Electronic Signatures and Infrastructures (ESI) - CAdES digital signatures - Part 1: Building blocks and CAdES baseline signatures

The present document specifies CAdES digital signatures. CAdES signatures are built on CMS signatures [7], by incorporation of signed and unsigned attributes, which fulfil certain common requirements (such as the long term validity of digital signatures, for instance) in a number of use cases. The present document specifies the ASN.1 definitions for the aforementioned attributes as well as their usage when incorporating them to CAdES signatures. The present document specifies formats for CAdES baseline signatures, which provide the basic features necessary for a wide range of business and governmental use cases for electronic procedures and communications to be applicable to a wide range of communities when there is a clear need for interoperability of digital signatures used in electronic documents. The present document defines four levels of CAdES baseline signatures addressing incremental requirements to maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the requirements addressed at levels that are below it. Each level requires the presence of certain CAdES attributes, suitably profiled for reducing the optionality as much as possible. Procedures for creation, augmentation and validation of CAdES digital signatures are out of scope and specified in ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of CAdES digital signatures including the usage of the different properties defined in the present document is provided in ETSI TR 119 100 [i.4]. The present document aims at supporting digital signatures in different regulatory frameworks. NOTE: Specifically, but not exclusively, CAdES digital signatures specified in the present document aim at supporting electronic signatures, advanced electronic signatures, qualified electronic signatures, electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU) No 910/2014 [i.13].

Elektronski podpisi in infrastruktura (ESI) - Digitalni podpisi CAdES - 1. del: Gradniki in izhodiščni podpisi CAdES

General Information

Status
Published
Public Enquiry End Date
30-Sep-2021
Publication Date
27-Oct-2021
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
25-Oct-2021
Due Date
30-Dec-2021
Completion Date
28-Oct-2021
Mandate

Buy Standard

Standard
ETSI EN 319 122-1 V1.2.1 (2021-10) - Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures
English language
62 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
SIST EN 319 122-1 V1.2.1:2021
English language
62 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Standard
ETSI EN 319 122-1 V1.1.5 (2021-07) - Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures
English language
62 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
oSIST prEN 319 122-1 V1.1.5:2021
English language
62 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (sample)

ETSI EN 319 122-1 V1.2.1 (2021-10)
EUROPEAN STANDARD
Electronic Signatures and Infrastructures (ESI);
CAdES digital signatures;
Part 1: Building blocks and CAdES baseline signatures
---------------------- Page: 1 ----------------------
2 ETSI EN 319 122-1 V1.2.1 (2021-10)
Reference
REN/ESI-0019122-1v121
Keywords
ASN.1, CAdES, electronic signature, profile,
security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2021.
All rights reserved.
ETSI
---------------------- Page: 2 ----------------------
3 ETSI EN 319 122-1 V1.2.1 (2021-10)
Contents

Intellectual Property Rights ................................................................................................................................ 6

Foreword ............................................................................................................................................................. 6

Modal verbs terminology .................................................................................................................................... 7

Introduction ........................................................................................................................................................ 7

1 Scope ........................................................................................................................................................ 8

2 References ................................................................................................................................................ 8

2.1 Normative references ......................................................................................................................................... 8

2.2 Informative references ........................................................................................................................................ 9

3 Definition of terms, symbols and abbreviations ..................................................................................... 10

3.1 Terms ................................................................................................................................................................ 10

3.2 Symbols ............................................................................................................................................................ 11

3.3 Abbreviations ................................................................................................................................................... 11

4 General syntax ........................................................................................................................................ 12

4.1 General requirements ....................................................................................................................................... 12

4.2 The data content type..................................................................................................................................... 12

4.3 The signed-data content type .................................................................................................................... 12

4.4 The SignedData type ................................................................................................................................... 12

4.5 The EncapsulatedContentInfo type .................................................................................................... 12

4.6 The SignerInfo type ................................................................................................................................... 13

4.7 ASN.1 Encoding ............................................................................................................................................... 13

4.7.1 DER ............................................................................................................................................................ 13

4.7.2 BER ............................................................................................................................................................ 13

4.8 Other standard data structures .......................................................................................................................... 13

4.8.1 Time-stamp token format ............................................................................................................................ 13

4.8.2 Additional types .......................................................................................................................................... 13

4.9 Attributes .......................................................................................................................................................... 14

5 Attribute semantics and syntax ............................................................................................................... 14

5.1 CMS defined basic signed attributes ................................................................................................................ 14

5.1.1 The content-type attribute .................................................................................................................. 14

5.1.2 The message-digest attribute ............................................................................................................. 14

5.2 Basic attributes for CAdES signatures ............................................................................................................. 15

5.2.1 The signing-time attribute .................................................................................................................. 15

5.2.2 Signing certificate reference attributes ....................................................................................................... 15

5.2.2.1 General requirements ............................................................................................................................ 15

5.2.2.2 ESS signing-certificate attribute ........................................................................................... 15

5.2.2.3 ESS signing-certificate-v2 attribute .................................................................................... 15

5.2.3 The commitment-type-indication attribute ................................................................................. 16

5.2.4 Attributes for identifying the signed data type ............................................................................................ 17

5.2.4.1 The content-hints attribute .......................................................................................................... 17

5.2.4.2 The mime-type attribute .................................................................................................................... 17

5.2.5 The signer-location attribute ........................................................................................................... 18

5.2.6 Incorporating attributes of the signer .......................................................................................................... 18

5.2.6.1 The signer-attributes-v2 attribute ......................................................................................... 18

5.2.6.2 claimed-SAML-assertion ...................................................................................................................... 20

5.2.6.3 signed-SAML-assertion ........................................................................................................................ 20

5.2.7 The countersignature attribute ......................................................................................................... 20

5.2.8 The content-time-stamp attribute .................................................................................................... 21

5.2.9 The signature-policy-identifier attribute and the SigPolicyQualifierInfo type ..... 21

5.2.9.1 The signature-policy-identifier attribute ......................................................................... 21

5.2.9.2 The SigPolicyQualifierInfo type ........................................................................................................... 22

5.2.10 The signature-policy-store attribute .......................................................................................... 24

5.2.11 The content-reference attribute ...................................................................................................... 25

ETSI
---------------------- Page: 3 ----------------------
4 ETSI EN 319 122-1 V1.2.1 (2021-10)

5.2.12 The content-identifier attribute .................................................................................................... 25

5.2.13 The cms-algorithm-protection attribute ...................................................................................................... 25

5.3 The signature-time-stamp attribute ..................................................................................................... 26

5.4 Attributes for validation data values ................................................................................................................. 26

5.4.1 Introduction................................................................................................................................................. 26

5.4.2 OCSP responses .......................................................................................................................................... 26

5.4.2.1 OCSP response types ............................................................................................................................ 26

5.4.2.2 OCSP responses within RevocationInfoChoices ...................................................................... 26

5.4.3 CRLs ........................................................................................................................................................... 27

5.5 Attributes for long term availability and integrity of validation material ......................................................... 27

5.5.1 Introduction................................................................................................................................................. 27

5.5.2 The ats-hash-index-v3 attribute ...................................................................................................... 27

5.5.3 The archive-time-stamp-v3 attribute ............................................................................................. 29

6 CAdES baseline signatures .................................................................................................................... 31

6.1 Signature levels ................................................................................................................................................ 31

6.2 General requirements ....................................................................................................................................... 32

6.2.1 Algorithm requirements .............................................................................................................................. 32

