~~NOTOC~~ ====== Scenario 8.1: Sign Document ====== **Category:** [[.:start|Digital Signatures]] \\ **Complexity:** ⭐⭐⭐ (Medium) \\ **Prerequisites:** Signature certificate and key \\ **Estimated Time:** 15-20 Minutes ---- ===== Description ===== This scenario describes **digitally signing documents** with Post-Quantum secure algorithms (ML-DSA). Digital signatures ensure: * **Authenticity** - Sender is verified * **Integrity** - Document has not been altered * **Non-Repudiation** - Signature cannot be denied **Supported Formats:** * Detached Signature (separate .sig file) * CMS/PKCS#7 (embedded or detached) * PDF Digital Signature (PAdES) ---- ===== Workflow ===== flowchart LR DOC[Document] --> HASH[SHA-256 Hash] HASH --> SIGN[ML-DSA Signature] KEY[Private Key] --> SIGN SIGN --> SIG[Signature] CERT[Certificate] --> CMS[CMS Container] SIG --> CMS style SIGN fill:#e8f5e9 style CMS fill:#e3f2fd ---- ===== Code Example: Detached Signature ===== using WvdS.Security.Cryptography.X509Certificates.Extensions.PQ; using System.Security.Cryptography; using var ctx = PqCryptoContext.Initialize(); // Load signing key var signingKey = ctx.LoadPrivateKey("signing.key.pem", "KeyPassword!"); var signingCert = ctx.LoadCertificate("signing.crt.pem"); // Load document var document = File.ReadAllBytes("contract.pdf"); // Calculate hash var hash = SHA256.HashData(document); // Sign with ML-DSA var signature = ctx.SignData( data: hash, privateKey: signingKey, hashAlgorithm: HashAlgorithmName.SHA256, mode: CryptoMode.Hybrid // RSA + ML-DSA parallel ); // Save signature File.WriteAllBytes("contract.pdf.sig", signature); // Signature metadata var sigInfo = new SignatureInfo { Algorithm = "ML-DSA-65 + RSA-PSS (Hybrid)", SignedAt = DateTimeOffset.UtcNow, Signer = signingCert.Subject, DocumentHash = Convert.ToHexString(hash), SignatureFile = "contract.pdf.sig" }; File.WriteAllText("contract.pdf.sig.json", JsonSerializer.Serialize(sigInfo, new JsonSerializerOptions { WriteIndented = true })); Console.WriteLine($"Document signed:"); Console.WriteLine($" Signer: {signingCert.Subject}"); Console.WriteLine($" Hash: {Convert.ToHexString(hash).Substring(0, 16)}..."); Console.WriteLine($" Signature: {signature.Length} Bytes"); ---- ===== Code Example: CMS/PKCS#7 Signature ===== using System.Security.Cryptography.Pkcs; using var ctx = PqCryptoContext.Initialize(); var signingCert = ctx.LoadCertificate("signing.crt.pem"); var signingKey = ctx.LoadPrivateKey("signing.key.pem", "KeyPassword!"); // Document var document = File.ReadAllBytes("contract.pdf"); // Create CMS ContentInfo var contentInfo = new ContentInfo(document); // Create SignedCms var signedCms = new SignedCms(contentInfo, detached: false); // Embedded // Configure signer info var signer = new CmsSigner(signingCert) { DigestAlgorithm = new Oid("2.16.840.1.101.3.4.2.1"), // SHA-256 IncludeOption = X509IncludeOption.WholeChain }; // Add signed attributes signer.SignedAttributes.Add(new Pkcs9SigningTime(DateTimeOffset.UtcNow)); // Sign with PQ extension (Hybrid) signedCms.ComputeSignature(signer, mode: CryptoMode.Hybrid); // Export CMS container var signedData = signedCms.Encode(); File.WriteAllBytes("contract.pdf.p7s", signedData); Console.WriteLine($"CMS signature created: {signedData.Length} Bytes"); ---- ===== Code Example: Verify Signature ===== using var ctx = PqCryptoContext.Initialize(); // Load document and signature var document = File.ReadAllBytes("contract.pdf"); var signature = File.ReadAllBytes("contract.pdf.sig"); // Load signer certificate var signerCert = ctx.LoadCertificate("signing.crt.pem"); // Calculate hash var hash = SHA256.HashData(document); // Verify signature bool isValid = ctx.VerifyData( data: hash, signature: signature, certificate: signerCert, hashAlgorithm: HashAlgorithmName.SHA256, mode: CryptoMode.Hybrid ); Console.WriteLine($"Signature valid: {isValid}"); if (isValid) { // Validate certificate chain var chain = new X509Chain(); chain.ChainPolicy.RevocationMode = X509RevocationMode.Online; bool chainValid = chain.Build(signerCert); Console.WriteLine($"Certificate valid: {chainValid}"); Console.WriteLine($" Signer: {signerCert.Subject}"); Console.WriteLine($" Valid until: {signerCert.NotAfter:yyyy-MM-dd}"); } ---- ===== Batch Signing ===== public class BatchSigner { private readonly AsymmetricAlgorithm _signingKey; private readonly X509Certificate2 _signingCert; private readonly PqCryptoContext _ctx; public BatchSigner(string certPath, string keyPath, string password) { _ctx = PqCryptoContext.Initialize(); _signingCert = _ctx.LoadCertificate(certPath); _signingKey = _ctx.LoadPrivateKey(keyPath, password); } public async Task> SignBatch(IEnumerable filePaths) { var results = new List(); foreach (var filePath in filePaths) { try { var document = await File.ReadAllBytesAsync(filePath); var hash = SHA256.HashData(document); var signature = _ctx.SignData( hash, _signingKey, HashAlgorithmName.SHA256, CryptoMode.Hybrid ); var sigPath = filePath + ".sig"; await File.WriteAllBytesAsync(sigPath, signature); results.Add(new SignatureResult { FilePath = filePath, SignaturePath = sigPath, Success = true, SignedAt = DateTimeOffset.UtcNow }); } catch (Exception ex) { results.Add(new SignatureResult { FilePath = filePath, Success = false, Error = ex.Message }); } } return results; } } ---- ===== Signature Formats ===== ^ Format ^ Standard ^ Usage ^ Embedded ^ | Detached | Proprietary | Simple cases | No | | PKCS#7/CMS | RFC 5652 | E-Mail, Documents | Optional | | PAdES | ETSI TS 103 172 | PDF signatures | Yes | | XAdES | ETSI TS 101 903 | XML signatures | Optional | | JAdES | ETSI TS 119 182 | JSON signatures | Optional | ---- ===== Industry-Specific Requirements ===== ^ Industry ^ Standard ^ Format ^ Special Feature ^ | **eIDAS** | Qualified Signature | PAdES-LTA | Long-term archival | | **Healthcare** | DiGAV | CMS | Patient documentation | | **Financial** | PSD2 | JAdES | API signatures | | **Government** | eGovG | XAdES | Administrative documents | ---- ===== Related Scenarios ===== ^ Relationship ^ Scenario ^ Description ^ | **Related** | [[.:code_signieren|8.2 Sign Code]] | Sign executables | | **Related** | [[.:timestamp|8.3 Timestamp]] | Long-term validity | | **Next Step** | [[.:signatur_verifizieren|8.4 Verify Signature]] | Validation | ---- << [[.:start|← Signatures Overview]] | [[en:int:pqcrypt:szenarien:start|↑ Scenarios]] | [[.:code_signieren|8.2 Sign Code →]] >> {{tag>scenario signature document cms pkcs7 ml-dsa}} ---- //Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional//