Certificate management for financial services - Part 1: Public key certificates

ISO 15782-1:2003 defines a certificate management system for financial industry use for legal and natural persons that includes credentials and certificate contents, certification authority systems (including certificates for digital signatures and encryption key management), certificate generation, distribution, validation and renewal, authentication structure and certification paths, revocation and recovery procedures, and extensions to the definitions of public-key certificates and certificate revocation lists. It also recommends some useful operational procedures (e.g. distribution mechanisms, acceptance criteria for submitted credentials). While providing for the generation of certificates that could include a public key used for encryption key management, it does not address the generation or transport of keys used for encryption.

Gestion de certificats pour les services financiers — Partie 1: Certificats de clé publique

General Information

Status
Withdrawn
Publication Date
25-May-2003
Withdrawal Date
25-May-2003
Current Stage
9599 - Withdrawal of International Standard
Start Date
13-Oct-2009
Completion Date
13-Dec-2025
Ref Project

Relations

Standard
ISO 15782-1:2003 - Certificate management for financial services
English language
96 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO 15782-1:2003 is a standard published by the International Organization for Standardization (ISO). Its full title is "Certificate management for financial services - Part 1: Public key certificates". This standard covers: ISO 15782-1:2003 defines a certificate management system for financial industry use for legal and natural persons that includes credentials and certificate contents, certification authority systems (including certificates for digital signatures and encryption key management), certificate generation, distribution, validation and renewal, authentication structure and certification paths, revocation and recovery procedures, and extensions to the definitions of public-key certificates and certificate revocation lists. It also recommends some useful operational procedures (e.g. distribution mechanisms, acceptance criteria for submitted credentials). While providing for the generation of certificates that could include a public key used for encryption key management, it does not address the generation or transport of keys used for encryption.

ISO 15782-1:2003 defines a certificate management system for financial industry use for legal and natural persons that includes credentials and certificate contents, certification authority systems (including certificates for digital signatures and encryption key management), certificate generation, distribution, validation and renewal, authentication structure and certification paths, revocation and recovery procedures, and extensions to the definitions of public-key certificates and certificate revocation lists. It also recommends some useful operational procedures (e.g. distribution mechanisms, acceptance criteria for submitted credentials). While providing for the generation of certificates that could include a public key used for encryption key management, it does not address the generation or transport of keys used for encryption.

ISO 15782-1:2003 is classified under the following ICS (International Classification for Standards) categories: 35.240.40 - IT applications in banking. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO 15782-1:2003 has the following relationships with other standards: It is inter standard links to ISO 15782-1:2009. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO 15782-1:2003 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


INTERNATIONAL ISO
STANDARD 15782-1
First edition
2003-06-01
Certificate management for financial
services —
Part 1:
Public key certificates
Gestion de certificats pour les services financiers —
Partie 1: Certificats de clé publique

Reference number
©
ISO 2003
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.

©  ISO 2003
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2003 — All rights reserved

Contents Page
Foreword. v
Introduction . vi
1 Scope. 1
2 Normative references . 2
3 Terms and definitions. 2
4 Abbreviations and symbols . 9
5 Public key infrastructure. 9
5.1 Overview . 9
5.2 Public key management infrastructure process flow . 10
5.3 Certification Authority (CA). 10
5.4 Registration Authority (RA). 12
5.5 End entities. 12
6 Certification authority systems . 12
6.1 Introduction . 12
6.2 Responsibilities in CA systems. 12
6.3 Certificate life cycle requirements . 15
6.4 Security quality assurance and audit requirements . 28
6.5 Business continuity planning. 29
7 Data elements and relationships. 30
7.1 Introduction . 30
7.2 Public keys . 30
7.3 Signatures. 30
7.4 Certification request data (CertReqData) . 31
7.5 Public key certificates . 34
7.6 Hold instruction codes . 35
7.7 Certification renewal data (CertRenData). 36
7.8 CRL data structures. 36
8 Public key certificate and certificate revocation list extensions . 38
8.1 Introduction . 38
8.2 Certificate extensions. 39
8.3 CRL extensions . 45
8.4 CRL entry extensions . 45
Annex A (normative) ASN.1 modules. 48
Annex B (normative) Parameters and parameter inheritance . 60
Annex C (normative) Financial institution profile for Version 3 certificate extensions. 62
Annex D (normative) Object identifiers and attributes. 70
Annex E (normative) Encoding of public keys and associated parameters . 71
Annex F (normative) Certification authority audit journal contents and use. 78
Annex G (informative) Alternative trust models. 81
Annex H (informative) Suggested requirements for the acceptance of certificate request data . 87
Annex I (informative) Multiple algorithm certificate validation example . 89
Annex J (informative) Certification authority techniques for disaster recovery. 91
Annex K (informative) Distribution of certificates and certificate revocation lists.94
Bibliography.96

