ETSI EN 319 142-1 V1.2.1 (2024-01)
Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures
Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures
REN/ESI-0019142-1v121
Elektronski podpisi in infrastruktura (ESI) - Digitalni podpisi PAdES - 1. del: Gradniki in izhodiščni podpisi PAdES
Ta dokument določa digitalne podpise PAdES. Podpisi PAdES temeljijo na podpisih PDF, določenih v standardu ISO 32000-1 [1], z nadomestnim kodiranjem za podporo formatov digitalnih podpisov, ki so enakovredni formatu podpisa CAdES, kot je določeno v standardu ETSI EN 319 122-1 [2], ter z vključitvijo podpisanih in nepodpisanih atributov, ki izpolnjujejo določene splošne zahteve (kot je dolgoročna veljavnost digitalnih podpisov) v številnih primerih uporabe.
Ta dokument določa specifične formate za izhodiščne podpise PAdES, ki zagotavljajo osnovne funkcije, zaradi katerih se lahko različni poslovni in vladni primeri uporabe za elektronske postopke in komunikacijo uporabijo za širok nabor skupnosti, kadar obstaja jasna potreba po interoperabilnosti digitalnih podpisov, uporabljenih v elektronskih dokumentih.
V tem dokumentu so določene štiri ravni izhodiščnih podpisov PAdES, ki obravnavajo naraščajoče zahteve po dolgoročnem ohranjanju veljavnosti podpisov, pri čemer določena raven vedno obravnava vse zahteve, obravnavane na njenih podravneh. Vsaka raven zahteva prisotnost določenih atributov PAdES, ki ustrezno zmanjšujejo možnost izbire.
Postopki izdelave, razširitve in potrjevanja digitalnih podpisov PAdES v tem dokumentu niso zajeti ter so določeni v standardu ETSI EN 319 102-1 [i.5]. Smernice glede izdelave, razširitve in potrjevanja digitalnih podpisov PAdES, vključno z uporabo različnih atributov, določenih v tem dokumentu, so podane v standardu ETSI TR 119 100 [i.4]. Namen tega dokumenta je zagotavljanje podpore za elektronske podpise v različnih regulativnih okvirjih.
OPOMBA: Namen digitalnih podpisov PAdES, določenih v tem dokumentu, je zlasti (vendar ne izključno) zagotavljanje podpore za elektronske podpise, napredne elektronske podpise, kvalificirane elektronske podpise, elektronske žige, napredne elektronske žige in kvalificirane elektronske žige skladno z Uredbo (EU) št. 910/2014 [i.2].
General Information
Standards Content (Sample)
Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
EUROPEAN STANDARD
Electronic Signatures and Infrastructures (ESI);
PAdES digital signatures;
Part 1: Building blocks and PAdES baseline signatures
2 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
Reference
REN/ESI-0019142-1v121
Keywords
electronic signature, PAdES, profile, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
https://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2023.
All rights reserved.
ETSI
3 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
Contents
Intellectual Property Rights . 4
Foreword . 4
Modal verbs terminology . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definition of terms, symbols and abbreviations . 7
3.1 Terms . 7
3.2 Symbols . 8
3.3 Abbreviations . 8
4 General syntax . 8
4.1 General requirements for PAdES signatures based on PDF signatures . 8
5 Attributes syntax and semantics . 9
5.1 Introduction . 9
5.2 CMS and CAdES defined attributes . 9
5.3 ISO 32000-1 defined attributes . 10
5.4 Validation data and archive validation data attributes . 10
5.4.1 Overview . 10
5.4.2 Document Security Store . 12
5.4.2.1 Catalog . 12
5.4.2.2 DSS Dictionary . 12
5.4.2.3 Signature VRI Dictionary . 13
5.4.3 Document Time-stamp . 14
5.5 Requirements on encryption . 14
5.6 Extensions dictionary . 15
6 PAdES baseline signatures . 15
6.1 Signature levels . 15
6.2 General requirements for PAdES baseline signatures . 16
6.2.1 Algorithm requirements . 16
6.2.2 Notation for requirements . 16
6.3 PAdES baseline signatures . 18
6.4 Legacy PAdES baseline signatures . 22
Annex A (informative): Change history . 23
History . 24
ETSI
4 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.
Foreword
This draft European Standard (EN) has been produced by ETSI Technical Committee Electronic Signatures and
Infrastructures (ESI), and is now submitted for the combined Public Enquiry and Vote phase of the ETSI standards EN
Approval Procedure.
The present document is part 1 of a multi-part deliverable covering the PDF digital signatures (PAdES), as identified
below:
ETSI EN 319 142-1: "Building blocks and PAdES baseline signatures";
ETSI EN 319 142-2: "Additional PAdES signatures profiles".
ETSI TS 119 142-3: "PAdES Document Time-stamp digital signatures (PAdES-DTS)".
Proposed national transposition dates
Date of latest announcement of this EN (doa): 3 months after ETSI publication
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 6 months after doa
Date of withdrawal of any conflicting National Standard (dow): 6 months after doa
ETSI
5 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Introduction
Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and
global networks. Trust in this way of doing business is essential for the success and continued development of
electronic commerce. It is therefore important that companies using this electronic means of doing business have
suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with
their business partners. In this respect digital signatures are an important security component that can be used to protect
information and provide trust in electronic business.
The present document is intended to cover digital signatures supported by PKI and public key certificates, and aims to
meet the general requirements of the international community to provide trust and confidence in electronic transactions,
including, amongst other, applicable requirements from Regulation (EU) No 910/2014 [i.2].
The present document can be used for any transaction between an individual and a company, between two companies,
between an individual and a governmental body, etc. The present document is independent of any environment. It can
be applied to any environment e.g. smart cards, SIM cards, special programs for electronic signatures, etc.
The present document is part of a rationalized framework of standards (see ETSI TR 119 000 [i.3]).
ETSI TR 119 100 [i.4] provides guidance on how to use the present document within the aforementioned framework.
ETSI
6 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
1 Scope
The present document specifies PAdES digital signatures. PAdES signatures build on PDF signatures specified in
ISO 32000-1 [1] with an alternative signature encoding to support digital signature formats equivalent to the signature
format CAdES as specified in ETSI EN 319 122-1 [2], by incorporation of signed and unsigned attributes, which fulfil
certain common requirements (such as the long term validity of digital signatures) in a number of use cases.
The present document specifies formats for PAdES baseline signatures, which provide the basic features necessary for a
wide range of business and governmental use cases for electronic procedures and communications to be applicable to a
wide range of communities when there is a clear need for interoperability of digital signatures used in electronic
documents.
