Recent from talks
Nothing was collected or created yet.
Associated Signature Containers
View on Wikipedia| Associated Signature Container Extended (ASiC-E) | |
|---|---|
| Filename extension | .asice, .sce |
| Internet media type | application/vnd. |
| Magic number | 50 4B 03 04 (the container media type is present starting at offset 38)[1] |
| Developed by | ETSI |
| Initial release | 2011 |
| Container for | XAdES, CAdES, timestamp, signed objects |
| Extended from | Zip (file format), OpenDocument, EPUB |
| Open format? | Yes |
| Associated Signature Container Simple (ASiC-S) | |
|---|---|
| Filename extension | .asics, .scs |
| Internet media type | application/vnd. |
| Magic number | 50 4B 03 04 (the container media type is present starting at offset 38)[1] |
| Developed by | ETSI |
| Initial release | 2011 |
| Container for | XAdES, CAdES, timestamp, signed object |
| Extended from | Zip (file format), OpenDocument, EPUB |
| Open format? | Yes |
Associated Signature Containers (ASiC) specifies the use of container structures to bind together one or more signed objects with either advanced electronic signatures or timestamp tokens into one single digital container.[2]
Regulatory context
[edit]Under the eIDAS-regulation,[3] an associated signature container (ASiC) for eIDAS is a data container that is used to hold a group of file objects and digital signatures and/or time assertions that are associated to those objects. This data is stored in the ASiC in a ZIP format.
European Commission Implementing Decision 2015/1506 of 8 September 2015 laid down specifications relating to formats of advanced electronic signatures and advanced seals to be recognised by public sector bodies pursuant to Articles 27 and 37 of the eIDAS-regulation. EU Member States requiring an advanced electronic signature or an advanced electronic signature based on a qualified certificate, shall recognise XML, CMS or PDF advanced electronic signature at conformance level B, T or LT level or using an associated signature container, where those signatures comply with the following technical specifications:[4]
- XAdES Baseline Profile - ETSI TS 103171 v.2.1.1.
- CAdES Baseline Profile - ETSI TS 103173 v.2.2.1.
- PAdES Baseline Profile - ETSI TS 103172 v.2.2.2.
- Associated Signature Container Baseline Profile - ETSI TS 103174 v.2.2.1[5]
Technical specification of ASiCs have been updated and standardized since April 2016 by the European Telecommunications Standards Institute in the standard Associated Signature Containers (ASiC)(ETSI EN 319 162-1 V1.1.1 (2016-04),[1][6] but this updated standard is not required by the European Commission Implementing Decision.
Structure
[edit]The internal structure of an ASiC includes two folders:
- A root folder that stores all the container's content, which might include folders that reflect the structure of that content.
- A “META-INF” folder that resides in the root folder and contains files that hold metadata about the content, including its associated signature and/or time assertion files.
Such an electronic signature file would contain a single CAdES object or one or more XAdES signatures. A time assertion file would either contain a one timestamp token that will conform to IETF RFC 3161,[7] whereas a single evidence record would conform to IETF RFC 4998[8] or IETF RFC6283.[9][2][1]
How ASiC is used
[edit]One of the purposes of an electronic signature is to secure the data that it is attached to it from being modified. This can be done by creating a dataset that combines the signature with its signed data or to store the detached signature to a separate resource and then utilize an external process to re-associate the signature with its data. It can be advantageous to use detached signatures because it prevents unauthorized modifications to the original data objects. However, by doing this, there is the risk that the detached signature will become separated from its associated data. If this were to happen, the association would be lost and therefore, the data would become inaccessible.[2]
One of the most widespread deployments of the ASiC standard is the Estonian digital signature system with the use of multiplatform (Windows, Linux, MacOS (OSX)) software called DigiDoc.
