Specifying the content and formal specifications of document formats for QES



Similar documents
Certificate Path Validation

Multiple electronic signatures on multiple documents

Long term electronic signatures or documents retention

Points to Note. Chinese and English characters shall be coded in ISO/IEC 10646:2011, and the set of Chinese

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI All rights reserved

ETSI TS V1.1.2 ( ) Technical Specification

TechNote 0006: Digital Signatures in PDF/A-1

PAdES signatures in itext and the road ahead. Paulo Soares

, SNMP, Securing the Web: SSL

Signature policy for TUPAS Witnessed Signed Document

ETSI TS V1.4.2 ( ) Technical Specification. Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES)

ETSI TS V1.1.1 ( ) Technical Specification

BDOC FORMAT FOR DIGITAL SIGNATURES

ETSI TS V1.3.2 ( )

ETSI TS V1.1.1 ( ) Technical Specification

Smithsonian Institution Archives Guidance Update SIA. ELECTRONIC RECORDS Recommendations for Preservation Formats. November 2004 SIA_EREC_04_03

Electronic Signature. István Zsolt BERTA Public Key Cryptographic Primi4ves

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) Technical Specification

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

White Paper. Digital signatures from the cloud Basics and Applications

PKI - current and future

Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic

Electronic Mail Security

e-szigno Digital Signature Application

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Integrating Fax Sending Services

Representation of E-documents in AIDA Project

Digital Signature Verification using Historic Data

STANDARDISIERUNG FÜR EIDAS IM MANDATE/460

Technical Guideline TR ecard-api-framework ecard-interface. Version 1.1.5

2.1 The scope of Time Stamping Protocol (TSP)

ETSI TR V0.0.3 ( )

Digital Signatures in a PDF

CPSC Network Programming. , FTP, and NAT.

Digital Signature Service. version : 4.7-SNAPSHOT

Digital Signature Service. version :

ETSI TS V2.1.1 ( ) Technical Specification

Electronic mail security. MHS (Message Handling System)

ETSI TS V1.1.1 ( )

Sending MIME Messages in LISTSERV DISTRIBUTE Jobs

XML Advanced Electronic Signatures (XAdES)

Chapter 6 Electronic Mail Security

PostSignum CA Certification Policy applicable to qualified personal certificates

ETSI TS V1.1.1 ( )

What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison

encoding compression encryption

Prof. Sead Muftic Feng Zhang. Lecture 10: Secure Systems

Exploring ADSS Server Signing Services

AlphaTrust PRONTO Enterprise Platform Product Overview

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

How Xena performs file format identification

OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services

ETSI TS V1.1.1 ( ) Technical Specification

ETSI TS V2.1.2 ( )

mod_ssl Cryptographic Techniques

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server

Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange

Electronic Records Management Guidelines - File Formats

Digital Signing without the Headaches

Network Security Essentials Chapter 7

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange

Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December Document issue: 2.0

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

Tamper protection with Bankgirot HMAC Technical Specification

Cryptography and Network Security Chapter 15

SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS

NIST-Workshop 10 & 11 April 2013

CHANGE REQUEST. Work item code: MMS6-Codec Date: 15/03/2005

1. What is Long-Term Docs... 5

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

Cartão de Cidadão: Autenticação de Papéis do Cidadão

ETSI TR V1.1.1 ( )

Biometrics, Tokens, & Public Key Certificates

Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview

Certification Authority. The X.509 standard, PKI and electronic documents. X.509 certificates. X.509 version 3. Critical extensions.

Best prac*ces in Cer*fying and Signing PDFs

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

Transcription:

NATIONAL SECURITY AUTHORITY Version 1.0 Specifying the content and formal specifications of document formats for QES 24 July 2007 No.: 3198/2007/IBEP-013 NSA Page 1/14

This English version of the Slovak document No. 3198/2007/IBEP-004 is for reference purposes only. In case of conflict between the English translation and the original Slovak version, the Slovak version shall prevail and supersedes the English translation as the original version. Therefore, only the NSA Deliverables published by NSA in their original language shall be used for evaluation of products and technical judgement. NATIONAL SECURITY AUTHORITY Department of Information Security and Electronic Signature Budatínska č. 30, 850 07 Bratislava 57 http://www.nbusr.sk/ E-mail: sep@nbusr.sk No.: 3198/2007/IBEP-013 Page 2/14

Content 1 Introduction...4 2 Scope...4 3 References...5 4 Abbreviations...6 5 Basic set of MIME types for documents being signed...7 Table 1 Basic MIME types of documents for QES...7 Table 2 Basic MIME types of document coding for QES...7 Annex A (informative) Document type limitations for QES document visualization needs...8 A.1 ASCII textual document in UTF-8...8 A.2 RTF document...8 A.3 PDF document...8 A.4 HTML and XHTML document...8 A.5 XML document...8 A.6 TIF picture...8 A.7 PNG picture...9 A.8 Combination of document type...9 Annex B (informative) Examples of documents in MIME coding...10 B.1 An example of a textual document in UTF-8...10 B.2 An example of PDF document...10 B.3 An example of several documents in one multipart MIME coding...11 Annex C (informative) Bibliography...13 Annex D History...14 No.: 3198/2007/IBEP-013 Page 3/14

1 Introduction During signing and verifying the Qualified Electronic Signature (hereinafter referred to as QES ) [2, 4, 5, 9, 10, 12, 13, 19] it is also required, in addition to AdES signing and verifying itself [1, 6, 11, 14, 16, 21, 22], to ensure unambiguous visualization of signed documents. 2 Scope The NSA issues the present standard in accordance with the Act on Electronic Signature, Article 10 paragraph 2 (j). The standard is issued for purposes of providing an unambiguous electronic document processing in QES signing and verification. The present document technically specifies properties of document basic set that are defined in Annex 3 of the NSA regulation No. 233/2007 Coll. on manner and procedure of electronic signature use in commercial and administrative communication. The present document defines a transport format for documents being signed which task is to ensure an unambiguous type identification of the document being signed for visualization needs. No.: 3198/2007/IBEP-013 Page 4/14

3 References References to documents defining used types and methods. [1] ETSI TS 101 733 Electronic Signature Formats (CAdES) [2] ETSI TR 102 272 ASN.1 format for signature policies [3] RFC 3280 X.509 PKI Certificate and Certificate Revocation List 4-2002 [4] RFC 3739 Qualified Certificates Profile 3-2004 [5] ETSI TS 101 862 Qualified Certificate Profile [6] RFC 3852 Cryptographic Message Syntax 7-2004 [7] RFC 3161 Time-Stamp Protocol (TSP) 8-2001 [8] RFC 2560 X.509 PKI Online Certificate Status Protocol 8-1999 [9] NSA Qualified Electronic Signature Formats [10] Regulation of the NSA, No. 537/2002 Coll. on format and manner of QES creation [11] ETSI TS 102 280 X.509 V.3 Cert. Profile for Cert. Issued to Natural Persons [12] ETSI TR 102 437 Guidance on TS 101 456 [13] ETSI TS 101 456 Policy Requirements for cert. authorities issuing qualified cert. [14] ETSI TS 102 042 Policy Requirements for cert. authorities issuing public key cert. [15] ETSI TS 102 231 Provision of harmonized Trust-service status information 3-2006 [16] ETSI TS 101 903 XML Advanced Electronic Signatures (XAdES) [17] RFC 2560 X.509 PKI Online Certificate Status Protocol 6-1999 [18] RFC 3548 The Base16, Base32, and Base64 Data Encodings 7-2003 [19] Regulation of the NSA, No. 233/2007 Coll. on manner and procedure of electronic signature use in commercial and administrative communication [20] ISO/IEC 3166 Codes for the representation of countries [21] RFC 2822 Internet Message Format 4-2001 [22] RFC 2046 MIME Part Two-Media Types 11-1996 [23] RFC 3629 UTF-8, a transformation format of ISO 10646 11-2003 No.: 3198/2007/IBEP-013 Page 5/14

4 Abbreviations AdES Advanced Electronic Signature ASCII American Standard Code for Information Interchange ASN.1 Abstract Syntax Notation 1 CA Certification Authority CAdES CMS Advanced Electronic Signature CMS Cryptographic Message Syntax CRL Certificate Revocation List CRLF the carriage return (CR) character (ASCII value 13) followed immediately by the line feed (LF) character (ASCII value 10) DER Distinguished Encoding Rules (for ASN.1) ESS Enhanced Security Services (enhances CMS) HTML Hypertext Markup Language HTTP Hyper Text Transfer Protocol ISO International Organization for Standardization MIME Multipurpose Internet Mail Extensions OCSP Online Certificate Status Protocol OID Object Identifier PKIX internet X.509 Public Key Infrastructure QC Qualified Certificate SHA-1 Secure Hash Algorithm 1 TSA Time-Stamping Authorities TSP Time Stamp Protocol URI Uniform Resource Identifier URL Uniform Resource Locator UTF-8 Transformation format of ISO 10646 XAdES XML Advanced Electronic Signature XHTML Extensible Hypertext Markup Language XML extensible Markup Language QES Qualified Electronic Signature No.: 3198/2007/IBEP-013 Page 6/14

5 Basic set of MIME types for documents being signed Documents being signed by QES [9] shall be stored in a format that enables unambiguous document type identification for a visualized component of the application for QES. To ensure this basic QES property, there was selected a coding of documents being signed into MIME [21] with the exact restricted minimal set of MIME types [22] and codings [18] that shall be recognized and processed by applications for QES. Thus, it will ensure an unambiguous identification of document types and interoperability between individual applications as they will be able to identify if they can visualize the given document type unambiguously and hence to verify created QES. In internal CAdES [1] (Enveloping Signature in XAdES [16]) signature, the MIME textual file containing electronic document (s) with registered MIME types is signed directly. In external CAdES [1] (Detached Signature in XAdES [16]) signature, the external MIME textual file that has EML extension and contains electronic document (s) with registered MIME types is signed. Table 1 Basic MIME types of documents for QES Registered MIME Content-Type Short description 1. message/rfc822 General marking of MIME message envelope containing MIME types as specified below. 2. multipart/mixed; boundary= a devider of documents Defines a sequence of signed documents which MIME codings are divided by a divider given in boundary attribute. 3. text/plain; charset=utf-8 ASCII textual document in UTF-8 coding. 4. text/rtf Microsoft/Apple Rich Text Format (RTF) 5. application/pdf Adobe Portable Document Format (PDF) 6. text/html; charset=utf-8 HTML format 7. text/xml; charset=utf-8 XML format 8. application/xhtml+xml; charset=utf-8 XHTML format 9. image/tiff Tag Image File Format 10. image/png Portable Network Graphics format Table 2 Basic MIME types of document coding for QES MIME Content-Transfer-Encoding Short description 1. 8bit Coding of a character up to 8 bits. 2. base64 Coding of a document by means of Base64. No.: 3198/2007/IBEP-013 Page 7/14