6.2.2 Notation for requirements ........................................................................................................................... 32

6.3 Requirements on components and services ...................................................................................................... 34

6.4 Legacy CAdES baseline signatures .................................................................................................................. 37

Annex A (normative): Additional Attributes Specification .............................................................. 38

A.1 Attributes for validation data .................................................................................................................. 38

A.1.1 Certificates validation data ............................................................................................................................... 38

A.1.1.1 The complete-certificate-references attribute ............................................................................................. 38

A.1.1.2 The certificate-values attribute .................................................................................................... 39

A.1.2 Revocation validation data ............................................................................................................................... 39

A.1.2.1 The complete-revocation-references attribute............................................................................................. 39

A.1.2.2 The revocation-values attribute ...................................................................................................... 41

A.1.3 The attribute-certificate-references attribute .................................................................................................... 42

A.1.4 The attribute-revocation-references attribute ................................................................................................... 43

A.1.5 Time-stamps on references to validation data .................................................................................................. 44

A.1.5.1 The time-stamped-certs-crls-references attribute ........................................................................................ 44

A.1.5.2 The CAdES-C-timestamp attribute ...................................................................................................... 45

A.2 Deprecated attributes .............................................................................................................................. 45

A.2.1 Usage of deprecated attributes .......................................................................................................................... 45

A.2.2 The other-signing-certificate attribute .............................................................................................................. 46

A.2.3 The signer-attributes attribute ............................................................................................................ 46

A.2.4 The archive-time-stamp attribute ......................................................................................................... 46

A.2.5 The long-term-validation attribute ..................................................................................................... 46

A.2.6 The ats-hash-index attribute ................................................................................................................... 46

Annex B (normative): Alternative mechanisms for long term availability and integrity of

validation data ................................................................................................ 47

Annex C: Void ........................................................................................................................................ 48

Annex D (normative): Signature Format Definitions Using X.680 ASN.1 Syntax ......................... 49

Annex E (informative): Example Structured Contents and MIME .................................................. 56

E.1 Use of MIME to Encode Data ................................................................................................................ 56

E.1.1 MIME Structure ............................................................................................................................................... 56

E.1.2 Header Information .......................................................................................................................................... 56

E.1.3 Content Encoding ............................................................................................................................................. 57

E.1.4 Multi-Part Content ............................................................................................................................................ 57

E.2 S/MIME .................................................................................................................................................. 57

E.2.1 Using S/MIME ................................................................................................................................................. 57

E.2.2 Using application/pkcs7-mime ......................................................................................................................... 58

ETSI
---------------------- Page: 4 ----------------------
5 ETSI EN 319 122-1 V1.2.1 (2021-10)

E.2.3 Using multipart/signed and application/pkcs7-signature .................................................................................. 58

E.3 Use of MIME in the signature ................................................................................................................ 59

Annex F (informative): Change History .............................................................................................. 61

History .............................................................................................................................................................. 62

ETSI
---------------------- Page: 5 ----------------------
6 ETSI EN 319 122-1 V1.2.1 (2021-10)
Intellectual Property Rights
Essential patents

IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations

pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be

found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to

ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the

ETSI Web server (https://ipr.etsi.org/).

Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,

including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not

referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,

essential to the present document.
Trademarks

The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.

ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no

right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does

not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.

DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its

Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP

Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the

oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.

Foreword

This European Standard (EN) has been produced by ETSI Technical Committee Electronic Signatures and

Infrastructures (ESI).

The present document is part 1 of a multi-part deliverable covering CAdES digital signatures, as identified below:

Part 1: "Building blocks and CAdES baseline signatures";
Part 2: "Extended CAdES signatures".

The present document partly contains an evolved specification of the ETSI TS 101 733 [1] and ETSI TS 103 173 [i.1].

National transposition dates
Date of adoption of this EN: 18 October 2021
Date of latest announcement of this EN (doa): 31 January 2022
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 31 July 2022
Date of withdrawal of any conflicting National Standard (dow): 31 July 2022
ETSI
---------------------- Page: 6 ----------------------
7 ETSI EN 319 122-1 V1.2.1 (2021-10)
Modal verbs terminology

In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and

"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of

provisions).

"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.

Introduction

Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and

global networks. Trust in this way of doing business is essential for the success and continued development of

electronic commerce. It is therefore important that companies using this electronic means of doing business have

suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with

their business partners. In this respect digital signatures are an important security component that can be used to protect

information and provide trust in electronic business.

The present document is intended to cover digital signatures supported by PKI and public key certificates, and aims to

meet the general requirements of the international community to provide trust and confidence in electronic transactions,

including, amongst other, applicable requirements from Regulation (EU) No 910/2014 [i.13].

The present document can be used for any transaction between an individual and a company, between two companies,

between an individual and a governmental body, etc. The present document is independent of any environment. It can

be applied to any environment e.g. smart cards, GSM SIM cards, special programs for electronic signatures, etc.

The present document is part of a rationalized framework of standards (see ETSI TR 119 000 [i.2]). See ETSI

TR 119 100 [i.4] for getting guidance on how to use the present document within the aforementioned framework.

ETSI
---------------------- Page: 7 ----------------------
8 ETSI EN 319 122-1 V1.2.1 (2021-10)
1 Scope

The present document specifies CAdES digital signatures. CAdES signatures are built on CMS signatures [7], by

incorporation of signed and unsigned attributes, which fulfil certain common requirements (such as the long term

validity of digital signatures, for instance) in a number of use cases.

The present document specifies the ASN.1 definitions for the aforementioned attributes as well as their usage when

incorporating them to CAdES signatures.

The present document specifies formats for CAdES baseline signatures, which provide the basic features necessary for a

wide range of business and governmental use cases for electronic procedures and communications to be applicable to a

wide range of communities when there is a clear need for interoperability of digital signatures used in electronic

documents.

The present document defines four levels of CAdES baseline signatures addressing incremental requirements to

maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the

requirements addressed at levels that are below it. Each level requires the presence of certain CAdES attributes, suitably

profiled for reducing the optionality as much as possible.

Procedures for creation, augmentation and validation of CAdES digital signatures are out of scope and specified in

ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of CAdES digital signatures including the

usage of the different properties defined in the present document is provided in ETSI TR 119 100 [i.4].

The present document aims at supporting digital signatures in different regulatory frameworks.

NOTE: Specifically, but not exclusively, CAdES digital signatures specified in the present document aim at

supporting electronic signatures, advanced electronic signatures, qualified electronic signatures,

electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU)

No 910/2014 [i.13].
2 References
2.1 Normative references

References are either specific (identified by date of publication and/or edition number or version number) or

non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the

referenced document (including any amendments) applies.

Referenced documents which are not found to be publicly available in the expected location might be found at

https://docbox.etsi.org/Reference.

NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee

their long term validity.

The following referenced documents are necessary for the application of the present document.

[1] ETSI TS 101 733 (V2.2.1): "Electronic Signatures and Infrastructures (ESI); CMS Advanced

Electronic Signatures (CAdES)".

[2] IETF RFC 2045 (1996): "Multipurpose Internet Mail Extensions (MIME) Part One: Format of

Internet Message Bodies".
[3] IETF RFC 2634 (1999): "Enhanced Security Services for S/MIME".

[4] IETF RFC 3161 (2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)".

[5] IETF RFC 5035 (2007): "Enhanced Security Services (ESS) Update: Adding CertID Algorithm

Agility".
ETSI
---------------------- Page: 8 ----------------------
9 ETSI EN 319 122-1 V1.2.1 (2021-10)

[6] IETF RFC 5280 (2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate

Revocation List (CRL) Profile".
NOTE: Obsoletes IETF RFC 3280.
[7] IETF RFC 5652 (2009): "Cryptographic Message Syntax (CMS)".
NOTE: Obsoletes IETF RFC 3852.

[8] IETF RFC 5755 (2010): "An Internet Attribute Certificate Profile for Authorization".

NOTE: Obsoletes IETF RFC 3281.
[9] IETF RFC 5816 (2010): "ESSCertIDv2 Update for RFC 3161".

[10] IETF RFC 5911 (2010): "New ASN.1 Modules for Cryptographic Message Syntax (CMS) and

S/MIME".

[11] IETF RFC 5912 (2010): "New ASN.1 Modules for the Public Key Infrastructure Using X.509

(PKIX)".
NOTE: Updated by IETF RFC 6268.

[12] IETF RFC 6268 (2011): "Additional New ASN.1 Modules for the Cryptographic Message Syntax

(CMS) and the Public Key Infrastructure Using X.509 (PKIX)".

[13] IETF RFC 5940 (2010): "Additional Cryptographic Message Syntax (CMS) Revocation

Information Choices".

[14] IETF RFC 6960 (2013): "X.509 Internet Public Key Infrastructure Online Certificate Status

Protocol - OCSP".
NOTE: Obsoletes IETF RFC 2560.

[15] Recommendation ITU-T X.520 (11/2008)/ISO/IEC 9594-6:2008): "Information technology -

Open Systems Interconnection - The Directory: Selected attribute types".

[16] Recommendation ITU-T X.680 (2008): "Information technology - Abstract Syntax Notation One

(ASN.1): Specification of basic notation".

[17] Recommendation ITU-T X.690 (2008): "Information technology - ASN.1 encoding rules:

Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and
Distinguished Encoding Rules (DER)".
[18] OASIS Standard: "Security Assertion Markup Language (SAML) V2.0
...

SLOVENSKI STANDARD
SIST EN 319 122-1 V1.2.1:2021
01-december-2021
Elektronski podpisi in infrastruktura (ESI) - Digitalni podpisi CAdES - 1. del:
Gradniki in izhodiščni podpisi CAdES

Electronic Signatures and Infrastructures (ESI) - CAdES digital signatures - Part 1:

Building blocks and CAdES baseline signatures
Ta slovenski standard je istoveten z: ETSI EN 319 122-1 V1.2.1 (2021-10)
ICS:
35.040.01 Kodiranje informacij na Information coding in general
splošno
SIST EN 319 122-1 V1.2.1:2021 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 319 122-1 V1.2.1:2021
---------------------- Page: 2 ----------------------
SIST EN 319 122-1 V1.2.1:2021
ETSI EN 319 122-1 V1.2.1 (2021-10)
EUROPEAN STANDARD
Electronic Signatures and Infrastructures (ESI);
CAdES digital signatures;
Part 1: Building blocks and CAdES baseline signatures
---------------------- Page: 3 ----------------------
SIST EN 319 122-1 V1.2.1:2021
2 ETSI EN 319 122-1 V1.2.1 (2021-10)
Reference
REN/ESI-0019122-1v121
Keywords
ASN.1, CAdES, electronic signature, profile,
security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2021.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
SIST EN 319 122-1 V1.2.1:2021
3 ETSI EN 319 122-1 V1.2.1 (2021-10)
Contents

Intellectual Property Rights ................................................................................................................................ 6

Foreword ............................................................................................................................................................. 6

Modal verbs terminology .................................................................................................................................... 7

Introduction ........................................................................................................................................................ 7

1 Scope ........................................................................................................................................................ 8

2 References ................................................................................................................................................ 8

2.1 Normative references ......................................................................................................................................... 8

2.2 Informative references ........................................................................................................................................ 9

3 Definition of terms, symbols and abbreviations ..................................................................................... 10

3.1 Terms ................................................................................................................................................................ 10

3.2 Symbols ............................................................................................................................................................ 11

3.3 Abbreviations ................................................................................................................................................... 11

4 General syntax ........................................................................................................................................ 12

4.1 General requirements ....................................................................................................................................... 12

4.2 The data content type..................................................................................................................................... 12

4.3 The signed-data content type .................................................................................................................... 12

4.4 The SignedData type ................................................................................................................................... 12

4.5 The EncapsulatedContentInfo type .................................................................................................... 12

4.6 The SignerInfo type ................................................................................................................................... 13

4.7 ASN.1 Encoding ............................................................................................................................................... 13

4.7.1 DER ............................................................................................................................................................ 13

4.7.2 BER ............................................................................................................................................................ 13

4.8 Other standard data structures .......................................................................................................................... 13

4.8.1 Time-stamp token format ............................................................................................................................ 13

4.8.2 Additional types .......................................................................................................................................... 13

4.9 Attributes .......................................................................................................................................................... 14

5 Attribute semantics and syntax ............................................................................................................... 14

5.1 CMS defined basic signed attributes ................................................................................................................ 14

5.1.1 The content-type attribute .................................................................................................................. 14

5.1.2 The message-digest attribute ............................................................................................................. 14

5.2 Basic attributes for CAdES signatures ............................................................................................................. 15

5.2.1 The signing-time attribute .................................................................................................................. 15

5.2.2 Signing certificate reference attributes ....................................................................................................... 15

5.2.2.1 General requirements ............................................................................................................................ 15

5.2.2.2 ESS signing-certificate attribute ........................................................................................... 15

5.2.2.3 ESS signing-certificate-v2 attribute .................................................................................... 15

5.2.3 The commitment-type-indication attribute ................................................................................. 16

5.2.4 Attributes for identifying the signed data type ............................................................................................ 17

5.2.4.1 The content-hints attribute .......................................................................................................... 17

5.2.4.2 The mime-type attribute .................................................................................................................... 17

5.2.5 The signer-location attribute ........................................................................................................... 18

5.2.6 Incorporating attributes of the signer .......................................................................................................... 18

5.2.6.1 The signer-attributes-v2 attribute ......................................................................................... 18

5.2.6.2 claimed-SAML-assertion ...................................................................................................................... 20

5.2.6.3 signed-SAML-assertion ........................................................................................................................ 20

5.2.7 The countersignature attribute ......................................................................................................... 20

5.2.8 The content-time-stamp attribute .................................................................................................... 21

5.2.9 The signature-policy-identifier attribute and the SigPolicyQualifierInfo type ..... 21

5.2.9.1 The signature-policy-identifier attribute ......................................................................... 21

5.2.9.2 The SigPolicyQualifierInfo type ........................................................................................................... 22

5.2.10 The signature-policy-store attribute .......................................................................................... 24

5.2.11 The content-reference attribute ...................................................................................................... 25

ETSI
---------------------- Page: 5 ----------------------
SIST EN 319 122-1 V1.2.1:2021
4 ETSI EN 319 122-1 V1.2.1 (2021-10)

5.2.12 The content-identifier attribute .................................................................................................... 25

5.2.13 The cms-algorithm-protection attribute ...................................................................................................... 25

5.3 The signature-time-stamp attribute ..................................................................................................... 26

5.4 Attributes for validation data values ................................................................................................................. 26

5.4.1 Introduction................................................................................................................................................. 26

5.4.2 OCSP responses .......................................................................................................................................... 26

5.4.2.1 OCSP response types ............................................................................................................................ 26

5.4.2.2 OCSP responses within RevocationInfoChoices ...................................................................... 26

5.4.3 CRLs ........................................................................................................................................................... 27

5.5 Attributes for long term availability and integrity of validation material ......................................................... 27

5.5.1 Introduction................................................................................................................................................. 27

5.5.2 The ats-hash-index-v3 attribute ...................................................................................................... 27

5.5.3 The archive-time-stamp-v3 attribute ............................................................................................. 29

6 CAdES baseline signatures .................................................................................................................... 31

6.1 Signature levels ................................................................................................................................................ 31

6.2 General requirements ....................................................................................................................................... 32

6.2.1 Algorithm requirements .............................................................................................................................. 32

6.2.2 Notation for requirements ........................................................................................................................... 32

6.3 Requirements on components and services ...................................................................................................... 34

6.4 Legacy CAdES baseline signatures .................................................................................................................. 37

Annex A (normative): Additional Attributes Specification .............................................................. 38

A.1 Attributes for validation data .................................................................................................................. 38

A.1.1 Certificates validation data ............................................................................................................................... 38

A.1.1.1 The complete-certificate-references attribute ............................................................................................. 38

A.1.1.2 The certificate-values attribute .................................................................................................... 39

A.1.2 Revocation validation data ............................................................................................................................... 39

A.1.2.1 The complete-revocation-references attribute............................................................................................. 39

A.1.2.2 The revocation-values attribute ...................................................................................................... 41

A.1.3 The attribute-certificate-references attribute .................................................................................................... 42

A.1.4 The attribute-revocation-references attribute ................................................................................................... 43

A.1.5 Time-stamps on references to validation data .................................................................................................. 44

A.1.5.1 The time-stamped-certs-crls-references attribute ........................................................................................ 44

A.1.5.2 The CAdES-C-timestamp attribute ...................................................................................................... 45

A.2 Deprecated attributes .............................................................................................................................. 45

A.2.1 Usage of deprecated attributes .......................................................................................................................... 45

A.2.2 The other-signing-certificate attribute .............................................................................................................. 46

A.2.3 The signer-attributes attribute ............................................................................................................ 46

A.2.4 The archive-time-stamp attribute ......................................................................................................... 46

A.2.5 The long-term-validation attribute ..................................................................................................... 46

A.2.6 The ats-hash-index attribute ................................................................................................................... 46

Annex B (normative): Alternative mechanisms for long term availability and integrity of

validation data ................................................................................................ 47

Annex C: Void ........................................................................................................................................ 48

Annex D (normative): Signature Format Definitions Using X.680 ASN.1 Syntax ......................... 49

Annex E (informative): Example Structured Contents and MIME .................................................. 56

E.1 Use of MIME to Encode Data ................................................................................................................ 56

E.1.1 MIME Structure ............................................................................................................................................... 56

E.1.2 Header Information .......................................................................................................................................... 56

E.1.3 Content Encoding ............................................................................................................................................. 57

E.1.4 Multi-Part Content ............................................................................................................................................ 57

E.2 S/MIME .................................................................................................................................................. 57

E.2.1 Using S/MIME ................................................................................................................................................. 57

E.2.2 Using application/pkcs7-mime ......................................................................................................................... 58

ETSI
---------------------- Page: 6 ----------------------
SIST EN 319 122-1 V1.2.1:2021
5 ETSI EN 319 122-1 V1.2.1 (2021-10)

E.2.3 Using multipart/signed and application/pkcs7-signature .................................................................................. 58

E.3 Use of MIME in the signature ................................................................................................................ 59

Annex F (informative): Change History .............................................................................................. 61

History .............................................................................................................................................................. 62

ETSI
---------------------- Page: 7 ----------------------
SIST EN 319 122-1 V1.2.1:2021
6 ETSI EN 319 122-1 V1.2.1 (2021-10)
Intellectual Property Rights
Essential patents

IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations

pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be

found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to

ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the

ETSI Web server (https://ipr.etsi.org/).

Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,

including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not

referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,

essential to the present document.
Trademarks

The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.

ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no

right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does

not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.

DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its

Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP

Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the

oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.

Foreword

This European Standard (EN) has been produced by ETSI Technical Committee Electronic Signatures and

Infrastructures (ESI).

The present document is part 1 of a multi-part deliverable covering CAdES digital signatures, as identified below:

Part 1: "Building blocks and CAdES baseline signatures";
Part 2: "Extended CAdES signatures".

The present document partly contains an evolved specification of the ETSI TS 101 733 [1] and ETSI TS 103 173 [i.1].

National transposition dates
Date of adoption of this EN: 18 October 2021
Date of latest announcement of this EN (doa): 31 January 2022
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 31 July 2022
Date of withdrawal of any conflicting National Standard (dow): 31 July 2022
ETSI
---------------------- Page: 8 ----------------------
SIST EN 319 122-1 V1.2.1:2021
7 ETSI EN 319 122-1 V1.2.1 (2021-10)
Modal verbs terminology

In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and

"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of

provisions).

"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.

Introduction

Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and

global networks. Trust in this way of doing business is essential for the success and continued development of

electronic commerce. It is therefore important that companies using this electronic means of doing business have

suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with

their business partners. In this respect digital signatures are an important security component that can be used to protect

information and provide trust in electronic business.

The present document is intended to cover digital signatures supported by PKI and public key certificates, and aims to

meet the general requirements of the international community to provide trust and confidence in electronic transactions,

including, amongst other, applicable requirements from Regulation (EU) No 910/2014 [i.13].

The present document can be used for any transaction between an individual and a company, between two companies,

between an individual and a governmental body, etc. The present document is independent of any environment. It can

be applied to any environment e.g. smart cards, GSM SIM cards, special programs for electronic signatures, etc.

The present document is part of a rationalized framework of standards (see ETSI TR 119 000 [i.2]). See ETSI

TR 119 100 [i.4] for getting guidance on how to use the present document within the aforementioned framework.

ETSI
---------------------- Page: 9 ----------------------
SIST EN 319 122-1 V1.2.1:2021
8 ETSI EN 319 122-1 V1.2.1 (2021-10)
1 Scope

The present document specifies CAdES digital signatures. CAdES signatures are built on CMS signatures [7], by

incorporation of signed and unsigned attributes, which fulfil certain common requirements (such as the long term

validity of digital signatures, for instance) in a number of use cases.

The present document specifies the ASN.1 definitions for the aforementioned attributes as well as their usage when

incorporating them to CAdES signatures.

The present document specifies formats for CAdES baseline signatures, which provide the basic features necessary for a

wide range of business and governmental use cases for electronic procedures and communications to be applicable to a

wide range of communities when there is a clear need for interoperability of digital signatures used in electronic

documents.

The present document defines four levels of CAdES baseline signatures addressing incremental requirements to

maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the

requirements addressed at levels that are below it. Each level requires the presence of certain CAdES attributes, suitably

profiled for reducing the optionality as much as possible.

Procedures for creation, augmentation and validation of CAdES digital signatures are out of scope and specified in

ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of CAdES digital signatures including the

usage of the different properties defined in the present document is provided in ETSI TR 119 100 [i.4].

The present document aims at supporting digital signatures in different regulatory frameworks.

NOTE: Specifically, but not exclusively, CAdES digital signatures specified in the present document aim at

supporting electronic signatures, advanced electronic signatures, qualified electronic signatures,

electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU)

No 910/2014 [i.13].
2 References
2.1 Normative references

References are either specific (identified by date of publication and/or edition number or version number) or

non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the

referenced document (including any amendments) applies.

