity is to implement an electronic signature. banking Loan applications SIGN However, technology advancements and usability constraints make Land traditional PKI cards and PKI enabled tokens unfit for today's world. registry The shortcomings of traditional PKI Legal documents In the late 90s, it was generally accepted that the only viable way forward to deliver secure digital signatures was to use smartcards to store private keys securely. Traditionally, Secure Signature- Creation Devices (SSCDs) were either chip-enabled cards or authorities require to exchange with individuals and organisations, USB-connected tokens. Both need to be connected to an end- will minimise errors, delays and costs user station and this is where the nightmares start for most IT departments. Experience shows that guarantying the availability Legally binding documents: of a USB port on tablets or hybrid devices is often difficult. • It is common practice to have multiple signatories on a contract (multi-signing) or to sign multiple documents in a single In addition, middleware often needs to be installed, which is instance (batch signing). Digital signatures can simplify and not viable for large deployments as it defeats the common speed up these procedures requirements for zero footprint technology. More recently, JAVA • Digital documents can also be archived or stored for long term applets have been phased out so it is no longer possible to preservation access a smart card from most standard browsers. By having an end-to-end digital journey, application providers can There is one and only one way to secure data in the expect tremendous savings, both in terms of ability to go to market Internet: by means of cryptography. For this, you need quickly and also processing costs. public key cryptography with private keys for digital signatures and corresponding public keys for signature 2.2 Security, data integrity and non-repudiation verification. So how does one achieve this requirement online? 2.2.1 Security Remote Private Key Protection Under pressure from sophisticated attacks and rising fraud, many applications providers use 2-Factor Authentication (2FA) technology to Regardless of the overall architecture, it is absolutely vital that mitigate risks of identity theft. the private keys are stored securely in a way which only the owner can access for signature generation and that the signature is generated within a protected environment. There are means The shortcomings of using 2FA only for protecting private keys that are extremely resilient to various attacks on the key: namely Hardware Security Modules (HSMs). 2FA technology merely offers user authentication. It provides little HSMs are already used extensively by banks all over the world. protection against Man-In-The-Middle or Man-In-The-Browser With this in mind, Cryptomathic’s patented approach allows attacks. smartcards to be replaced with virtual smartcards, i.e. HSMs that can be accessed remotely but as securely as a smartcard An important feature, which 2FA does not address is the in a smartcard reader by means secure activation protocols possibility to offer transaction data integrity and non-repudiation. leveraging 2FA techniques. In addition, it does not offer legal binding consent of the user and 2.2.2 Non-repudiation cannot be used as a sole mean to ensure an end-to-end digital journey.