Types of ASiC containers
[edit]Using the correct tool for each job is always important. Using the correct type of ASiC container for the job at hand is also important:[2]
ASiC Simple (ASiC-S)
[edit]With this container, a single file object is associated with a signature or time assertion file. A “mimetype” file that specifies the media type might also be included in this container. When a mimetype file is included, it is required to be the first file in the ASiC container. This container type will allow additional signatures to be added in the future to be used to sign stored file objects. When long-term time-stamp tokens are used, ASiC Archive Manifest files are used to protect long-term time-stamp tokens from tampering.[1][2]
ASiC Extended (ASiC-E)
[edit]This type of container can hold one or more signature or time assertion files. ASiC-E with XAdES deals with signature files, while ASiC-E with CAdES deals with time assertions. The files within these ASiC containers apply to their own file object sets. Each file object might have additional metadata or information that is associated with it that can also be protected by the signature. An ASiC-E container could be designed to prevent this modification or allow its inclusion without causing damage to previous signatures.
Both of these ASiC containers are capable of maintaining long-term availability and integrity when storing XAdES or CAdES signatures through the use of time-stamp tokens or evidence record manifest files that are contained within the containers. ASiC containers must comply with the ZIP specification and limitations that are applied to ZIP.[1][2]
ASiC-S time assertion additional container
[edit]This container operates under the baseline requirements of the ASiC Simple (ASiC-S) container but it also provides additional time assertion requirements. Additional elements may be within its META-INF folder and requires the use of “SignedData” variable to include certificate and revocation information.[2][6]
ASiC-E CAdES additional container
[edit]This container has the same baselines as an ASiC-E container, but with additional restrictions.[2][6]
ASiC-E time assertion additional container
[edit]This container complies with ASiC-E baseline requirements along with additional requirements and restrictions.[2][6]
Reduced risk of loss of electronic signature
[edit]The use of ASiC reduces the risk of an electronic signature becoming separated from its data by combining the signature and its signed data in a container. With both elements secured within an ASiC, it is easier to distribute a signature and guarantee that the correct signature and its metadata is being used during validation. This process can also be used when associating time assertions, including evidence records or time-stamp tokens to their associated data.[2]
References
[edit]- ^ a b c d e f "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 1: Building blocks and ASiC baseline containers (ETSI EN 319 162-1 V1.1.1 (2016-04)" (PDF). European Telecommunications Standards Institute.
- ^ a b c d e f g h i j Turner, Dawn M. "ASiC - Associated Signature Containers for eIDAS". Cryptomathic. Retrieved 13 June 2017.
- ^ "Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC". EUR-Lex. The European Parliament and the Council of the European Union. Retrieved 18 March 2016.
- ^ "COMMISSION IMPLEMENTING DECISION (EU) 2015/1506 of 8 September 2015 laying down specifications relating to formats of advanced electronic signatures and advanced seals to be recognised by public sector bodies pursuant to Articles 27(5) and 37(5) of Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market". Retrieved 18 March 2018.
- ^ "Commission Implementing Decision (EU) 2015/1506 of 8 September 2015 laying down specifications relating to formats of advanced electronic signatures and advanced seals to be recognised by public sector bodies pursuant to Articles 27(5) and 37(5) of Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (Text with EEA relevance)". EUR-Lex. 9 September 2015. Material has been copied from this source. Reuse is authorised, provided the source is acknowledged.
- ^ a b c d "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 2: Additional ASiC containers (ETSI EN 319 162-2 V1.1.1 (2016-04)" (PDF). European Telecommunications Standards Institute.
- ^ Adams, C.; Cain, P.; Pinkas, D.; Zuccherato, R. "Internet X.509 Public Key Infrastructure - Time-Stamp Protocol (TSP)". Network Working Group. Retrieved 13 June 2017.
- ^ Gondrom, T.; Brander, R.; Pordesch, U. "Evidence Record Syntax (ERS)". Network Working Group. Retrieved 13 June 2017.
- ^ Jerman Blazic, A.; Saljic, S.; Gondrom, T. "Extensible Markup Language Evidence Record Syntax (XMLERS)". Internet Engineering Task Force (IETF). Retrieved 13 June 2017.