The present document defines four levels of PAdES baseline signatures addressing incremental requirements to
maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the
requirements addressed at levels that are below it. Each level requires the presence of certain PAdES attributes, suitably
profiled for reducing the optionality as much as possible.
Procedures for creation, augmentation, and validation of PAdES digital signatures are out of scope and specified in
ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of PAdES digital signatures including the
usage of the different attributes defined in the present document is provided in ETSI TR 119 100 [i.4]. The present
document aims at supporting electronic signatures in different regulatory frameworks.
NOTE: Specifically but not exclusively, PAdES digital signatures specified in the present document aim at
supporting electronic signatures, advanced electronic signatures, qualified electronic signatures,
electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU)
No 910/2014 [i.2].
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ISO 32000-1: "Document management - Portable document format - Part 1: PDF 1.7".
[2] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures;
Part 1: Building blocks and CAdES baseline signatures".
[3] IETF RFC 5652 (2009): "Cryptographic Message Syntax (CMS)".
[4] IETF RFC 5280 (2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate
Revocation List (CRL) Profile".
[5] IETF RFC 6960 (2013): "X.509 Internet Public Key Infrastructure Online Certificate Status
Protocol - OCSP".
[6] IETF RFC 3161 (2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)". ®
[7] W3C Recommendation (May 2008): "Canonical XML Version 1.1".
[8] IETF RFC 5816 (2010): "ESSCertIDv2 Update for RFC 3161".
ETSI
7 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TS 101 533-1: "Electronic Signatures and Infrastructures (ESI); Data Preservation Systems
Security; Part 1: Requirements for Implementation and Management".
[i.2] Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on
electronic identification and trust services for electronic transactions in the internal market and
repealing Directive 1999/93/EC.
[i.3] ETSI TR 119 000: "Electronic Signatures and Infrastructures (ESI); The framework for
standardization of digital signatures and trust services; Overview".
[i.4] ETSI TR 119 100: "Electronic Signatures and Infrastructures (ESI); Guidance on the use of
standards for signature creation and validation".
[i.5] ETSI EN 319 102-1: "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and
Validation of AdES Digital Signatures; Part 1: Creation and Validation".
[i.6] ETSI TS 119 312: "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". ®
[i.7] Adobe XFA: "XML Forms Architecture (XFA) Specification" version 2.5, (June 2007), Adobe
Systems Incorporated".
[i.8] ETSI TS 103 172: "Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile".
[i.9] IETF RFC 2315 (1998): "PKCS #7: Cryptographic Message Syntax Version 1.5".
[i.10] ETSI TS 119 612: "Electronic Signatures and Infrastructures (ESI); Trusted Lists".
[i.11] ETSI EN 319 142-2: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures;
Part 2: Additional PAdES signatures profiles".
[i.12] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for
standardization of signatures; Definitions and abbreviations".
3 Definition of terms, symbols and abbreviations
3.1 Terms
For the purposes of the present document, the terms given in ISO 32000-1 [1], ETSI TR 119 001 [i.12] and the
following apply:
digital signature: data appended to, or a cryptographic transformation of a data unit that allows a recipient of the data
unit to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
digital signature value: result of the cryptographic transformation of a data unit that allows a recipient of the data unit
to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
electronic time-stamp: data in electronic form which binds other electronic data to a particular time establishing
evidence that these data existed at that time
ETSI
8 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
generator: any party which creates, or augments a digital signature
NOTE: This can be the signer or any party that initially validates or further maintains the signature.
Legacy PAdES baseline signature: digital signature generated according to ETSI TS 103 172 [i.8]
PAdES signature: digital signature that satisfies the requirements specified within the present document or ETSI
EN 319 142-2 [i.11]
proof of existence: evidence that proves that an object existed at a specific date/time
signature augmentation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their augmentation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be conformant
signature creation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their creation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be conformant
signature handler: software application, or part of a software application, that knows how to perform digital signature
operations (e.g. signing and/or validating) in conformance with ISO 32000-1 [1] and the requirements of the appropriate
profile
signature policy: signature creation policy, signature augmentation policy, signature validation policy or any
combination thereof, applicable to the same signature or set of signatures
signature validation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their validation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be valid
trust service provider: natural or legal person who provides one or more trust services
validation data: data that is used to validate a digital signature
verifier: entity that wants to validate or verify a digital signature
3.2 Symbols
Void.
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.12] and the following apply:
DSS Document Security Store
ESS Enhanced Security Services
TSL Trust Status List
VRI Validation Related Information
4 General syntax
4.1 General requirements for PAdES signatures based on PDF
signatures
PAdES signatures profiled in the present document build on PDF signatures specified in ISO 32000-1 [1] with an
alternative signature encoding to support digital signature formats equivalent to the signature format CAdES [2], by
incorporation of signed and unsigned attributes described in clause 5.
ETSI
9 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
The following requirements apply:
a) A DER-encoded SignedData object as specified in CAdES [2] shall be included as the PDF signature in the
entry with the key Contents of the Signature Dictionary as described in ISO 32000-1 [1], clause 12.8.1.
There shall only be a single signer (i.e. one single component of SignerInfo type within signerInfos
element) in any PDF Signature.
b) Requirements for handling PDF Signatures specified in ISO 32000-1 [1], clause 12.8 shall apply except where
overridden by the present document.
NOTE: Given that PAdES signatures are enveloped inside a PDF document and are detached in the sense of a
CMS signature, the signature placement is implied by ISO 32000-1 [1].
In ISO 32000-1 [1], clause 12.8.3.3.1 reads "No data shall be encapsulated in the PKCS#7 SignedData
field".
c) Some signature attributes found in CAdES [2] have the same or similar meaning as keys in the Signature
Dictionary described in ISO 32000-1 [1]. For signature attributes and keys that have the same or similar
meaning only one of them should be used according to the requirements set in table defined in clause 6.3 in the
present document.
5 Attributes syntax and semantics
5.1 Introduction
This clause provides details on attributes specified within ISO 32000-1 [1] and CAdES [2] and defines new attributes
for building PAdES signatures.
The clause distinguishes between the following types of attributes: CMS and CAdES defined attributes,
ISO 32000-1 [1] defined attributes, validation data and archive validation data attributes. The first ones are the attributes
that build the DER-encoded SignedData object included as the PDF signature in the entry with the key Contents of
the Signature Dictionary as described in ISO 32000-1 [1], clause 12.8.1. The second ones are the attributes that build
the Signature Dictionary as described in ISO 32000-1 [1]. The other ones are the attributes where to include validation
data and archive validation data that can guarantee long term validity of digital signatures.