Referenced documents which are not found to be publicly available in the expected location might be found at

https://docbox.etsi.org/Reference.

NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee

their long term validity.

The following referenced documents are necessary for the application of the present document.

[1] ETSI TS 101 733 (V2.2.1): "Electronic Signatures and Infrastructures (ESI); CMS Advanced

Electronic Signatures (CAdES)".

[2] IETF RFC 2045 (1996): "Multipurpose Internet Mail Extensions (MIME) Part One: Format of

Internet Message Bodies".
[3] IETF RFC 2634 (1999): "Enhanced Security Services for S/MIME".

[4] IETF RFC 3161 (2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)".

[5] IETF RFC 5035 (2007): "Enhanced Security Services (ESS) Update: Adding CertID Algorithm

Agility".
ETSI
---------------------- Page: 10 ----------------------
SIST EN 319 122-1 V1.2.1:2021
9 ETSI EN 319 122-1 V1.2.1 (2021-10)

[6] IETF RFC 5280 (2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate

Revocation List (CRL) Profile".
NOTE: Obsoletes IETF RFC 3280.
[7] IETF RFC 5652 (2009): "Cryptographic Message Syntax (CMS)".
NOTE: Obsoletes IETF RFC 3852.

[8] IETF RFC 5755 (2010): "An Internet Attribute Certificate Profile for Authorization".

NOTE: Obsoletes IETF RFC 3281.
[9] IETF RFC 5816 (2010): "ESSCertIDv2 Update for RFC 3161".

[10] IETF RFC 5911 (2010): "New ASN.1 Modules for Cryptographic Message Syntax (CMS) and

S/MIME".

[11] IETF RFC 5912 (2010): "New ASN.1 Modules for the Public Key Infrastructure Using X.5

...

Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
EUROPEAN STANDARD
Electronic Signatures and Infrastructures (ESI);
CAdES digital signatures;
Part 1: Building blocks and CAdES baseline signatures
---------------------- Page: 1 ----------------------
2 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Reference
REN/ESI-0019122-1v121
Keywords
ASN.1, CAdES, electronic signature, profile,
security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2021.
All rights reserved.
ETSI
---------------------- Page: 2 ----------------------
3 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Contents

Intellectual Property Rights ................................................................................................................................ 6

Foreword ............................................................................................................................................................. 6

Modal verbs terminology .................................................................................................................................... 6

Introduction ........................................................................................................................................................ 7

1 Scope ........................................................................................................................................................ 8

2 References ................................................................................................................................................ 8

2.1 Normative references ......................................................................................................................................... 8

2.2 Informative references ........................................................................................................................................ 9

3 Definition of terms, symbols and abbreviations ..................................................................................... 10

3.1 Terms ................................................................................................................................................................ 10

3.2 Symbols ............................................................................................................................................................ 11

3.3 Abbreviations ................................................................................................................................................... 11

4 General syntax ........................................................................................................................................ 12

4.1 General requirements ....................................................................................................................................... 12

4.2 The data content type..................................................................................................................................... 12

4.3 The signed-data content type .................................................................................................................... 12

4.4 The SignedData type ................................................................................................................................... 12

4.5 The EncapsulatedContentInfo type .................................................................................................... 12

4.6 The SignerInfo type ................................................................................................................................... 13

4.7 ASN.1 Encoding ............................................................................................................................................... 13

4.7.1 DER ............................................................................................................................................................ 13

4.7.2 BER ............................................................................................................................................................ 13

4.8 Other standard data structures .......................................................................................................................... 13

4.8.1 Time-stamp token format ............................................................................................................................ 13

4.8.2 Additional types .......................................................................................................................................... 13

4.9 Attributes .......................................................................................................................................................... 14

5 Attribute semantics and syntax ............................................................................................................... 14

5.1 CMS defined basic signed attributes ................................................................................................................ 14

5.1.1 The content-type attribute .................................................................................................................. 14

5.1.2 The message-digest attribute ............................................................................................................. 14

5.2 Basic attributes for CAdES signatures ............................................................................................................. 15

5.2.1 The signing-time attribute .................................................................................................................. 15

5.2.2 Signing certificate reference attributes ....................................................................................................... 15

5.2.2.1 General requirements ............................................................................................................................ 15

5.2.2.2 ESS signing-certificate attribute ........................................................................................... 15

5.2.2.3 ESS signing-certificate-v2 attribute .................................................................................... 15

5.2.3 The commitment-type-indication attribute ................................................................................. 16

5.2.4 Attributes for identifying the signed data type ............................................................................................ 17

5.2.4.1 The content-hints attribute .......................................................................................................... 17

5.2.4.2 The mime-type attribute .................................................................................................................... 17

5.2.5 The signer-location attribute ........................................................................................................... 18

5.2.6 Incorporating attributes of the signer .......................................................................................................... 18

5.2.6.1 The signer-attributes-v2 attribute ......................................................................................... 18

5.2.6.2 claimed-SAML-assertion ...................................................................................................................... 20

5.2.6.3 signed-SAML-assertion ........................................................................................................................ 20

5.2.7 The countersignature attribute ......................................................................................................... 20

5.2.8 The content-time-stamp attribute .................................................................................................... 21

5.2.9 The signature-policy-identifier attribute and the SigPolicyQualifierInfo type ..... 21

5.2.9.1 The signature-policy-identifier attribute ......................................................................... 21

5.2.9.2 The SigPolicyQualifierInfo type ........................................................................................................... 22

5.2.10 The signature-policy-store attribute .......................................................................................... 24

5.2.11 The content-reference attribute ...................................................................................................... 25

ETSI
---------------------- Page: 3 ----------------------
4 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)

5.2.12 The content-identifier attribute .................................................................................................... 25

5.2.13 The cms-algorithm-protection attribute ...................................................................................................... 25

5.3 The signature-time-stamp attribute ..................................................................................................... 26

5.4 Attributes for validation data values ................................................................................................................. 26

5.4.1 Introduction................................................................................................................................................. 26

5.4.2 OCSP responses .......................................................................................................................................... 26

5.4.2.1 OCSP response types ............................................................................................................................ 26

5.4.2.2 OCSP responses within RevocationInfoChoices ...................................................................... 26

5.4.3 CRLs ........................................................................................................................................................... 27

5.5 Attributes for long term availability and integrity of validation material ......................................................... 27

5.5.1 Introduction................................................................................................................................................. 27

5.5.2 The ats-hash-index-v3 attribute ...................................................................................................... 27

5.5.3 The archive-time-stamp-v3 attribute ............................................................................................. 29

6 CAdES baseline signatures .................................................................................................................... 31

6.1 Signature levels ................................................................................................................................................ 31

6.2 General requirements ....................................................................................................................................... 32

6.2.1 Algorithm requirements .............................................................................................................................. 32

6.2.2 Notation for requirements ........................................................................................................................... 32

6.3 Requirements on components and services ...................................................................................................... 34

6.4 Legacy CAdES baseline signatures .................................................................................................................. 37

Annex A (normative): Additional Attributes Specification .............................................................. 38

A.1 Attributes for validation data .................................................................................................................. 38

A.1.1 Certificates validation data ............................................................................................................................... 38

A.1.1.1 The complete-certificate-references attribute ............................................................................................. 38

A.1.1.2 The certificate-values attribute .................................................................................................... 39