iv © ISO 2003 — All rights reserved

Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO 15782-1 was prepared by Technical Committee ISO/TC 68, Banking, securities and other financial
services, Subcommittee SC 2, Security management and general banking operations.
ISO 15782 consists of the following parts, under the general title Certificate management for financial
services:
 Part 1: Public key certificates
 Part 2: Certificate extensions

Introduction
This part of ISO 15782 adopts ISO/IEC 9594-8  ITU-T Recommendation X.509 for the financial services
industry and defines certificate management procedures and data elements.
Detailed requirements for the financial industry for the individual extensions are given in ISO 15782-2.
While the techniques specified in this part of ISO 15782 are designed to maintain the integrity of financial
messages and support the service of non-repudiation, this part of ISO 15782 does not guarantee that a
particular implementation is secure. It is the responsibility of the financial institution to put an overall process in
place with the necessary controls to ensure that the process is securely implemented, with these controls
including the application of appropriate audit tests in order to validate compliance.
The binding association between the identity of the owner of a public key and that key is documented in order
to prove the ownership of the corresponding private key. This binding is called a public key certificate. Public
key certificates are generated by a trusted entity known as a Certification Authority (CA).
The proper implementation of this part of ISO 15782 ought to provide assurances of the binding of the identity
of an entity to the key used by that entity to sign documents, including wire transfers and contracts.
This part of ISO 15782 defines a certificate management framework for authentication, including the
authentication of keys for encryption. The techniques specified by this part of ISO 15782 can be used when
initiating a business relationship between legal entities (entities).

vi © ISO 2003 — All rights reserved

INTERNATIONAL STANDARD ISO 15782-1:2003(E)

Certificate management for financial services —
Part 1:
Public key certificates
1 Scope
This part of ISO 15782 defines a certificate management system for financial industry use for legal and natural
persons that includes
 credentials and certificate contents,
 certification authority systems, including certificates for digital signatures and for encryption key
management,
 certificate generation, distribution, validation and renewal,
 authentication structure and certification paths,
 revocation and recovery procedures, and
 extensions to the definitions of public key certificates and certificate revocation lists.
This part of ISO 15782 also recommends some useful operational procedures (e.g. distribution mechanisms,
acceptance criteria for submitted credentials).
Implementation of this part of ISO 15782 will also be based on business risks and legal requirements.
This part of ISO 15782 does not include
 the protocol messages used between the participants in the certificate management process,
 requirements for notary and time stamping,
 certificate policy and certification practices requirements,
 requirements for trusted third parties, or
 Attribute Certificates.
While this part of ISO 15782 provides for the generation of certificates that could include a public key used for
encryption key management, it does not address the generation or transport of keys used for encryption.
Implementers wishing to comply with ISO/IEC 9594-8  ITU-T Recommendation X.509 can utilize the
certificate structures defined by that International Standard. Those wishing to implement compatible certificate
and certificate revocation structures but without the overhead associated with the X.500 series can utilize the
ASN.1 structures defined in Annex A.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO/IEC 8824-1  ITU-T Recommendation X.680 (1997), Information technology — Abstract Syntax Notation
One (ASN.1): Specification of basic notation — Part 1
ISO/IEC 8824-2:1998  ITU-T Recommendation X.681 (1997), Information technology — Abstract Syntax
Notation One (ASN.1): Information object specification — Part 2
ISO/IEC 8824-3  ITU-T Recommendation X.682 (1997), Information technology — Abstract Syntax Notation
One (ASN.1): Constraint specification — Part 3
ISO/IEC 8824-4  ITU-T Recommendation X.683 (1997), Information technology — Abstract Syntax Notation
One (ASN.1): Parameterization of ASN.1 specifications — Part 4
ISO/IEC 8825-1  ITU-T Recommendation X.690 (1997), Information technology — ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding
Rules (DER) — Part 1
ISO/IEC 8825-2  ITU-T Recommendation X.691 (1997), Information technology — ASN.1 encoding rules:
Specification of Packed Encoding Rules (PER) — Part 2
ISO/IEC 9594-2  ITU-T Recommendation X.501 (1997), Information technology — Open Systems
Interconnection — The Directory: Models — Part 2
ISO/IEC 9594-6  ITU-T Recommendation X.520 (1997), Information technology — Open Systems
Interconnection — The Directory: Selected attribute types — Part 6
ISO/IEC 9594-8  ITU-T Recommendation X.509 (1997), Information Technology — Open Systems
Interconnection — The Directory: Public-key and attribute certificate frameworks — Part 8
ISO 9807:1991, Banking and related financial services — Requirements for message authentication (retail)
ISO/IEC 9834-1 ITU-T Recommendation X.660, Information technology — Open Systems
Interconnection — Procedures for the operation of OSI Registration Authorities: General procedures — Part 1
ISO/IEC 15408 (all parts), Common Criteria for Information Security Evaluation
ISO 15782-2:2001, Banking — Certificate Management — Part 2: Certificate extensions
ANS X9.30-1, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry,
Part 1: The Digital Signature Algorithm (DSA)
ANS X9.31-1, Public Key Cryptography Using Reversible Algorithms for the Financial Services Industry,
Part 1: The RSA Signature Algorithm
ANS X9.62, Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature
Algorithm (ECDSA)
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2 © ISO 2003 — All rights reserved

3.1
ASN.1 module
identifiable collection of ASN.1 types and values
3.2
attribute
characteristic of an entity
3.3
audit journal
chronological record of system activities which is sufficient to enable the reconstruction, review and
examination of the sequence of environments and activities surrounding or leading to each event in the path
of a transaction from its inception to the output of the final results
3.4
authorization
granting of rights
3.5
CA-certificate
certificate whose subject is a CA, and whose associated private key is used to sign certificates
3.6
(certificate) hold
suspension of the validity of a certificate
3.7
certificate information
information in a certificate which is signed
3.8
certificate policy
named set of rules that indicates the applicability of a certificate to a particular community and/or class of
application with common security requirements
EXAMPLE A particular certificate policy might indicate the applicability of a type of certificate to the authentication of
electronic data interchange transactions for the trading of goods within a given price range.
NOTE 1 The certificate policy should be used by the user of the certificate to decide whether or not to accept the
binding between the subject (of the certificate) and the public key. Some of the components in the certificate policy
framework are given concrete values and represented by a registered object identifier in the X.509, Version 3 certificate.
The object owner also registers a textual description of the policy and makes it available to the relying parties.
NOTE 2 The certificate policy object identifier can be included in the following extensions in the X.509, Version 3
certificates: certificate policies, policy mappings, and policy constraints. The object identifier(s) may appear in none, some,
or all of these fields. These object identifiers may be the same (referring to the same certificate policy) or may be different
(referring to different certificate policies).
3.9
certificate policy framework
comprehensive set of security and liability related components that can be used to define a certificate policy
NOTE A subset of the components in the certificate policy framework are given concrete values to define a certificate
policy.
3.10
certificate request data
credentials
signed information in a certificate request, including the entity’s public key, entity identity and other information
included in the certificate
3.11
certificate revocation list
CRL
list of revoked certificates
3.12
certificate-using system
implementation of those functions defined in this part of ISO 15782 that are used by a certificate user
3.13
certification
process of creating a public key certificate for an entity
3.14
certification authority
CA
entity trusted by one or more entities to create, assign, and revoke or hold public key certificates
3.15
certification authority system
set of entities, including a CA, that manages certificates throughout the life of the certificate
NOTE The entities are responsible for
 generation,
 submission,
 registration,
 certification,
 distribution,
 use,
 renewal,
 revocation or hold, and
 expiry.
3.16
certification path
ordered sequence of certificates of entities which, together with the public key of the initial entity in the path,
can be processed to obtain the public key of the final entity in the path
3.17
certification practice statement
CPS
statement of the practices which a certification authority employs in issuing certificates
3.18
compromise
violation of the security of a system such that an unauthorized disclosure of sensitive information may have
occurred
3.19
confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities, or processes
4 © ISO 2003 — All rights reserved