Annex A (informative) Document type limitations for QES document visualization needs A.1 ASCII textual document in UTF-8 According to the present document the Content-Transfer-Encoding 8bit coding of a textual document in UTF-8 requires a limited line length on recommended 76 characters in MIME. According to [21] each line of characters MUST be no more than 998 characters, and SHOULD be no more than 78 characters, excluding the CRLF. The Content-Transfer-Encoding base64 coding of a textual document in UTF-8 does not require any restrictions on the line length in the number of characters. A.2 RTF document A document in RTF shall contain only static objects and all necessary document components shall be directly in RTF document, i.e. it shall not contain references on external resources that might change visualization. RTF shall not contain other document types than defined in [19] and pictures which visualization is not unambiguous, i.e. animations and pictures with used lossy (irreversible) compression. A.3 PDF document A document in PDF shall contain only static objects and all necessary document components shall be directly in PDF document, i.e. it shall not contain references on external resources that might change visualization. PDF shall not contain other document types than defined in [19] and pictures which visualization is not unambiguous, i.e. animations and pictures with used lossy (irreversible) compression. A.4 HTML and XHTML document A document in HTML and XHTML shall contain only static objects and all necessary document components shall be directly in HTML and XHTML document, i.e. it shall not contain references on external resources that might change visualization. HTML and XHTML shall not contain other document types than defined in [19] and pictures which visualization is not unambiguous, i.e. animations and pictures with used lossy (irreversible) compression. A.5 XML document A document in XML shall contain only static objects and all necessary document components shall be directly in XML document, i.e. it shall not contain references on external resources that might change visualization. XML shall not contain other document types than defined in [19] and pictures which visualization is not unambiguous, i.e. animations and pictures with used lossy (irreversible) compression. A.6 TIFF picture TIFF picture shall contain only static representation and shall not contain references on external resources that might change visualization. TIFF picture shall not contain pictures which No.: 3198/2007/IBEP-013 Page 8/14

visualization is not unambiguous, i.e. animations and pictures with used lossy (irreversible) compression. A.7 PNG picture PNG picture shall contain only static representation and shall not contain references on external resources that might change visualization. PNG picture shall not contain pictures which visualization is not unambiguous, i.e. animations and pictures with used lossy (irreversible) compression. A.8 Combinations of document types If an electronic document being signed contains a sequence of documents or encapsulated documents, then types of such documents shall be only of the type defined in [19]. No.: 3198/2007/IBEP-013 Page 9/14