A.1.2 Revocation validation data ............................................................................................................................... 39

A.1.2.1 The complete-revocation-references attribute............................................................................................. 39

A.1.2.2 The revocation-values attribute ...................................................................................................... 41

A.1.3 The attribute-certificate-references attribute .................................................................................................... 42

A.1.4 The attribute-revocation-references attribute ................................................................................................... 43

A.1.5 Time-stamps on references to validation data .................................................................................................. 44

A.1.5.1 The time-stamped-certs-crls-references attribute ........................................................................................ 44

A.1.5.2 The CAdES-C-timestamp attribute ...................................................................................................... 45

A.2 Deprecated attributes .............................................................................................................................. 45

A.2.1 Usage of deprecated attributes .......................................................................................................................... 45

A.2.2 The other-signing-certificate attribute .............................................................................................................. 45

A.2.3 The signer-attributes attribute ............................................................................................................ 46

A.2.4 The archive-time-stamp attribute ......................................................................................................... 46

A.2.5 The long-term-validation attribute ..................................................................................................... 46

A.2.6 The ats-hash-index attribute ................................................................................................................... 46

Annex B (normative): Alternative mechanisms for long term availability and integrity of

validation data ................................................................................................ 47

Annex C: Void ........................................................................................................................................ 48

Annex D (normative): Signature Format Definitions Using X.680 ASN.1 Syntax ......................... 49

Annex E (informative): Example Structured Contents and MIME .................................................. 56

E.1 Use of MIME to Encode Data ................................................................................................................ 56

E.1.1 MIME Structure ............................................................................................................................................... 56

E.1.2 Header Information .......................................................................................................................................... 56

E.1.3 Content Encoding ............................................................................................................................................. 57

E.1.4 Multi-Part Content ............................................................................................................................................ 57

E.2 S/MIME .................................................................................................................................................. 57

E.2.1 Using S/MIME ................................................................................................................................................. 57

E.2.2 Using application/pkcs7-mime ......................................................................................................................... 58

ETSI
---------------------- Page: 4 ----------------------
5 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)

E.2.3 Using multipart/signed and application/pkcs7-signature .................................................................................. 58

E.3 Use of MIME in the signature ................................................................................................................ 59

Annex F (informative): Change History .............................................................................................. 61

History .............................................................................................................................................................. 62

ETSI
---------------------- Page: 5 ----------------------
6 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Intellectual Property Rights
Essential patents

IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations

pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be

found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to

ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the

ETSI Web server (https://ipr.etsi.org/).

Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,

including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not

referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,

essential to the present document.
Trademarks

The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.

ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no

right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does

not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.

DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its

Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP

Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the

oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.

Foreword

This draft European Standard (EN) has been produced by ETSI Technical Committee Electronic Signatures and

Infrastructures (ESI), and is now submitted for the combined Public Enquiry and Vote phase of the ETSI standards EN

Approval Procedure.

The present document is part 1 of a multi-part deliverable covering CAdES digital signatures, as identified below:

Part 1: "Building blocks and CAdES baseline signatures";
Part 2: "Extended CAdES signatures".

The present document partly contains an evolved specification of the ETSI TS 101 733 [1] and ETSI TS 103 173 [i.1].

Proposed national transposition dates
Date of latest announcement of this EN (doa): 3 months after ETSI publication
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 6 months after doa

Date of withdrawal of any conflicting National Standard (dow): 6 months after doa

Modal verbs terminology

In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and

"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of

provisions).

"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.

ETSI
---------------------- Page: 6 ----------------------
7 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Introduction

Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and

global networks. Trust in this way of doing business is essential for the success and continued development of

electronic commerce. It is therefore important that companies using this electronic means of doing business have

suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with

their business partners. In this respect digital signatures are an important security component that can be used to protect

information and provide trust in electronic business.

The present document is intended to cover digital signatures supported by PKI and public key certificates, and aims to

meet the general requirements of the international community to provide trust and confidence in electronic transactions,

including, amongst other, applicable requirements from Regulation (EU) No 910/2014 [i.13].

The present document can be used for any transaction between an individual and a company, between two companies,

between an individual and a governmental body, etc. The present document is independent of any environment. It can

be applied to any environment e.g. smart cards, GSM SIM cards, special programs for electronic signatures, etc.

The present document is part of a rationalized framework of standards (see ETSI TR 119 000 [i.2]). See ETSI

TR 119 100 [i.4] for getting guidance on how to use the present document within the aforementioned framework.

ETSI
---------------------- Page: 7 ----------------------
8 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
1 Scope

The present document specifies CAdES digital signatures. CAdES signatures are built on CMS signatures [7], by

incorporation of signed and unsigned attributes, which fulfil certain common requirements (such as the long term

validity of digital signatures, for instance) in a number of use cases.

The present document specifies the ASN.1 definitions for the aforementioned attributes as well as their usage when

incorporating them to CAdES signatures.

The present document specifies formats for CAdES baseline signatures, which provide the basic features necessary for a

wide range of business and governmental use cases for electronic procedures and communications to be applicable to a

wide range of communities when there is a clear need for interoperability of digital signatures used in electronic

documents.

The present document defines four levels of CAdES baseline signatures addressing incremental requirements to

maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the

requirements addressed at levels that are below it. Each level requires the presence of certain CAdES attributes, suitably

profiled for reducing the optionality as much as possible.

Procedures for creation, augmentation and validation of CAdES digital signatures are out of scope and specified in

ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of CAdES digital signatures including the

usage of the different properties defined in the present document is provided in ETSI TR 119 100 [i.4].

The present document aims at supporting digital signatures in different regulatory frameworks.

NOTE: Specifically, but not exclusively, CAdES digital signatures specified in the present document aim at

supporting electronic signatures, advanced electronic signatures, qualified electronic signatures,

electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU)

No 910/2014 [i.13].
2 References
2.1 Normative references

References are either specific (identified by date of publication and/or edition number or version number) or

non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the

referenced document (including any amendments) applies.

Referenced documents which are not found to be publicly available in the expected location might be found at

http://docbox.etsi.org/Reference.

NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee

their long term validity.

The following referenced documents are necessary for the application of the present document.

[1] ETSI TS 101 733 (V2.2.1): "Electronic Signatures and Infrastructures (ESI); CMS Advanced

Electronic Signatures (CAdES)".

[2] IETF RFC 2045 (1996): "Multipurpose Internet Mail Extensions (MIME) Part One: Format of

Internet Message Bodies".
[3] IETF RFC 2634 (1999): "Enhanced Security Services for S/MIME".

[4] IETF RFC 3161 (2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)".

[5] IETF RFC 5035 (2007): "Enhanced Security Services (ESS) Update: Adding CertID Algorithm

Agility".
ETSI
---------------------- Page: 8 ----------------------
9 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)

[6] IETF RFC 5280 (2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate

Revocation List (CRL) Profile".
NOTE: Obsoletes IETF RFC 3280.
[7] IETF RFC 5652 (2009): "Cryptographic Message Syntax (CMS)".
NOTE: Obsoletes IETF RFC 3852.

[8] IETF RFC 5755 (2010): "An Internet Attribute Certificate Profile for Authorization".

NOTE: Obsoletes IETF RFC 3281.
[9] IETF RFC 5816 (2010): "ESSCertIDv2 Update for RFC 3161".

[10] IETF RFC 5911 (2010): "New ASN.1 Modules for Cryptographic Message Syntax (CMS) and

S/MIME".