3.20
CRL distribution point
directory entry or other distribution source for CRLs
NOTE A CRL distributed through a CRL distribution point may contain revocation entries for only a subset of the full
set of certificates issued by one CA or may contain revocation entries for multiple CAs.
3.21
cross certification
process by which two CAs mutually certify each other’s public keys
cf. policy mapping (3.48)
3.22
(cryptographic) key
parameter that determines the operation of a cryptographic function
NOTE Cryptographic functions include the following:
 the transformation from plain text to cipher text and vice versa;
 synchronized generation of keying material;
 digital signature generation or validation.
3.23
cryptographic module
device wherein cryptographic functions (e.g. encryption, authentication, key generation) are performed
3.24
cryptography
discipline which embodies principles, means and methods for the transformation of data in order to hide its
information content, prevent its undetected modification, prevent its unauthorized use or a combination thereof
3.25
cryptoperiod
time span during which a specific key is authorized for use or in which the keys for a given system may remain
in effect
3.26
data integrity
property whereby data has not been altered or destroyed
3.27
delta-CRL
partial CRL indicating only changes since a prior CRL issue
3.28
(digital) signature
cryptographic transformation of data which, when associated with a data unit, provides the services of origin
authentication and data integrity, and may support signer non-repudiation
3.29
directory
repository
method for distributing or making available certificates or CRLs
EXAMPLE A data base or an X.500 Directory.
3.30
distinguished name
globally unique name for an entity
NOTE 1 Methods for determining global uniqueness are outside the scope of this part of ISO 15782.
NOTE 2 An entity may be issued more than one certificate with the same distinguished name.
3.31
dual control
process of utilizing two or more separate entities (usually persons), who are operating in concert, to protect
sensitive functions or information
NOTE 1 Both entities are equally responsible for the physical protection of materials involved in vulnerable transactions.
No single person is able to access or to utilize the materials (e.g. cryptographic key).
NOTE 2 For manual key and certificate generation, conveyance, loading, storage, and retrieval, dual control requires
split knowledge of key among the entities. Also see split knowledge.
3.32
end certificate
final certificate considered in a certificate chain
3.33
end entity
certificate subject, other than a CA, which uses its private key for purposes other than signing certificates
3.34
entity
legal (e.g. a corporation, labour union, state or nation) or natural person
EXAMPLE CA, RA or end entity.
3.35
financial message
communication containing information which has financial implications
3.36
hash
(mathematical) function which maps values from a large (possibly very large) domain into a smaller (fixed)
range and satisfies the following properties:
 it is computationally infeasible to find any input which maps to a pre-specified output;
 it is computationally infeasible to find any two distinct inputs which map to the same output
3.37
key agreement
method for negotiating a key value on-line without transferring the key, even in an encrypted form
EXAMPLE The Diffie-Hellman technique.
3.38
key fragment
part of a private key which has been divided into pieces (also called shares) that are distributed amongst
entities such that the pooled fragments of specific subsets of entities can generate digital signatures of the
original private key
6 © ISO 2003 — All rights reserved