Annex B (informative) Examples of documents in MIME coding B.1 An example of a textual document in UTF-8 Textual 8bit coding with the MIME limitation of the line length on 76 characters. Content-type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Dear Colleagues, Thank you for putting the details of the possible security attack into CIRCA. Best regards, Peter Base64 coding of the TXT file Content-Type: text/plain; charset=utf-8 77u/DQoyMTM0MjUrxL7FocSNxL7FocWlxI3FocW+xaHEvsW+xaHEjcW+xaUNCg0KxL7FocSNxL7F ocsndqogxl7focsnxahevssndqoncmegdgfrigrhbgvqdqo= B.2 An example of PDF document Content-Type: application/pdf JVBERi0xLjMKJcfsj6IKNSAwIG9iago8PC9MZW5ndGggNiAwIFIvRmlsdGVyIC9GbGF0ZURlY29k ZT4+CnN0cmVhbQp4nHWPwWrDMAyGadOurVq2PYKOziGaLae2dR2MQm8NvjU7daxQyCDZ+0Od0EFg xlp8+vkk5by1gubd1x9cgnirpf5/yyixojygu0ilgwz/hmdmlwbfyxomkcr7mr7jn2gscwlcybjk wfskr+8scuhga2o2zxzzhm9qmdvszmexlnao4xec1tivno25fpbq6cfgjfqn8vwis5gzmxdqn4ml 24mB3T/HBKtLNc8/4xGYbTrcYuGCptT0h6u6e37Zrl/7n31EOKW6A4GSRH9lbmRzdHJlYW0KZW5k b2jqcjygmcbvymokmja0cmvuzg9iago0idagb2jqcjw8l1r5cguvugfnzs9nzwrpyujvecbbmcaw IDU5NSA4NDJdCi9Sb3RhdGUgMC9QYXJlbnQgMyAwIFIKL1Jlc291cmNlczw8L1Byb2NTZXRbL1BE RiAvVGV4dF0KL0V4dEdTdGF0ZSAxMCAwIFIKL0ZvbnQgMTEgMCBSCj4+Ci9Db250ZW50cyA1IDAg Ugo+PgplbmRvYmoKMyAwIG9iago8PCAvVHlwZSAvUGFnZXMgL0tpZHMgWwo0IDAgUgpdIC9Db3Vu dcaxci9sb3rhdgugmd4+cmvuzg9iagoxidagb2jqcjw8l1r5cgugl0nhdgfsb2cgl1bhz2vzidmg MCBSCj4+CmVuZG9iago3IDAgb2JqCjw8L1R5cGUvRXh0R1N0YXRlCi9PUE0gMT4+ZW5kb2JqCjEw IDAgb2JqCjw8L1I3CjcgMCBSPj4KZW5kb2JqCjExIDAgb2JqCjw8L1I4CjggMCBSPj4KZW5kb2Jq CjEzIDAgb2JqCjw8L0ZpbHRlci9GbGF0ZURlY29kZS9MZW5ndGggMjQyPj5zdHJlYW0KeJxdkT1u wzamrnefqjcw5r+5aqiuyzkhqdh2arjebroic4oz9pyxxbpdhyfgsfwgfmppl/mlxvw1h2vxx7sq EJMv9FiexZGa6RZTozvlo1t/rZ7ubnPTnt5t/v7JpLYBCuJXe6f2U/f1RkvGLZ4e2ToqNt2oOQLg MQRsKPl/T3qUxBz2UY0CmBk37VCAjlh7FGAaWAcUYHpjHVGAoQ4bFMAcWCcUNHjWAwowjawWBTA1 O6MApr46FMBYVo8CjMBKKIDRrAEFMNOmelueAeh1rWDfldvgWvcWlXuWQmmt3dduudOY6O978pI5 ptaaf67ngqkkzw5kc3ryzwftcmvuzg9iago4idagb2jqcjw8l0jhc2vgb250l1jytlfptctmdwnp ZGFDb25zb2xlL0ZvbnREZXNjcmlwdG9yIDkgMCBSL1RvVW5pY29kZSAxMyAwIFIvVHlwZS9Gb250 Ci9GaXJzdENoYXIgMS9MYXN0Q2hhciAxNi9XaWR0aHNbIDYwMyA2MDMgNjAzIDYwMyA2MDMgNjAz... dcaxidaguiavsw5mbyayidagugovsuqgwzw4mdrdrjjdmuzdqtg1rdzdq0i3ruzgnuu1nuzcqjc3 RD48ODA0Q0YyQzFGQ0E4NUQ2Q0NCN0VGRjVFNTVGQkI3N0Q+XQo+PgpzdGFydHhyZWYKNDYyNQol JUVPRgo= No.: 3198/2007/IBEP-013 Page 10/14