External links
[edit]Associated Signature Containers
View on Grokipediamimetype entry specifying the container type (e.g., application/vnd.etsi.asic-e+zip) and an optional ASiCManifest.xml for describing signed elements and signature policies.[2] Under the EU's eIDAS Regulation, ASiC qualifies as a recognized format for advanced and qualified electronic signatures, ensuring interoperability for cross-border digital transactions and archival purposes.[3]
The standard's design prioritizes flexibility for multi-signature scenarios, such as countersigning or timestamping chains, while supporting baseline profiles for regulatory compliance without proprietary extensions.[1] Adopted widely in European public sector applications for document authentication, ASiC addresses limitations of standalone signature formats by enabling portable, verifiable packages that resist tampering and facilitate audit trails.[3]
History and Development
Origins in ETSI Specifications
The Associated Signature Container (ASiC) format originated from technical specifications developed by the European Telecommunications Standards Institute (ETSI) under its Electronic Signatures and Infrastructures (ESI) technical committee. The initial specification, ETSI TS 102 918 version 1.1.1, was published on April 15, 2011, and defined container structures for binding one or more data objects with detached CAdES (CMS Advanced Electronic Signatures) or XAdES (XML Advanced Electronic Signatures) signatures, as well as optional time-stamp tokens, into a single package.[4] This approach addressed limitations in earlier detached signature models by enabling portable, self-contained units that maintain signature-data associations without modifying the original files, supporting compliance with EU electronic signature directives such as Directive 1999/93/EC.[4] ETSI TS 102 918 introduced two primary container types: Simple ASiC (ASiC-S) for associating a single data object with one or more signatures, and provisions for extended variants incorporating time-stamps. Version 1.3.1, released on June 28, 2013, expanded these definitions to include Extended ASiC (ASiC-E), which integrates time-mark or time-stamp mechanisms for long-term signature validity, ensuring evidence of data existence at signing time even after certificate expiration.[2] These containers utilized ZIP archiving for packaging, with mandatory inclusion of amimetype file and signature files in standardized directories (e.g., META-INF for signatures), promoting interoperability across signature validation tools while preserving the detached nature of signatures to avoid altering signed content.[2]
The specifications evolved from ETSI's foundational work on advanced electronic signatures, including TS 101 733 for CAdES (1999, with updates) and TS 101 903 for XAdES (2002, profiled in TS 103 171 from 2011), which emphasized verifiable, long-lived signatures but lacked standardized multi-file packaging.[5] By 2016, TS 102 918 informed the normative European Standard EN 319 162-1 version 1.1.1 (April 28, 2016), which formalized ZIP-based ASiC baseline containers as building blocks for electronic document workflows, explicitly supporting eIDAS Regulation (EU) No 910/2014 requirements for qualified electronic signatures.[1] This progression reflected ETSI's focus on causal integrity in signature validation, prioritizing empirical verifiability over embedded alterations that could introduce validation errors in formats like PDF or XML.[1]
Key Milestones and Updates
The initial specification for Associated Signature Containers was introduced in ETSI TS 102 918 V1.3.1, published in June 2013, which outlined ZIP-based containers for associating electronic signatures with multiple data objects to enhance portability and long-term validity.[2] This technical specification built on prior electronic signature frameworks, enabling baseline packaging of signed documents, signatures, and optional timestamps.[2] A key interoperability milestone occurred in March 2014 with the first ETSI remote Plugtests event on ASiC, testing implementations against TS 102 918 to identify conformance issues in creation, packaging, and validation processes across vendors.[6] In alignment with the eIDAS Regulation (EU) No 910/2014, ETSI transitioned to European Norm (EN) standards, publishing EN 319 162-1 V1.1.1 in April 2016, which defined building blocks and baseline ASiC containers (ASiC-S for single signatures and ASiC-E for multiple) to meet advanced electronic signature profile requirements under eIDAS Article 5.[1] Concurrently, EN 319 162-2 V1.1.1 was released in April 2016, extending the baseline with additional profiles for enhanced functionality, such as support for XAdES and CAdES formats within containers.[7] These updates formalized ASiC as a ZIP-structured format with mandatory MIME type (application/vnd.etsi.asic-e+zip or -s+zip) and signature policy references for regulatory compliance.[1] No substantive revisions to the core EN 319 162 specifications have occurred since 2016, with ongoing ETSI documents as recent as TS 119 511 V1.2.1 (October 2025) reaffirming their use in preservation and semantic contexts without altering the container architecture.[8] This stability reflects ASiC's maturity, though related electronic signature baselines (e.g., EN 319 122-1 for CAdES) have seen updates to integrate with ASiC packaging.[9]Regulatory Framework