[11] IETF RFC 5912 (2010): "New ASN.1 Modules for the Public Key Infrastructure Using X.509

(PKIX)".
NOTE: Updated by IETF RFC 6268.

[12] IETF RFC 6268 (2011): "Additional New ASN.1 Modules for the Cryptographic Message Syntax

(CMS) and the Public Key Infrastructure Using X.509 (PKIX)".

[13] IETF RFC 5940 (2010): "Additional Cryptographic Message Syntax (CMS) Revocation

Information Choices".

[14] IETF RFC 6960 (2013): "X.509 Internet Public Key Infrastructure Online Certificate Status

Protocol - OCSP".
NOTE: Obsoletes IETF RFC 2560.

[15] Recommendation ITU-T X.520 (11/2008)/ISO/IEC 9594-6:2008): "Information technology -

Open Systems Interconnection - The Directory: Selected attribute types".

[16] Recommendation ITU-T X.680 (2008): "Information technology - Abstract Syntax Notation One

(ASN.1): Specification of basic notation".

[17] Recommendation ITU-T X.690 (2008): "Information technology - ASN.1 encoding rules:

Specification of Basic Encoding
...

SLOVENSKI STANDARD
oSIST prEN 319 122-1 V1.1.5:2021
01-september-2021
Elektronski podpisi in infrastruktura (ESI) - Digitalni podpisi CAdES - 1. del:
Gradniki in izhodiščni podpisi CAdES

Electronic Signatures and Infrastructures (ESI) - CAdES digital signatures - Part 1:

Building blocks and CAdES baseline signatures
Ta slovenski standard je istoveten z: ETSI EN 319 122-1 V1.1.5 (2021-07)
ICS:
35.040.01 Kodiranje informacij na Information coding in general
splošno
oSIST prEN 319 122-1 V1.1.5:2021 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
---------------------- Page: 2 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
EUROPEAN STANDARD
Electronic Signatures and Infrastructures (ESI);
CAdES digital signatures;
Part 1: Building blocks and CAdES baseline signatures
---------------------- Page: 3 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
2 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Reference
REN/ESI-0019122-1v121
Keywords
ASN.1, CAdES, electronic signature, profile,
security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2021.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
3 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Contents

Intellectual Property Rights ................................................................................................................................ 6

Foreword ............................................................................................................................................................. 6

Modal verbs terminology .................................................................................................................................... 6

Introduction ........................................................................................................................................................ 7

1 Scope ........................................................................................................................................................ 8

2 References ................................................................................................................................................ 8

2.1 Normative references ......................................................................................................................................... 8

2.2 Informative references ........................................................................................................................................ 9

3 Definition of terms, symbols and abbreviations ..................................................................................... 10

3.1 Terms ................................................................................................................................................................ 10

3.2 Symbols ............................................................................................................................................................ 11

3.3 Abbreviations ................................................................................................................................................... 11

4 General syntax ........................................................................................................................................ 12

4.1 General requirements ....................................................................................................................................... 12

4.2 The data content type..................................................................................................................................... 12

4.3 The signed-data content type .................................................................................................................... 12

4.4 The SignedData type ................................................................................................................................... 12

4.5 The EncapsulatedContentInfo type .................................................................................................... 12

4.6 The SignerInfo type ................................................................................................................................... 13

4.7 ASN.1 Encoding ............................................................................................................................................... 13

4.7.1 DER ............................................................................................................................................................ 13

4.7.2 BER ............................................................................................................................................................ 13

4.8 Other standard data structures .......................................................................................................................... 13

4.8.1 Time-stamp token format ............................................................................................................................ 13

4.8.2 Additional types .......................................................................................................................................... 13

4.9 Attributes .......................................................................................................................................................... 14

5 Attribute semantics and syntax ............................................................................................................... 14

5.1 CMS defined basic signed attributes ................................................................................................................ 14

5.1.1 The content-type attribute .................................................................................................................. 14

5.1.2 The message-digest attribute ............................................................................................................. 14

5.2 Basic attributes for CAdES signatures ............................................................................................................. 15

5.2.1 The signing-time attribute .................................................................................................................. 15

5.2.2 Signing certificate reference attributes ....................................................................................................... 15

5.2.2.1 General requirements ............................................................................................................................ 15

5.2.2.2 ESS signing-certificate attribute ........................................................................................... 15

5.2.2.3 ESS signing-certificate-v2 attribute .................................................................................... 15

5.2.3 The commitment-type-indication attribute ................................................................................. 16

5.2.4 Attributes for identifying the signed data type ............................................................................................ 17

5.2.4.1 The content-hints attribute .......................................................................................................... 17

5.2.4.2 The mime-type attribute .................................................................................................................... 17

5.2.5 The signer-location attribute ........................................................................................................... 18

5.2.6 Incorporating attributes of the signer .......................................................................................................... 18

5.2.6.1 The signer-attributes-v2 attribute ......................................................................................... 18

5.2.6.2 claimed-SAML-assertion ...................................................................................................................... 20

5.2.6.3 signed-SAML-assertion ........................................................................................................................ 20

5.2.7 The countersignature attribute ......................................................................................................... 20

5.2.8 The content-time-stamp attribute .................................................................................................... 21

5.2.9 The signature-policy-identifier attribute and the SigPolicyQualifierInfo type ..... 21

5.2.9.1 The signature-policy-identifier attribute ......................................................................... 21

5.2.9.2 The SigPolicyQualifierInfo type ........................................................................................................... 22

5.2.10 The signature-policy-store attribute .......................................................................................... 24

5.2.11 The content-reference attribute ...................................................................................................... 25

ETSI
---------------------- Page: 5 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
4 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)

5.2.12 The content-identifier attribute .................................................................................................... 25

5.2.13 The cms-algorithm-protection attribute ...................................................................................................... 25

5.3 The signature-time-stamp attribute ..................................................................................................... 26

5.4 Attributes for validation data values ................................................................................................................. 26

5.4.1 Introduction................................................................................................................................................. 26

5.4.2 OCSP responses .......................................................................................................................................... 26

5.4.2.1 OCSP response types ............................................................................................................................ 26

5.4.2.2 OCSP responses within RevocationInfoChoices ...................................................................... 26

5.4.3 CRLs ........................................................................................................................................................... 27

5.5 Attributes for long term availability and integrity of validation material ......................................................... 27

5.5.1 Introduction................................................................................................................................................. 27

5.5.2 The ats-hash-index-v3 attribute ...................................................................................................... 27

5.5.3 The archive-time-stamp-v3 attribute ............................................................................................. 29

6 CAdES baseline signatures .................................................................................................................... 31

6.1 Signature levels ................................................................................................................................................ 31

6.2 General requirements ....................................................................................................................................... 32

6.2.1 Algorithm requirements .............................................................................................................................. 32

6.2.2 Notation for requirements ........................................................................................................................... 32

6.3 Requirements on components and services ...................................................................................................... 34

6.4 Legacy CAdES baseline signatures .................................................................................................................. 37

Annex A (normative): Additional Attributes Specification .............................................................. 38

A.1 Attributes for validation data .................................................................................................................. 38

A.1.1 Certificates validation data ............................................................................................................................... 38

A.1.1.1 The complete-certificate-references attribute ............................................................................................. 38

A.1.1.2 The certificate-values attribute .................................................................................................... 39

A.1.2 Revocation validation data ............................................................................................................................... 39