Clause 6.3 provides the requirements concerning how to use the attributes described above.
5.2 CMS and CAdES defined attributes
The attributes included in the following list may be used to generate the DER-encoded SignedData object included as
the PDF signature in the entry with the key Contents of the Signature Dictionary as described in ISO 32000-1 [1],
clause 12.8.1. Their syntax shall be as defined in ETSI EN 319 122-1 [2], clause 5.
• content-type
• message-digest
• signing certificate reference attributes
- ESS signing-certificate
- ESS signing-certificate-v2
• commitment-type-indication
• signer-attributes-v2
• content-time-stamp
• signature-policy-identifier
• signature-time-stamp
ETSI
10 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
5.3 ISO 32000-1 defined attributes
The entries of the Signature Dictionary shall be as defined in ISO 32000-1 [1], clause 12.8.1 unless specified otherwise
in the present document.
In particular, the entries with the following keys in the Signature Dictionary are directly addressed: M, Contents,
Filter, SubFilter, ByteRange. Further the entries with the Location, Name, ContactInfo and Reason keys in
the Signature Dictionary are inherently addressed.
5.4 Validation data and archive validation data attributes
5.4.1 Overview
Validation of a digital signature requires data to validate the signature such as CA certificates, Certificate Revocation
List (CRL) or Online Certificate Status Protocol (OCSP) commonly provided by online services (referred to in the
present document as validation data).
This clause describes an extension to ISO 32000-1 [1] called Document Security Store (DSS) to carry such validation
data as necessary to validate a signature, optionally with Validation Related Information (VRI) which relates the
validation data to a specific signature (see clause 5.4.2). The structure of DSS and VRI is illustrated in figure 1.
DSS dict
VRI
Indirect references to all Certs
Indirect references to all OCSPs
Indirect references to all CRLs
VRI of a specific signature
Indirect references to required Certs
Indirect references to required OCSPs
Indirect references to required CRLs
Cert1 (value)
Cert2 (value)
OCSP1 (response value)
CRL1 (value)
Certn (value)
OCSPn (value)
CRLn (value)
Figure 1: Illustration of DSS and VRI structures
This clause also defines another extension to ISO 32000-1 [1] called Document Time-stamp (see clause 5.4.3) to extend
the life-time of protection to the document.
These extensions support Long Term Validation (LTV) of PDF Signatures. The structure of a PDF document with LTV
is illustrated in figure 2.
ETSI
11 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
Document
Security Store
Document
Time-stamp
Figure 2: Illustration of PDF document with extended life-time protection
The life-time of the protection can be further extended beyond the life-time of the last document time-stamp applied by
adding further DSS information to validate the previous last document time-stamp along with a new document
time-stamp. Every time a DSS Dictionary is updated during incremental update, it should contain the values from the
previous DSS Dictionary.
NOTE: In general the DSS Dictionary will contain validation data from previous revisions plus validation data
added for the current revision. If entries are removed from a DSS Dictionary during an incremental
update the set of validation data might not be complete for validation of the signatures, but replacement of
validation data - e.g. more up-to-date certificate status information - might be performed for optimization
reasons.
This is illustrated in figure 3.
Figure 3: Illustration of PDF Document with repeated LTV
ETSI
12 Draft ETSI EN 319 142-1 V1.2.0 (2023-10)
5.4.2 Document Security Store
5.4.2.1 Catalog
Added to ISO 32000-1 [1] table 28 "Entries in catalogue dictionary"
KEY TYPE VALUE
DSS Dictionary (Optional) Document-wide security-related information.
5.4.2.2 DSS Dictionary
The Document Security Store (DSS) shall be a dictionary that shall have the value DSS as key in the document catalog
dictionary. This dictionary is used to provide a single place where all of the validation-related information for some or
all signatures in the document should be placed.
The DSS dictionary, if present, shall contain validation-related information only for document and time-stamps
signatures represented in PKCS#7 and CMS (and its derivatives) format or for XAdES signatures of forms signing
dynamic XFA [i.7].
NOTE 1: See ETSI EN 319 142-2 [i.11] for specification of XAdES signatures of forms signing dynamic XFA.
Entries in a DSS Dictionary
KEY TYPE VALUE
Type Name (Optional) It shall be DSS for a document security store
dictionary.
VRI Dictionary (Optional) This dictionary contains Signature VRI dictionaries in
the document. The key of each entry in this dictionary is the
base-16-encoded (uppercase) SHA1 digest of the signature to
which it applies and the value is the Signature VRI dictionary
which contains the validation-related information for that
signature.
(See additional requirements a), b), c)).
Certs Array (Optional) An array of indirect references to streams, each
containing one DER-encoded X.509 certificate (that shall be as
defined in IETF RFC 5280 [4]). This array contains certificates
that can be used in the validation of any signatures in the
document.
OCSPs Array (Optional) An array of indirect references to streams, each
containing a DER-encoded Online Certificate Status
Protocol (OCSP) response, which can be used in the validation
of any signature in the document. The OCSP response shall be
encoded by using the encoding of the OCSPResponse type as
defined in IETF RFC 6960 [5] (see note 2).
CRLs Array (Optional) An array of indirect references to streams, each
containing a DER-encoded Certificate Revocation List (CRL)
(that shall be as defined in IETF RFC 5280 [4]). This array
contains CRLs that can be used in the validation of any
signatures in the document.
a) For document signatures or document time-stamp signatures the bytes that are hashed shall be those of the
complete hexadecimal string in the entry with the key Co
...
EUROPEAN STANDARD
Electronic Signatures and Infrastructures (ESI);
PAdES digital signatures;
Part 1: Building blocks and PAdES baseline signatures
2 ETSI EN 319 142-1 V1.2.1 (2024-01)
Reference
REN/ESI-0019142-1v121
Keywords
electronic signature, PAdES, profile, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
https://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2024.
All rights reserved.