3.39
key management
generation, storage, secure distribution, and application of keying material in accordance with a security policy
3.40
key pair
〈public key cryptography〉 public key and its corresponding private key
3.41
keying material
data, such as keys, certificates and initialization vectors, necessary to establish and maintain cryptographic
keying relationships
3.42
keying relationship
state existing between a communicating pair or between members of a group (logical entity) during which time
they share keying material
3.43
message
data to be signed
3.44
non-repudiation
service which provides proof of the integrity and origin of data which can be verified by a third party
NOTE The non-repudiation service protects against the signing entity falsely denying the action and can provide
rebuttable presumption. It requires that appropriate processes and procedures (registration, audit journals, contractual
arrangements, personnel, etc.) be in place.
3.45
optional
not required by this part of ISO 15782 or not required to meet an optional provision of this part of ISO 15782
NOTE Not to be confused with the ASN.1 key word “OPTIONAL”.
3.46
out-of-band notification
notification using a communication means independent of the primary communications means
3.47
policy mapping
recognition that, when a CA in one domain certifies a CA in another domain, a particular certificate policy in
the second domain may be considered by the authority of the first domain to be equivalent (but not
necessarily identical in all respects) to a particular certificate policy in the first domain
cf. cross certification (3.21)
3.48
policy qualifier
policy-dependent information that accompanies a certificate policy identifier in an X.509 certificate
3.49
private key
〈asymmetric (public) key cryptosystem〉 key of an entity’s key pair which is known only by that entity
3.50
public key
〈asymmetric (public) key cryptosystem〉 key of an entity’s key pair which is publicly known
3.51
public key certificate
public key and identity of an entity together with some other information, rendered unforgeable by signing the
certificate information with the private key of the certifying authority that issued that public key certificate
3.52
public key validation
PKV
process that does arithmetic tests on a candidate public key to provide assurance that it conforms to the
specifications of the standard
NOTE 1 Since attacks may be possible on the owner and/or user if using a non-conforming public key.
NOTE 2 Public key validation can include arithmetic property tests (range, order, primality, etc.), canonical generation
tests and consistency tests between components of a public key. Methods for public key validation are typically found in
financial industry signature standards (e.g. ANS X9.62).
3.53
registration authority
RA
entity that is responsible for identification and authentication of subjects of certificates, but is not a CA and
hence does not sign or issue certificates
NOTE An RA may assist in the certificate application process, revocation process or both.
3.54
relying party
user
recipient of a certificate who acts in reliance on that certificate
3.55
split knowledge
condition under which two or more entities separately have key fragments which, individually, convey no
knowledge of the resultant cryptographic key
3.56
subject
entity whose public key is certified in a public key certificate
3.57
subject CA
CA that is certified by the issuing CA
3.58
trusted CA public key
public key used to validate the first certificate in a chain of certificates as a part of certification path processing
EXAMPLE The root key in a centralized trust model or a local CA key in a decentralized trust model (see Annex G).
NOTE If an end entity validates a chain of certificates from a trusted CA public key to the end certificate, then the end
certificate is considered valid.
3.59
zeroize
active destruction of electronically stored data such as by degaussing, erasing or overwriting
8 © ISO 2003 — All rights reserved