A.1.2.1 The complete-revocation-references attribute............................................................................................. 39

A.1.2.2 The revocation-values attribute ...................................................................................................... 41

A.1.3 The attribute-certificate-references attribute .................................................................................................... 42

A.1.4 The attribute-revocation-references attribute ................................................................................................... 43

A.1.5 Time-stamps on references to validation data .................................................................................................. 44

A.1.5.1 The time-stamped-certs-crls-references attribute ........................................................................................ 44

A.1.5.2 The CAdES-C-timestamp attribute ...................................................................................................... 45

A.2 Deprecated attributes .............................................................................................................................. 45

A.2.1 Usage of deprecated attributes .......................................................................................................................... 45

A.2.2 The other-signing-certificate attribute .............................................................................................................. 45

A.2.3 The signer-attributes attribute ............................................................................................................ 46

A.2.4 The archive-time-stamp attribute ......................................................................................................... 46

A.2.5 The long-term-validation attribute ..................................................................................................... 46

A.2.6 The ats-hash-index attribute ................................................................................................................... 46

Annex B (normative): Alternative mechanisms for long term availability and integrity of

validation data ................................................................................................ 47

Annex C: Void ........................................................................................................................................ 48

Annex D (normative): Signature Format Definitions Using X.680 ASN.1 Syntax ......................... 49

Annex E (informative): Example Structured Contents and MIME .................................................. 56

E.1 Use of MIME to Encode Data ................................................................................................................ 56

E.1.1 MIME Structure ............................................................................................................................................... 56

E.1.2 Header Information .......................................................................................................................................... 56

E.1.3 Content Encoding ............................................................................................................................................. 57

E.1.4 Multi-Part Content ............................................................................................................................................ 57

E.2 S/MIME .................................................................................................................................................. 57

E.2.1 Using S/MIME ................................................................................................................................................. 57

E.2.2 Using application/pkcs7-mime ......................................................................................................................... 58

ETSI
---------------------- Page: 6 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
5 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)

E.2.3 Using multipart/signed and application/pkcs7-signature .................................................................................. 58

E.3 Use of MIME in the signature ................................................................................................................ 59

Annex F (informative): Change History .............................................................................................. 61

History .............................................................................................................................................................. 62

ETSI
---------------------- Page: 7 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
6 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Intellectual Property Rights
Essential patents

IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations

pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be

found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to

ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the

ETSI Web server (https://ipr.etsi.org/).

Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,

including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not

referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,

essential to the present document.
Trademarks

The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.

ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no

right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does

not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.

DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its

Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP

Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the

oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.

Foreword

This draft European Standard (EN) has been produced by ETSI Technical Committee Electronic Signatures and

Infrastructures (ESI), and is now submitted for the combined Public Enquiry and Vote phase of the ETSI standards EN

Approval Procedure.

The present document is part 1 of a multi-part deliverable covering CAdES digital signatures, as identified below:

Part 1: "Building blocks and CAdES baseline signatures";
Part 2: "Extended CAdES signatures".

The present document partly contains an evolved specification of the ETSI TS 101 733 [1] and ETSI TS 103 173 [i.1].

Proposed national transposition dates
Date of latest announcement of this EN (doa): 3 months after ETSI publication
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 6 months after doa

Date of withdrawal of any conflicting National Standard (dow): 6 months after doa

Modal verbs terminology

In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and

"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of

provisions).

"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.

ETSI
---------------------- Page: 8 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
7 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
Introduction

Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and

global networks. Trust in this way of doing business is essential for the success and continued development of

electronic commerce. It is therefore important that companies using this electronic means of doing business have

suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with

their business partners. In this respect digital signatures are an important security component that can be used to protect

information and provide trust in electronic business.

The present document is intended to cover digital signatures supported by PKI and public key certificates, and aims to

meet the general requirements of the international community to provide trust and confidence in electronic transactions,

including, amongst other, applicable requirements from Regulation (EU) No 910/2014 [i.13].

The present document can be used for any transaction between an individual and a company, between two companies,

between an individual and a governmental body, etc. The present document is independent of any environment. It can

be applied to any environment e.g. smart cards, GSM SIM cards, special programs for electronic signatures, etc.

The present document is part of a rationalized framework of standards (see ETSI TR 119 000 [i.2]). See ETSI

TR 119 100 [i.4] for getting guidance on how to use the present document within the aforementioned framework.

ETSI
---------------------- Page: 9 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
8 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)
1 Scope

The present document specifies CAdES digital signatures. CAdES signatures are built on CMS signatures [7], by

incorporation of signed and unsigned attributes, which fulfil certain common requirements (such as the long term

validity of digital signatures, for instance) in a number of use cases.

The present document specifies the ASN.1 definitions for the aforementioned attributes as well as their usage when

incorporating them to CAdES signatures.

The present document specifies formats for CAdES baseline signatures, which provide the basic features necessary for a

wide range of business and governmental use cases for electronic procedures and communications to be applicable to a

wide range of communities when there is a clear need for interoperability of digital signatures used in electronic

documents.

The present document defines four levels of CAdES baseline signatures addressing incremental requirements to

maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the

requirements addressed at levels that are below it. Each level requires the presence of certain CAdES attributes, suitably

profiled for reducing the optionality as much as possible.

Procedures for creation, augmentation and validation of CAdES digital signatures are out of scope and specified in

ETSI EN 319 102-1 [i.5]. Guidance on creation, augmentation and validation of CAdES digital signatures including the

usage of the different properties defined in the present document is provided in ETSI TR 119 100 [i.4].

The present document aims at supporting digital signatures in different regulatory frameworks.

NOTE: Specifically, but not exclusively, CAdES digital signatures specified in the present document aim at

supporting electronic signatures, advanced electronic signatures, qualified electronic signatures,

electronic seals, advanced electronic seals, and qualified electronic seals as per Regulation (EU)

No 910/2014 [i.13].
2 References
2.1 Normative references

References are either specific (identified by date of publication and/or edition number or version number) or

non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the

referenced document (including any amendments) applies.

Referenced documents which are not found to be publicly available in the expected location might be found at

http://docbox.etsi.org/Reference.

NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee

their long term validity.

The following referenced documents are necessary for the application of the present document.

[1] ETSI TS 101 733 (V2.2.1): "Electronic Signatures and Infrastructures (ESI); CMS Advanced

Electronic Signatures (CAdES)".

[2] IETF RFC 2045 (1996): "Multipurpose Internet Mail Extensions (MIME) Part One: Format of

Internet Message Bodies".
[3] IETF RFC 2634 (1999): "Enhanced Security Services for S/MIME".

[4] IETF RFC 3161 (2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)".

[5] IETF RFC 5035 (2007): "Enhanced Security Services (ESS) Update: Adding CertID Algorithm

Agility".
ETSI
---------------------- Page: 10 ----------------------
oSIST prEN 319 122-1 V1.1.5:2021
9 Draft ETSI EN 319 122-1 V1.1.5 (2021-07)

[6] IETF RFC 5280 (2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate

Revocation List (CRL) Profile".
NOTE: Obsoletes IETF RFC 3280.
[7] IETF RFC 5652 (2009): "Cryptographic Message Syntax (CMS)".
NOTE: Obsoletes IETF RFC 3852.

[8] IETF RFC 5755 (2010): "An Internet Attribute Certificate Profile for Authorization".

NOTE: Obsoletes IETF RFC 3281.
[9] IETF RFC 5816 (2010): "ESSCertIDv2 Update for
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.