ETSI
3 ETSI EN 319 142-1 V1.2.1 (2024-01)
Contents
Intellectual Property Rights . 4
Foreword . 4
Modal verbs terminology . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definition of terms, symbols and abbreviations . 7
3.1 Terms . 7
3.2 Symbols . 8
3.3 Abbreviations . 8
4 General syntax . 8
4.1 General requirements for PAdES signatures based on PDF signatures . 8
5 Attributes syntax and semantics . 9
5.1 Introduction . 9
5.2 CMS and CAdES defined attributes . 9
5.3 ISO 32000-1 defined attributes . 10
5.4 Validation data and archive validation data attributes . 10
5.4.1 Overview . 10
5.4.2 Document Security Store . 12
5.4.2.1 Catalog . 12
5.4.2.2 DSS Dictionary . 12
5.4.2.3 Signature VRI Dictionary . 13
5.4.3 Document Time-stamp . 14
5.5 Requirements on encryption . 14
5.6 Extensions dictionary . 15
6 PAdES baseline signatures . 15
6.1 Signature levels . 15
6.2 General requirements for PAdES baseline signatures . 16
6.2.1 Algorithm requirements . 16
6.2.2 Notation for requirements . 16
6.3 PAdES baseline signatures . 18
6.4 Legacy PAdES baseline signatures . 22
Annex A (informative): Change history . 23
History . 24
ETSI
4 ETSI EN 319 142-1 V1.2.1 (2024-01)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.
Foreword
This European Standard (EN) has been produced by ETSI Technical Committee Electronic Signatures and
Infrastructures (ESI).
The present document is part 1 of a multi-part deliverable covering the PDF digital signatures (PAdES), as identified
below:
ETSI EN 319 142-1: "Building blocks and PAdES baseline signatures";
ETSI EN 319 142-2: "Additional PAdES signatures profiles".
ETSI TS 119 142-3: "PAdES Document Time-stamp digital signatures (PAdES-DTS)".
National transposition dates
Date of adoption of this EN: 15 January 2024
Date of latest announcement of this EN (doa): 30 April 2024
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 31 October 2024
Date of withdrawal of any conflicting National Standard (dow): 31 October 2024
ETSI
5 ETSI EN 319 142-1 V1.2.1 (2024-01)
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Introduction
Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and
global networks. Trust in this way of doing business is essential for the success and continued development of
electronic commerce. It is therefore important that companies using this electronic means of doing business have
suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with
their business partners. In this respect digital signatures are an important security component that can be used to protect
information and provide trust in electronic business.
The present document is intended to cover digital signatures supported by PKI and public key certificates, and aims to
meet the general requirements of the international community to provide trust and confidence in electronic transactions,
including, amongst other, applicable requirements from Regulation (EU) No 910/2014 [i.2].
The present document can be used for any transaction between an individual and a company, between two companies,
between an individual and a governmental body, etc. The present document is independent of any environment. It can
be applied to any environment e.g. smart cards, SIM cards, special programs for electronic signatures, etc.
The present document is part of a rationalized framework of standards (see ETSI TR 119 000 [i.3]).
ETSI TR 119 100 [i.4] provides guidance on how to use the present document within the aforementioned framework.
ETSI
6 ETSI EN 319 142-1 V1.2.1 (2024-01)
1 Scope
The present document specifies PAdES digital signatures. PAdES signatures build on PDF signatures specified in
ISO 32000-1 [1] with an alternative signature encoding to support digital signature formats equivalent to the signature
format CAdES as specified in ETSI EN 319 122-1 [2], by incorporation of signed and unsigned attributes, which fulfil
certain common requirements (such as the long term validity of digital signatures) in a number of use cases.
The present document specifies formats for PAdES baseline signatures, which provide the basic features necessary for a
wide range of business and governmental use cases for electronic procedures and communications to be applicable to a
wide range of communities when there is a clear need for interoperability of digital signatures used in electronic
documents.
The present document defines four levels of PAdES baseline signatures addressing incremental requirements to
maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the
requirements addressed at levels that are below it. Each level requires the presence of certain PAdES attributes, suitably
profiled for reducing the optionality as much as possible.
Procedures for creation, augmentation, and validation of PAdES digital signatures are out of scope and specified in
ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of PAdES digital signatures including the
usage of the different attributes defined in the present document is provided in ETSI TR 119 100 [i.4]. The present
document aims at supporting electronic signatures in different regulatory frameworks.
NOTE: Specifically but not exclusively, PAdES digital signatures specified in the present document aim at
supporting electronic signatures, advanced electronic signatures, qualified electronic signatures,
electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU)
No 910/2014 [i.2].
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ISO 32000-1: "Document management - Portable document format - Part 1: PDF 1.7".
[2] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures;
Part 1: Building blocks and CAdES baseline signatures".
[3] IETF RFC 5652 (2009): "Cryptographic Message Syntax (CMS)".
[4] IETF RFC 5280 (2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate
Revocation List (CRL) Profile".
[5] IETF RFC 6960 (2013): "X.509 Internet Public Key Infrastructure Online Certificate Status
Protocol - OCSP".
[6] IETF RFC 3161 (2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)". ®
[7] W3C Recommendation (May 2008): "Canonical XML Version 1.1".
[8] IETF RFC 5816 (2010): "ESSCertIDv2 Update for RFC 3161".
ETSI
7 ETSI EN 319 142-1 V1.2.1 (2024-01)
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TS 101 533-1: "Electronic Signatures and Infrastructures (ESI); Data Preservation Systems
Security; Part 1: Requirements for Implementation and Management".
[i.2] Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on
electronic identification and trust services for electronic transactions in the internal market and
repealing Directive 1999/93/EC.
[i.3] ETSI TR 119 000: "Electronic Signatures and Infrastructures (ESI); The framework for
standardization of digital signatures and trust services; Overview".
[i.4] ETSI TR 119 100: "Electronic Signatures and Infrastructures (ESI); Guidance on the use of
standards for signature creation and validation".
[i.5] ETSI EN 319 102-1: "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and
Validation of AdES Digital Signatures; Part 1: Creation and Validation".
[i.6] ETSI TS 119 312: "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". ®
[i.7] Adobe XFA: "XML Forms Architecture (XFA) Specification" version 2.5, (June 2007), Adobe
Systems Incorporated".
[i.8] ETSI TS 103 172: "Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile".
[i.9] IETF RFC 2315 (1998): "PKCS #7: Cryptographic Message Syntax Version 1.5".
[i.10] ETSI TS 119 612: "Electronic Signatures and Infrastructures (ESI); Trusted Lists".
[i.11] ETSI EN 319 142-2: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures;
Part 2: Additional PAdES signatures profiles".
[i.12] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for
standardization of signatures; Definitions and abbreviations".
3 Definition of terms, symbols and abbreviations
3.1 Terms
For the purposes of the present document, the terms given in ISO 32000-1 [1], ETSI TR 119 001 [i.12] and the
following apply:
digital signature: data appended to, or a cryptographic transformation of a data unit that allows a recipient of the data
unit to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
digital signature value: result of the cryptographic transformation of a data unit that allows a recipient of the data unit
to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
electronic time-stamp: data in electronic form which binds other electronic data to a particular time establishing
evidence that these data existed at that time
ETSI
8 ETSI EN 319 142-1 V1.2.1 (2024-01)
generator: any party which creates, or augments a digital signature
NOTE: This can be the signer or any party that initially validates or further maintains the signature.