4 Abbreviations and symbols
Abbreviation Meaning
ASN.1 Abstract syntax notation
BER Basic encoding rules
CA Certification authority
CPS Certification practice statement
CRL Certificate revocation list
DER Distinguished encoding rules
DSA Digital signature algorithm
ECDSA Elliptic curve digital signature algorithm
ITU-T International Telecommunication Union telecommunications standardization sector
PKI Public key infrastructure
RA Registration authority
RSA Rivest Shamir Adleman algorithm
SHA-1 Secure hash algorithm-1
URI Uniform resource identifier
Symbols Meaning
X{information} Signing of “information” by X
X X’s public key. (e.g. X is X ’s public key)
p 1p 1
X X’s private key
s
X «X» X ’s certificate issued by the CA, X
1 2 2 1
X «X »X «X »X «X » Certificate path. Each item in the path is the certificate for the CA which produced
1 2 2 3 n-1 n
the next item. This path is of arbitrary length and is functionally equivalent to X «X ».
1 n
Possession of X allows a user to extract the authenticated public key of X .
1p n

X X «X » Unwrapping of a certificate or path. The public key of the leftmost CA (X ) is used to
1p 1 2 1
extract the authenticated public key of the rightmost certificate (X «X ») by working
1 2
through the path of intervening certificates. This example extracts X .
2p
NOTE 1 The notation used in this part of ISO 15782 is a variant of the X.509 notation for certificates, certification paths
and related information.
NOTE 2 The use of a bold, sans serif font such as: CertReqData or CRLEntry denotes the use of abstract syntax
notation (ASN.1), as defined in ISO/IEC 8824-1 to ISO/IEC 8824-4 and ISO/IEC 8825-1 and ISO/IEC 8825-2. Where it
makes sense to do so, the ASN.1 term is used in place of normal text.
5 Public key infrastructure
5.1 Overview
Public key infrastructure (PKI) is a term used to describe the technical, legal and commercial infrastructure
that enables the wide deployment of public key technology.
Public key technology is used for creating digital signatures and for managing symmetric keys. With public key
cryptography, two keys are used: one is kept private with the user, the other is made publicly available. That
which is signed or processed with one key (public or private) may be validated with its complement (public or
private). Revealing the public key does not in any way compromise the private key.
The authentication of public keys is an essential requirement and for this reason public keys are housed in
public key certificates. A certificate contains the public key and its identifying data and is digitally signed by a
certification authority (CA). This part of ISO 15782 is based on the X.509 (1997) format for public key
certificates.
5.2 Public key management infrastructure process flow
The responsibilities, services and procedures required by a public key management infrastructure are as
follows:
 key generation;
 registration;
 certification;
 distribution;
 usage;
 revocation hold;
 expiry;
 renewal.
The main steps involved in certification are shown in Figure 1.
5.3 Certification Authority (CA)
A CA has a public/private key pair and uses a digital signature algorithm to produce certificates.
The binding of the entity’s public key to its identity is accomplished by having the CA generate the certificate,
thereby attesting to the relationship of the information therein and providing assurances of its integrity.
The binding of an entity’s public key and identity is validated by using the public key of one or more CAs as
described in 6.3.1. The certificate(s) and proof of validation shall be maintained by the validator in an audit
journal. A CA may issue certificates to any entities, including CAs.
Entities (including CAs) can use these certificates to authenticate themselves to relying parties. Hence,
authentication may involve a chain of certificates. The verification of a chain of certificates begins with the
trusted CA public key and ends with the certificate being validated. The trusted CA public key shall be
obtained and authenticated by some means other than by the use of certificates. This is to ensure that the
process begins securely. See 6.3.1, Annex H and ISO/IEC 9594-8.
Once a certificate has been generated, the integrity of its contents is protected. This part of ISO 15782 does
not require that certificates be given confidentiality protection. A valid copy of the CA’s public key is required
by the relying party in order to validate a certificate. Given that the CA is a trusted entity, this permits the
validation of the binding between an entity’s public key, its identity, and other needed information.
Two general architectures may be configured for certification paths: hierarchical and non-hierarchical. In a
hierarchical architecture, authorities are arranged under a “root” CA that issues certificates to subordinate CAs.
These subordinate CAs may issue certificates to CAs subordinate to them or to end entities. In a hierarchical
architecture the public key of the root CA functions as the trusted CA public key and is known to every entity.
Any entity’s certificate may be validated by validating the certification path of signature certificates that leads
from the certificate being validated back to the trusted CA public key of the root CA. In this architecture, the
root CA is a mutual point of trust for all entities.
10 © ISO 2003 — All rights reserved