B.3 An example of several documents in one multipart MIME coding Content-Type: multipart/mixed; boundary="----=_nextpart_000_" This is a multi-part message in MIME format. Content-type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Dear Colleagues, Thank you for putting the details of the possible security attack into CIRCA. Best regards, Peter Content-Type: text/plain; charset=utf-8 77u/DQoyMTM0MjUrxL7FocSNxL7FocWlxI3FocW+xaHEvsW+xaHEjcW+xaUNCg0KxL7FocSNxL7F ocsndqogxl7focsnxahevssndqoncmegdgfrigrhbgvqdqo= Content-Type: text/rtf e1xydgyxxgfuc2lcyw5zawnwzzeyntbczgvmzjbczgvmbgfuzzewntf7xgzvbnr0ymx7xgywxgzz d2lzc1xmy2hhcnnlddizohtcklxmbmftzsbbcmlhbdt9qxjpywwgq0u7fxtczjfczm5pbfxmy2hh cnnlddago319dqp7xcpcz2vuzxjhdg9yie1zznrlzgl0iduundeumtuumtuwnzt9xhzpzxdraw5k NFx1YzFccGFyZFxmMFxmczIwXCdjOGlzdG8gdGVzdCBcJ2U4byBcJzlhXCdlOGlqIFwnOWRhIFwn YmVcJ2ZhXCdlOGEgXCc5ZVwnZWRcJzllbGlcJ2U4a3UgbVwnZTRzYSBuXCdmYVwnOWQgYSBtXCdm ZGxcJ2U4aVwnZThrYSBrXCdmNFwnZjIgXGxhbmcxMDMzXGYxXHBhcg0KfQ0KAA== Content-Type: application/pdf JVBERi0xLjQKJcfsj6IKNSAwIG9iago8PC9MZW5ndGggNiAwIFIvRmlsdGVyIC9GbGF0ZURlY29k ZT4+CnN0cmVhbQp4nIVSPU8DMQwVLZRyoEJL+doyJsOFON9ekRASG9VtlKmITkVq+f8STu+uOemQ NDg4IDAwMDAwIG4gCjAwMDAwMTMzMDcgMDAwMDAgbiAKdHJhaWxlcgo8PCAvU2l6ZSAxNiAvUm9v dcaxidaguiavsw5mbyayidagugovsuqgwzw1qziynui0rkixqzu2rtvfmeuxotayqzgyntddoui4 Nj48NUMyMjVCNEZCMUM1NkU1RTBFMTkwMkM4MjU3QzlCODY+XQo+PgpzdGFydHhyZWYKMTQ5MjIK JSVFT0YK Content-Type: text/html; charset=utf-8 77u/PGh0bWw+DQoNCjxoZWFkPg0KPHRpdGxlPlRoZSB0aXRsZSBpcyBub3QgZGlzcGxheWVkPC90 axrszt4ncjwvagvhzd4ncg0kpgjvzhk+dqo8cd5uaglzihrlehqgaxmgzglzcgxhewvkpc9wpg0k PC9ib2R5Pg0KDQo8L2h0bWw+DQo= Content-type: text/xml; charset=utf-8 77u/PD94bWwgdmVyc2lvbj3igJwxLjHigJ0gZW5jb2Rpbmc94oCcVVRGLTjigJ0/Pg0KPCFET0NU WVBFIHJlcXVlc3QgUFVCTElDID4NCjxkb2M+DQo8cG9zdGNvZGU+MjEzNDI1K8S+xaHEjcS+xaHF pcsnxahfvswhxl7fvswhxi3fvswlpc9wb3n0y29kzt4ncg0kphbvc3ruyw1lpss+xahejcs+xahe No.: 3198/2007/IBEP-013 Page 11/14