Legacy PAdES baseline signature: digital signature generated according to ETSI TS 103 172 [i.8]
PAdES signature: digital signature that satisfies the requirements specified within the present document or ETSI
EN 319 142-2 [i.11]
proof of existence: evidence that proves that an object existed at a specific date/time
signature augmentation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their augmentation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be conformant
signature creation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their creation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be conformant
signature handler: software application, or part of a software application, that knows how to perform digital signature
operations (e.g. signing and/or validating) in conformance with ISO 32000-1 [1] and the requirements of the appropriate
profile
signature policy: signature creation policy, signature augmentation policy, signature validation policy or any
combination thereof, applicable to the same signature or set of signatures
signature validation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their validation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be valid
trust service provider: natural or legal person who provides one or more trust services
validation data: data that is used to validate a digital signature
verifier: entity that wants to validate or verify a digital signature
3.2 Symbols
Void.
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.12] and the following apply:
DSS Document Security Store
ESS Enhanced Security Services
TSL Trust Status List
VRI Validation Related Information
4 General syntax
4.1 General requirements for PAdES signatures based on PDF
signatures
PAdES signatures profiled in the present document build on PDF signatures specified in ISO 32000-1 [1] with an
alternative signature encoding to support digital signature formats equivalent to the signature format CAdES as
specified in ETSI EN 319 122-1 [2], by incorporation of signed and unsigned attributes described in clause 5.
ETSI
9 ETSI EN 319 142-1 V1.2.1 (2024-01)
The following requirements apply:
a) A DER-encoded SignedData object as specified in ETSI EN 319 122-1 [2] shall be included as the PDF
signature in the entry with the key Contents of the Signature Dictionary as described in ISO 32000-1 [1],
clause 12.8.1. There shall only be a single signer (i.e. one single component of SignerInfo type within
signerInfos element) in any PDF Signature.
b) Requirements for handling PDF Signatures specified in ISO 32000-1 [1], clause 12.8 shall apply except where
overridden by the present document.
NOTE: Given that PAdES signatures are enveloped inside a PDF document and are detached in the sense of a
CMS signature, the signature placement is implied by ISO 32000-1 [1].
In ISO 32000-1 [1], clause 12.8.3.3.1 reads "No data shall be encapsulated in the PKCS#7 SignedData
field".
c) Some signature attributes found in ETSI EN 319 122-1 [2] have the same or similar meaning as keys in the
Signature Dictionary described in ISO 32000-1 [1]. For signature attributes and keys that have the same or
similar meaning only one of them should be used according to the requirements set in table defined in clause
6.3 in the present document.
5 Attributes syntax and semantics
5.1 Introduction
This clause provides details on attributes specified within ISO 32000-1 [1] and ETSI EN 319 122-1 [2] and defines new
attributes for building PAdES signatures.
The clause distinguishes between the following types of attributes: CMS and CAdES defined attributes,
ISO 32000-1 [1] defined attributes, validation data and archive validation data attributes. The first ones are the attributes
that build the DER-encoded SignedData object included as the PDF signature in the entry with the key Contents of
the Signature Dictionary as described in ISO 32000-1 [1], clause 12.8.1. The second ones are the attributes that build
the Signature Dictionary as described in ISO 32000-1 [1]. The other ones are the attributes where to include validation
data and archive validation data that can guarantee long term validity of digital signatures.
Clause 6.3 provides the requirements concerning how to use the attributes described above.
5.2 CMS and CAdES defined attributes
The attributes included in the following list may be used to generate the DER-encoded SignedData object included as
the PDF signature in the entry with the key Contents of the Signature Dictionary as described in ISO 32000-1 [1],
clause 12.8.1. Their syntax shall be as defined in ETSI EN 319 122-1 [2], clause 5.
• content-type
• message-digest
• signing certificate reference attributes
- ESS signing-certificate
- ESS signing-certificate-v2
• commitment-type-indication
• signer-attributes-v2
• content-time-stamp
• signature-policy-identifier
• signature-time-stamp
ETSI
10 ETSI EN 319 142-1 V1.2.1 (2024-01)
5.3 ISO 32000-1 defined attributes
The entries of the Signature Dictionary shall be as defined in ISO 32000-1 [1], clause 12.8.1 unless specified otherwise
in the present document.
In particular, the entries with the following keys in the Signature Dictionary are directly addressed: M, Contents,
Filter, SubFilter, ByteRange. Further the entries with the Location, Name, ContactInfo and Reason keys in
the Signature Dictionary are inherently addressed.
5.4 Validation data and archive validation data attributes
5.4.1 Overview
Validation of a digital signature requires data to validate the signature such as CA certificates, Certificate Revocation
List (CRL) or Online Certificate Status Protocol (OCSP) commonly provided by online services (referred to in the
present document as validation data).
This clause describes an extension to ISO 32000-1 [1] called Document Security Store (DSS) to carry such validation
data as necessary to validate a signature, optionally with Validation Related Information (VRI) which relates the
validation data to a specific signature (see clause 5.4.2). The structure of DSS and VRI is illustrated in figure 1.
DSS dict
VRI
Indirect references to all Certs
Indirect references to all OCSPs
Indirect references to all CRLs
VRI of a specific signature
Indirect references to required Certs
Indirect references to required OCSPs
Indirect references to required CRLs
Cert1 (value)
Cert2 (value)
OCSP1 (response value)
CRL1 (value)
Certn (value)
OCSPn (value)
CRLn (value)
Figure 1: Illustration of DSS and VRI structures
This clause also defines another extension to ISO 32000-1 [1] called Document Time-stamp (see clause 5.4.3) to extend
the life-time of protection to the document.
These extensions support Long Term Validation (LTV) of PDF Signatures. The structure of a PDF document with LTV
is illustrated in figure 2.
ETSI
11 ETSI EN 319 142-1 V1.2.1 (2024-01)
Document
Security Store
Document
Time-stamp
Figure 2: Illustration of PDF document with extended life-time protection
The life-time of the protection can be further extended beyond the life-time of the last document time-stamp applied by
adding further DSS information to validate the previous last document time-stamp along with a new document
time-stamp. Every time a DSS Dictionary is updated during incremental update, it should contain the values from the
previous DSS Dictionary.