To communicate outside the root CA’s domain, the root CA shall cross-certify with the desired remote domain.
Certification path validation then involves building a chain of certificates from the remote entity to the root CA
by way of the cross-certified remote CA.
In a non-hierarchical architecture, independent CAs may cross-certify each other by issuing public key
certificates to each other. This results in a general network of trust relationships between CAs and allows each
group (such as a retail credit authorization network, a clearing house, a financial institution or a subgroup
thereof) to have its own CA. An entity uses the public key of a selected CA for its trusted CA public key. The
certification path consists of those certificates that chain back from the certificate being validated to the trusted
CA of the relying party.
A compromise of the private key of a CA compromises all users of certificates of the CA, because the holder
of that private key can generate fraudulent certificates and then masquerade as one or more end entities.
Failure to provide compensating controls to deal with the possibility of compromise of transactions in a
financial network can have catastrophic effects on financial institutions and their customers.

NOTE Numbers correspond to process steps detailed in Figures 2 and 3.
Figure 1 — Typical public key management infrastructure process flow
5.4 Registration Authority (RA)
An RA is an entity that is responsible for identification and authentication of the subjects of certificates, but is
not a CA, and hence does not sign or issue certificates. An RA may assist in the certificate application process,
revocation process, or both. The RA does not need to be a separate body, but can be part of the CA.
5.5 End entities
An end entity is a certificate subject which uses its private key for purposes other than signing certificates.
6 Certification authority systems
6.1 Introduction
A CA and one or more RAs may be configured as a CA system, and the functional allocation between CAs
and RAs will vary, based on implementation.
RAs may be appointed to look after the secure registration of entities or this function may be part of the
services provided by the CA. Each RA is responsible for a specific RA domain.
When an RA is used, communications between the RA and the CA shall be authenticated. A digital signature
may be used for this process
6.2 Responsibilities in CA systems
6.2.1 Sole responsibilities and best practices of a CA
6.2.1.1 Sole responsibilities of a CA
The CA shall be solely responsible for
a) securing the private key associated with the public key contained in the CA’s certificate,
b) ensuring that public keys certified by the CA are unique within the CA’s domain,
c) ensuring that there is no duplication of the requester’s distinguished name with that of any other entity
certified by the CA, [see 7.4 (2) and 7.5 (6)],
d) generating certificates by applying a signature to the certificate information,
e) maintaining a revocation checking mechanism appropriate for relying parties,
f) creating, maintaining and distributing certificate revocation lists, and
g) changing the CA’s public/private key pair at intervals appropriate to the business risk.
A CA system shall ensure that the responsibilities of the CA and RA are assigned.
The operation of a CA shall be in accordance with prudent business practices and the CA’s certificate policy
and certification practice statement (CPS).
The CA shall be responsible for certification and shall be able to print the information contained in certificates
in human readable form.
Certification path constraints are defined in ISO 15782-2. Examples of their use are given in Annex K of
ISO 15782-2.
Distribution requirements for a CA’s public key are defined in 6.3.5.
12 © ISO 2003 — All rights reserved