jtwvcg9zdg5hbwu+dqo8l2rvyz4= Content-type: application/xhtml+xml; charset=utf-8 PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz4NCjwhRE9DVFlQRSBodG1sIA0K ICAgICBQVUJMSUMgIi0vL1czQy8vRFREIFhIVE1MIDEuMCBTdHJpY3QvL0VOIg0KICAgICJodHRw Oi8vd3d3LnczLm9yZy9UUi94aHRtbDEvRFREL3hodG1sMS1zdHJpY3QuZHRkIj4NCjxodG1sIHht bg5zpsjodhrwoi8vd3d3lnczlm9yzy8xotk5l3hodg1siib4bww6bgfuzz0izw4iigxhbmc9imvu Ij4NCiAgPGhlYWQ+DQogICAgPHRpdGxlPlZpcnR1YWwgTGlicmFyeTwvdGl0bGU+DQogIDwvaGVh ZD4NCiAgPGJvZHk+DQogICAgPHA+TW92ZWQgdG8gPGEgaHJlZj0iaHR0cDovL2V4YW1wbGUub3Jn LyI+ZXhhbXBsZS5vcmc8L2E+LjwvcD4NCiAgPC9ib2R5Pg0KPC9odG1sPg0KDQo= Content-type: image/tiff SUkqAI4BAAB4nM3SMUvDQBQH8HfxklxLKUlwKBLkPI7OFRw6OIR6NCn4BdwKQmfdHIT0RDRZauKk k34mrymvfo0wp4i+pcokfczmqd6fux8vf+4c8pcrv1uzfrpdtlmqefgfv4qxxl14qfnjoo5kiady 8LFNDCxU5RIITIPYdCCAMfAGbFhQgzofQuuK76Ix8TE8LOwAZkDIzji22AqXjRjUy5mTzy87RQmA QrESW8R/1fPmid+1m9LvsmT5fP4gTz1+dN30zeTJJiMRurOQuC/YmQgVJDkXiuWSKZZ6nF3IVPBR lasrypi+f9gttlrob4g54oxzxrzjkeuhwlqhq5lbowy0uxl5juiellcvgpsjyhvxpkvjwrmuespv ONlGbJfYtvW0wDUDOxPEkJUxDM4TqQVXkRa0iFFgijEQm+73zIeYeYgYM6tB3kZc0y7DzGmJ6dI/ Hs+bnfI0GnvsbPlYnIa7UP3JFg3vLMR4Gn3tzoIf1/3L1bO1/0Yl3FqPO194/f768V/wO24slBcP AAABAwABAAAAYQEAAAEBAwABAAAAFwAAAAIBAwABAAAAAQAAAAMBAwABAAAAsoAAAAYBAwABAAAA AAAAABEBBAABAAAACAAAABIBAwABAAAAAQAAABUBAwABAAAAAQAAABYBAwABAAAAtgAAABcBBAAB AAAAhgEAABoBBQABAAAASAIAABsBBQABAAAAUAIAABwBAwABAAAAAQAAACgBAwABAAAAAgAAADEB AgAKAAAAWAIAAAAAAAAAAABgAAAAAQAAAGAAAAABSXJmYW5WaWV3AA== Content-type: image/png ivborw0kggoaaaansuheugaaaweaaaaxaqmaaadgpwz8aaaablbmveuaaad///+l2z/daaaacxbi WXMAAA7EAAAOxAGVKw4bAAABh0lEQVR42s3TMUvDQBQH8HwQSb9GsRRHP4ZOOpnYJVHEa8HBTeeC 0M0vIDQtZ8ng0EGwcznOQ4J0kCSU0l6SM/d8SRUV6pDNg7yE5MfLn5eLARVWx6i2qvVWdiXdq6Sr JTHXVyEoh2lYxjawPut/Ptc5FkUtBhqafsfIYvChDWIB7ymsYCl6MDsVT4gyPPIQi7yHBmj93O4Y qvzrspwezxkw+uvlcvf8ukdljkkotkh9fh2mkzklxti1dy722vuobk/mqebujrrlb1fjokptorfm 1Hctwam0mKTSCYU8Zw4XXc/iqWdLcsC9I+YSPvULLVDbQlAZM6mkA4UmI7xr58qzgURvXpgBGbFS B9Q/bqFOUD9IR9fiM0aagg5aL6iTUicJaZZ6lWNvjRrsMkkuhMsIF9QjXBVJCq0wSaGz6GfuO8zd Q425ad+aol6RSGJuZ62VGdy06/NJOZPFo7w094qZRDU6bL2qwWGKGmcyJFHD//3l/9gFcvM+qaZn m/xkw1f7g/6n/gb7/3mn/w6sbaaaaabjru5erkjggg== -- No.: 3198/2007/IBEP-013 Page 12/14

Annex C (informative) Bibliography Basic documents of the Slovak Republic legislation for electronic signature http://www.nbusr.sk/en/electronic-signature/legislation/index.html Qualified electronic signature formats http://www.nbusr.sk/en/electronic-signature/approved-formats/index.html Certification path creation and certificate validity verification http://www.nbusr.sk/en/electronic-signature/verification/index.html No.: 3198/2007/IBEP-013 Page 13/14

Annex D History Version Date of issuing Note Editor Version 1.0 Č.: 3198/2007/IBEP-013 24 July 2007 First edition Ing. Peter Rybár, NSA No.: 3198/2007/IBEP-013 Page 14/14