NOTE: In general the DSS Dictionary will contain validation data from previous revisions plus validation data
added for the current revision. If entries are removed from a DSS Dictionary during an incremental
update the set of validation data might not be complete for validation of the signatures, but replacement of
validation data - e.g. more up-to-date certificate status information - might be performed for optimization
reasons.
This is illustrated in figure 3.
Figure 3: Illustration of PDF Document with repeated LTV
ETSI
12 ETSI EN 319 142-1 V1.2.1 (2024-01)
5.4.2 Document Security Store
5.4.2.1 Catalog
Added to ISO 32000-1 [1] table 28 "Entries in catalogue dictionary"
KEY TYPE VALUE
DSS
Dictionary (Optional) Document-wide security-related information.
5.4.2.2 DSS Dictionary
The Document Security Store (DSS) shall be a dictionary that shall have the value DSS as key in the document catalog
dictionary. This dictionary is used to provide a single place where all of the validation-related information for some or
all signatures in the document should be placed.
The DSS dictionary, if present, shall contain validation-related information only for document and time-stamps
signatures represented in PKCS#7 and CMS (and its derivatives) format or for XAdES signatures of forms signing
dynamic XFA [i.7].
NOTE 1: See ETSI EN 319 142-2 [i.11] for specification of XAdES signatures of forms signing dynamic XFA.
Entries in a DSS Dictionary
KEY TYPE VALUE
Type Name (Optional) It shall be DSS for a document security store
dictionary.
VRI Dictionary (Optional) This dictionary contains Signature VRI dictionaries in
the document. The key of each entry in this dictionary is the
base-16-encoded (uppercase) SHA1 digest of the signature to
which it applies and the value is the Signature VRI dictionary
which contains the validation-related information for that
signature.
(See additional requirements a), b), c)).
Certs Array (Optional) An array of indirect references to streams, each
containing one DER-encoded X.509 certificate (that shall be as
defined in IETF RFC 5280 [4]). This array contains certificates
that can be used in the validation of any signatures in the
document.
OCSPs (Optional) An array of indirect references to streams, each
Array
containing a DER-encoded Online Certificate Status
Protocol (OCSP) response, which can be used in the validation
of any signature in the document. The OCSP response shall be
encoded by using the encoding of the OCSPResponse type as
defined in IETF RFC 6960 [5] (see note 2).
CRLs Array (Optional) An array of indirect references to streams, each
containing a DER-encoded Certificate Revocation List (CRL)
(that shall be as defined in IETF RFC 5280 [4]). This array
contains CRLs that can be used in the validation of any
signatures in the document.
a) For document signatures or document time-stamp signatures the bytes that are hashed shall be those of the
complete hexadecimal string in the entry wit
...
SLOVENSKI STANDARD
01-marec-2024
Elektronski podpisi in infrastruktura (ESI) - Digitalni podpisi PAdES - 1. del:
Gradniki in izhodiščni podpisi PAdES
Electronic Signatures and Infrastructures (ESI) - PAdES digital signatures - Part 1:
Building blocks and PAdES baseline signatures
Ta slovenski standard je istoveten z: ETSI EN 319 142-1 V1.2.1 (2024-01)
ICS:
35.040.01 Kodiranje informacij na Information coding in general
splošno
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EUROPEAN STANDARD
Electronic Signatures and Infrastructures (ESI);
PAdES digital signatures;
Part 1: Building blocks and PAdES baseline signatures
2 ETSI EN 319 142-1 V1.2.1 (2024-01)
Reference
REN/ESI-0019142-1v121
Keywords
electronic signature, PAdES, profile, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
https://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2024.
All rights reserved.
ETSI
3 ETSI EN 319 142-1 V1.2.1 (2024-01)
Contents
Intellectual Property Rights . 4
Foreword . 4
Modal verbs terminology . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definition of terms, symbols and abbreviations . 7
3.1 Terms . 7
3.2 Symbols . 8
3.3 Abbreviations . 8
4 General syntax . 8
4.1 General requirements for PAdES signatures based on PDF signatures . 8
5 Attributes syntax and semantics . 9
5.1 Introduction . 9
5.2 CMS and CAdES defined attributes . 9
5.3 ISO 32000-1 defined attributes . 10
5.4 Validation data and archive validation data attributes . 10
5.4.1 Overview . 10
5.4.2 Document Security Store . 12
5.4.2.1 Catalog . 12
5.4.2.2 DSS Dictionary . 12
5.4.2.3 Signature VRI Dictionary . 13
5.4.3 Document Time-stamp . 14
5.5 Requirements on encryption . 14
5.6 Extensions dictionary . 15
6 PAdES baseline signatures . 15
6.1 Signature levels . 15
6.2 General requirements for PAdES baseline signatures . 16
6.2.1 Algorithm requirements . 16
6.2.2 Notation for requirements . 16
6.3 PAdES baseline signatures . 18
6.4 Legacy PAdES baseline signatures . 22
Annex A (informative): Change history . 23
History . 24
ETSI
4 ETSI EN 319 142-1 V1.2.1 (2024-01)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.
Foreword
This European Standard (EN) has been produced by ETSI Technical Committee Electronic Signatures and
Infrastructures (ESI).
The present document is part 1 of a multi-part deliverable covering the PDF digital signatures (PAdES), as identified
below:
ETSI EN 319 142-1: "Building blocks and PAdES baseline signatures";
ETSI EN 319 142-2: "Additional PAdES signatures profiles".
ETSI TS 119 142-3: "PAdES Document Time-stamp digital signatures (PAdES-DTS)".
National transposition dates
Date of adoption of this EN: 15 January 2024
Date of latest announcement of this EN (doa): 30 April 2024
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 31 October 2024
Date of withdrawal of any conflicting National Standard (dow): 31 October 2024
ETSI
5 ETSI EN 319 142-1 V1.2.1 (2024-01)
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Introduction
Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and
global networks. Trust in this way of doing business is essential for the success and continued development of
electronic commerce. It is therefore important that companies using this electronic means of doing business have
suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with
their business partners. In this respect digital signatures are an important security component that can be used to protect
information and provide trust in electronic business.
The present document is intended to cover digital signatures supported by PKI and public key certificates, and aims to
meet the general requirements of the international community to provide trust and confidence in electronic transactions,
including, amongst other, applicable requirements from Regulation (EU) No 910/2014 [i.2].
The present document can be used for any transaction between an individual and a company, between two companies,
between an individual and a governmental body, etc. The present document is independent of any environment. It can
be applied to any environment e.g. smart cards, SIM cards, special programs for electronic signatures, etc.
The present document is part of a rationalized framework of standards (see ETSI TR 119 000 [i.3]).