6.2.1.2 Best practices of a CA system
It is recommended that the CA system possess the following attributes.
a) It should have sufficient resources to maintain its operations in conformity with its duties.
b) It should be reasonably able to bear its risk of liability to end entities and persons relying on certificates
issued by the CA, as dictated by its policy.
c) It should employ personnel practices which provide reasonable assurance of trustworthiness.
d) It should use standardized (ISO or national) cryptographic techniques and cryptographic modules
designed to meet the requirements for financial institution use based on four levels of module security
defined as follows.
1) Level 1 cryptographic module
Security Level 1 provides the lowest level of security. It specifies basic security requirements for a
cryptographic module, but it differs from the higher levels in several respects. No physical security
mechanisms are required in the module beyond the requirement for production-grade equipment.
Level 1 allows software cryptographic functions to be performed in a general purpose personal
computer (PC). Such implementations are often appropriate in low-level security applications. The
implementation of PC cryptographic software may be more cost-effective than hardware-based
mechanisms. This will enable organizations to avoid the situation that exists today whereby the
decision is often made not to cryptographically protect data because hardware is considered too
expensive.
2) Level 2 cryptographic module (tamper evident)
Level 2 provides physical security by including requirements for tamper evident coatings or seals, or
for pick-resistant locks. Tamper evident coatings or seals would be placed on a cryptographic module
so that the coating or seal would have to be broken in order to attain physical access to the plaintext
cryptographic keys and other critical security parameters within the module. Pick-resistant locks
would be placed on covers or doors to protect against unauthorized physical access. These
requirements provide a low cost means for physical security and avoid the cost of the higher level of
protection involving hard opaque coatings or significantly more expensive tamper detection and
zeroization circuitry.
3) Level 3 cryptographic module (tamper protected)
Level 3 attempts to prevent the intruder from gaining access to critical security parameters held
within the module. For example, a multiple chip embedded module shall be contained in a strong
enclosure, and if a cover is removed or a door is opened, the critical security parameters are
zeroized. As another example, a module shall be enclosed in a hard, opaque potting material to deter
access to the contents.
4) Level 4 cryptographic module (tamper enveloped)
Level 4 physical security provides an envelope of protection around the cryptographic module.
Whereas the tamper detection circuits of lower level modules may be bypassed, the intent of Level 4
protection is to detect a penetration of the device from any direction. For example, if one attempts to
cut through the enclosure of the cryptographic module, the attempt should be detected and all critical
security parameters should be zeroized. Level 4 devices are particularly useful for operation in a
physically unprotected environment where an intruder could possibly tamper with the device.
NOTE These levels are not to be confused with ISO/IEC 15408's common criteria evaluation assurance levels
(EALS) or security functional levels (FCNs), or with levels of trust that may be defined in a CA’s certificate policy/CPS.
e) It should make its own certificates, public key and certificate revocation lists (CRL) readily and reliably
available to relying parties.
f) It should utilize trustworthy systems in performing its services.
g) It should define and document policy for the CA system domain.
6.2.2 Responsibilities to be allocated to either a CA or an RA
The following requirements are applicable to the CA or RA.
a) It shall validate the identity of the entity requesting the certificate as being that of the subject of the
certificate.
This may be accomplished by having the entity sign the request for the certificate and having the CA or
RA validate that signature using the public key presented for certification. See 7.4.
b) It shall validate the identity of the entity requesting a certificate if the requesting entity will not be the
subject of the certificate.
c) It shall if appropriate, advise the party identified in the certificate that a certificate has been issued.
A validated means shall be used to convey this advice, and that means shall be independent of any
method used to convey the certificate to the entity. Examples of validated means include normal mail for
low-risk (retail) systems and registered mail for private banking systems. The implementation of this
functionality is determined by business risk.
d) It shall keep records supporting the certificate issuance process for the length of time determined by
records retention requirements.
e) It shall register authenticated entities securely.
f) It shall provide guidance to its end entities on the secure management of the end entity's private key.
g) It shall inform the end entity that the integrity of the end entity’s operation will be considered compromised
if the private key of the end entity is ever revealed to or used by any unauthorized entity.
h) It shall use any appropriate means to ascertain that the end entity understands the responsibilities of
6.2.3. and is able to comply with them.
i) It shall inform relying parties in the domain when the CA private key has been compromised.
j) It shall handle certificate revocation requests from entities.
Annex H contains
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...