ETSI TR 119 100 [i.4] provides guidance on how to use the present document within the aforementioned framework.
ETSI
6 ETSI EN 319 142-1 V1.2.1 (2024-01)
1 Scope
The present document specifies PAdES digital signatures. PAdES signatures build on PDF signatures specified in
ISO 32000-1 [1] with an alternative signature encoding to support digital signature formats equivalent to the signature
format CAdES as specified in ETSI EN 319 122-1 [2], by incorporation of signed and unsigned attributes, which fulfil
certain common requirements (such as the long term validity of digital signatures) in a number of use cases.
The present document specifies formats for PAdES baseline signatures, which provide the basic features necessary for a
wide range of business and governmental use cases for electronic procedures and communications to be applicable to a
wide range of communities when there is a clear need for interoperability of digital signatures used in electronic
documents.
The present document defines four levels of PAdES baseline signatures addressing incremental requirements to
maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the
requirements addressed at levels that are below it. Each level requires the presence of certain PAdES attributes, suitably
profiled for reducing the optionality as much as possible.
Procedures for creation, augmentation, and validation of PAdES digital signatures are out of scope and specified in
ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of PAdES digital signatures including the
usage of the different attributes defined in the present document is provided in ETSI TR 119 100 [i.4]. The present
document aims at supporting electronic signatures in different regulatory frameworks.
NOTE: Specifically but not exclusively, PAdES digital signatures specified in the present document aim at
supporting electronic signatures, advanced electronic signatures, qualified electronic signatures,
electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU)
No 910/2014 [i.2].
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ISO 32000-1: "Document management - Portable document format - Part 1: PDF 1.7".
[2] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures;
Part 1: Building blocks and CAdES baseline signatures".
[3] IETF RFC 5652 (2009): "Cryptographic Message Syntax (CMS)".
[4] IETF RFC 5280 (2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate
Revocation List (CRL) Profile".
[5] IETF RFC 6960 (2013): "X.509 Internet Public Key Infrastructure Online Certificate Status
Protocol - OCSP".
[6] IETF RFC 3161 (2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)". ®
[7] W3C Recommendation (May 2008): "Canonical XML Version 1.1".
[8] IETF RFC 5816 (2010): "ESSCertIDv2 Update for RFC 3161".
ETSI
7 ETSI EN 319 142-1 V1.2.1 (2024-01)
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TS 101 533-1: "Electronic Signatures and Infrastructures (ESI); Data Preservation Systems
Security; Part 1: Requirements for Implementation and Management".
[i.2] Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on
electronic identification and trust services for electronic transactions in the internal market and
repealing Directive 1999/93/EC.
[i.3] ETSI TR 119 000: "Electronic Signatures and Infrastructures (ESI); The framework for
standardization of digital signatures and trust services; Overview".
[i.4] ETSI TR 119 100: "Electronic Signatures and Infrastructures (ESI); Guidance on the use of
standards for signature creation and validation".
[i.5] ETSI EN 319 102-1: "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and
Validation of AdES Digital Signatures; Part 1: Creation and Validation".
[i.6] ETSI TS 119 312: "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". ®
[i.7] Adobe XFA: "XML Forms Architecture (XFA) Specification" version 2.5, (June 2007), Adobe
Systems Incorporated".
[i.8] ETSI TS 103 172: "Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile".
[i.9] IETF RFC 2315 (1998): "PKCS #7: Cryptographic Message Syntax Version 1.5".
[i.10] ETSI TS 119 612: "Electronic Signatures and Infrastructures (ESI); Trusted Lists".
[i.11] ETSI EN 319 142-2: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures;
Part 2: Additional PAdES signatures profiles".
[i.12] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for
standardization of signatures; Definitions and abbreviations".
3 Definition of terms, symbols and abbreviations
3.1 Terms
For the purposes of the present document, the terms given in ISO 32000-1 [1], ETSI TR 119 001 [i.12] and the
following apply:
digital signature: data appended to, or a cryptographic transformation of a data unit that allows a recipient of the data
unit to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
digital signature value: result of the cryptographic transformation of a data unit that allows a recipient of the data unit
to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
electronic time-stamp: data in electronic form which binds other electronic data to a particular time establishing
evidence that these data existed at that time
ETSI
8 ETSI EN 319 142-1 V1.2.1 (2024-01)
generator: any party which creates, or augments a digital signature
NOTE: This can be the signer or any party that initially validates or further maintains the signature.
Legacy PAdES baseline signature: digital signature generated according to ETSI TS 103 172 [i.8]
PAdES signature: digital signature that satisfies the requirements specified within the present document or ETSI
EN 319 142-2 [i.11]
proof of existence: evidence that proves that an object existed at a specific date/time
signature augmentation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their augmentation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be conformant
signature creation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their creation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be conformant
signature handler: software application, or part of a software application, that knows how to perform digital signature
operations (e.g. signing and/or validating) in conformance with ISO 32000-1 [1] and the requirements of the appropriate
profile
signature policy: signature creation policy, signature augmentation policy, signature validation policy or any
combination thereof, applicable to the same signature or set of signatures
signature validation policy: set of rules, applicable to one or more digital signatures, that defines the technical and
procedural requirements for their validation, in order to meet a particular business need, and under which the digital
signature(s) can be determined to be valid
trust service provider: natural or legal person who provides one or more trust services
validation data: data that is used to validate a digital signature
verifier: entity that wants to validate or verify a digital signature
3.2 Symbols
Void.
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.12] and the following apply:
DSS Document Security Store
ESS Enhanced Security Services
TSL Trust Status List
VRI Validation Related Information
4 General syntax
4.1 General requirements for PAdES signatures based on PDF
signatures
PAdES signatures profiled in the present document build on PDF signatures specified in ISO 32000-1 [1] with an
alternative signature encoding to support digital signature formats equivalent to the signature format CAdES as
specified in ETSI EN 319 122-1 [2], by incorporation of signed and unsigned attributes described in clause 5.
ETSI
9 ETSI EN 319 142-1 V1.2.1 (2024-01)
The following requirements apply:
a) A DER-encoded SignedData object as specified in ETSI EN 319 122-1 [2] shall be included as the PDF
signature in the entry with the key Contents of the Signature Dictionary as described in ISO 32000-1 [1],
clause 12.8.1. There shall only be a single signer (i.e. one single component of SignerInfo type within
signerInfos element) in any PDF Signature.
b) Requirements for handling PDF Signatures specified in ISO 32000-1 [1], clause 12.8 shall apply except where
overridden by the present document.
NOTE: Given that PAdES signatures are enveloped inside a PDF document and are detached in the sense of a
CMS signature, the signature placement is implied by ISO 32000-1 [1].
In ISO 32000-1 [1], clause 12.8.3.3.1 reads "No data shall be encapsulated in the PKCS#7 SignedData
field".
c) Some signature attributes found in ETSI EN 319 122-1 [2] have the same or similar meaning as keys in the
Signature Dictionary described in ISO 32000-1 [1]. For signature attributes and keys that have the same or
similar meaning only one of them should be used according to the requirements set in table defined in clause
6.3 in the present document.
5 Attributes syntax and semantics
5.1 Introduction
This clause provides details on attributes specified within ISO 32000-1 [1] and ETSI EN 319 122-1 [2] and defines new
attributes for building PAdES signatures.
The clause distinguishes between the following types of attributes: CMS and CAdES defined attributes,
ISO 32000-1 [1] defined attributes, validation data and archive validation data attributes. The first ones are the attributes
that build the DER-encoded SignedData object included as the PDF signature in the entry with the key Contents of
the Signature Dictionary as described in ISO 32000-1 [1], clause 12.8.1. The second ones are the attributes that build
the Signature Dictionary as described in ISO 32000-1 [1]. The other ones are the attributes where to include validation
data and archive validation data that can guarantee long term validity of digital signatures.
Clause 6.3 provides the requirements concerning how to use the attributes described above.
5.2 CMS and CAdES defined attributes
The attributes included in the following list may be used to generate the DER-encoded SignedData object included as
the PDF signature in the entry with the key Contents of the Signature Dictionary as described in ISO 32000-1 [1],
clause 12.8.1. Their syntax shall be as defined in ETSI EN 319 122-1 [2], clause 5.
• content-type
• message-digest
• signing certificate reference attributes
- ESS signing-certificate
- ESS signing-certificate-v2
• commitment-type-indication
• signer-attributes-v2
• content-time-stamp
• signature-policy-identifier
• signature-time-stamp
ETSI
10 ETSI EN 319 142-1 V1.2.1 (2024-01)
5.3 ISO 32000-1 defined attributes
The entries of the Signature Dictionary shall be as defined in ISO 32000-1 [1], clause 12.8.1 unless specified otherwise
in the present document.
In particular, the entries with the following keys in the Signature Dictionary are directly addressed: M, Contents,
Filter, SubFilter, ByteRange. Further the entries with the Location, Name, ContactInfo and Reason keys in
the Signature Dictionary are inherently addressed.
5.4 Validation data and archive validation data attributes
5.4.1 Overview
Validation of a digital signature requires data to validate the signature such as CA certificates, Certificate Revocation
List (CRL) or Online Certificate Status Protocol (OCSP) commonly provided by online services (referred to in the
present document as validation data).
This clause describes an extension to ISO 32000-1 [1] called Document Security Store (DSS) to carry such validation
data as necessary to validate a signature, optionally with Validation Related Information (VRI) which relates the
validation data to a specific signature (see clause 5.4.2). The structure of DSS and VRI is illustrated in figure 1.
DSS dict
VRI
Indirect references to all Certs
Indirect references to all OCSPs
Indirect references to all CRLs
VRI of a specific signature
Indirect references to required Certs
Indirect references to required OCSPs
Indirect references to required CRLs
Cert1 (value)
Cert2 (value)
OCSP1 (response value)
CRL1 (value)
Certn (value)
OCSPn (value)
CRLn (value)
Figure 1: Illustration of DSS and VRI structures
This clause also defines another extension to ISO 32000-1 [1] called Document Time-stamp (see clause 5.4.3) to extend
the life-time of protection to the document.
These extensions support Long Term Validation (LTV) of PDF Signatures. The structure of a PDF document with LTV
is illustrated in figure 2.
ETSI
11 ETSI EN 319 142-1 V1.2.1 (2024-01)
Document
Security Store
Document
Time-stamp
Figure 2: Illustration of PDF document with extended life-time protection
The life-time of the protection can be further extended beyond the life-time of the last document time-stamp applied by
adding further DSS information to validate the previous last document time-stamp along with a new document
time-stamp. Every time a DSS Dictionary is updated during incremental update, it should contain the values from the
previous DSS Dictionary.
NOTE: In general the DSS Dictionary will contain validation data from previous revisions plus validation data
added for the current revision. If entries are removed from a DSS Dictionary during an incremental
update the set of validation data might not be complete for validation of the signatures, but replacement of
validation data - e.g. more up-to-date certificate status information - might be performed for optimization
reasons.
This is illustrated in figure 3.
Figure 3: Illustration of PDF Document with repeated LTV
ETSI
12 ETSI EN 319 142-1 V1.2.1 (2024-01)
5.4.2 Document Security Store
5.4.2.1 Catalog
Added to ISO 32000-1 [1] table 28 "Entries in catalogue dictionary"
KEY TYPE VALUE
DSS
Dictionary (Optional) Document-wide security-related information.
5.4.2.2 DSS Dictionary
The Document Security Store (DSS) shall be a dictionary that shall have the value DSS as key in the document catalog
dictionary. This dictionary is used to provide a single place where all of the validation-related information for some or
all signatures in the document should be placed.
The DSS dictionary, if present, shall contain validation-related information only for document and time-stamps
signatures represented in PKCS#7 and CMS (and its derivatives) format or for XAdES signatures of forms signing
dynamic XFA [i.7].
NOTE 1: See ETSI EN 319 142-2 [i.11] for specification of XAdES signatures of forms signing dynamic XFA.
Entries in a DSS Dictionary
KEY TYPE VALUE
Type Name (Optional) It shall be DSS for a document security store
dictionary.
VRI Dictionary (Optional) This dictionary contains Signature VRI dictionaries in
the document. The key of each entry in this dictionary is the
base-16-encoded (uppercase) SHA1 digest of the signature to
which it applies and the value is the Signature VRI dictionary
which contains the validation-related information for that
signature.
(See additional requirements a), b), c)).
Certs Array (Optional) An array of indirect references to streams, each
containing one DER-encoded X.509 certificate (that shall be as
defined in IETF RFC 5280 [4]). This array contains certificates
that can be used in the validation of any signatures in the
document.
OCSPs (Optional) An array of indirect references to streams, each
Array
containing a DER-encoded Online Certificate Status
Protocol (OCSP) response, which can be used in the validation
of any signature in the document. The OCSP response shall be
encoded by using the encoding of the OCSPResponse type as
defined in IETF RFC 6960 [5] (see note 2).
CRLs Array (Optional) An array of indirect references to s
...












Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...