eIDAS and EU Directives
The eIDAS Regulation (EU) No 910/2014, adopted on 23 July 2014 and applicable from 1 July 2016, establishes a harmonized EU-wide framework for electronic identification and trust services, including electronic signatures, to facilitate secure cross-border electronic transactions. It defines advanced electronic signatures (AdES) as those based on qualified certificates with requirements for uniqueness, identification of the signer, and integrity protection, while qualified electronic signatures (QES) incorporate a qualified certificate and device, granting them legal equivalence to handwritten signatures across EU member states.[10] Associated Signature Containers (ASiC) conform to this framework by packaging one or more data objects with corresponding detached signatures in a ZIP-based structure, enabling the creation and long-term validation of AdES and QES that meet eIDAS criteria for integrity, authenticity, and non-repudiation.[11] ETSI standards, particularly EN 319 162-1 (published April 2016) for baseline ASiC containers and EN 319 162-2 for extended profiles, provide the technical specifications for ASiC to ensure compliance with eIDAS, integrating signature formats such as XAdES, CAdES, and timestamps while supporting baseline levels from creation (ES-B-B) to archival validation (TAr-ES).[1] [3] These standards were developed to align with eIDAS requirements for interoperability and recognition by public sector bodies, as referenced in EU implementing acts like Commission Implementing Decision (EU) 2015/1506, which specifies formats for advanced signatures under the transitional framework.[12] ASiC's container approach addresses eIDAS mandates for binding signatures to documents without embedding, preserving evidence of long-term validity through timestamps and certificate chains verifiable against trusted lists maintained under the regulation.[13] Preceding eIDAS, Directive 1999/93/EC (adopted 13 December 1999) provided the initial EU framework for electronic signatures, distinguishing basic, advanced, and qualified types and requiring member states to recognize advanced signatures with equivalent legal effect where risks warranted. Early ASiC specifications, such as ETSI TS 102 918 (version 1.3.1, June 2013), emerged in this context to package detached advanced signatures with data objects, building on the directive's emphasis on signature-data linking without mandating specific formats.[2] eIDAS repealed and superseded the directive effective 1 July 2016, incorporating its core principles while mandating ETSI-compliant formats like ASiC for enhanced interoperability, though transitional recognition of pre-eIDAS advanced signatures persists where they meet equivalent security levels. This evolution ensures ASiC's role in bridging the directive's foundational requirements with eIDAS's stricter conformity assessments for qualified trust service providers.International and National Contexts
Associated Signature Containers (ASiC) gain legal recognition primarily through national implementations of the EU's eIDAS Regulation (EU) No 910/2014, which mandates equivalence for qualified electronic signatures across member states, with ASiC formats specified in ETSI EN 319 162 as compliant packaging for advanced and qualified signatures.[1] National variations arise in mandatory usage, validation requirements, and integration with public services; for example, Estonia's Identity Documents Act and DigiDoc framework require ASiC-E (.asice) containers for qualified timestamped signatures (BDOC-TS), enabling widespread use in e-governance since 2012, with over 99% of government services digitally signed as of 2023.[14] Lithuania's Electronic Signature Law similarly endorses ASiC for qualified signatures, integrating it into the state's MOBILE-ID and e-health systems for legally binding documents, while Latvia employs ASiC in its e-signature infrastructure for public procurement and tax filings under the Electronic Signature Law of 2003, amended to align with eIDAS in 2016.[15] In other EU states, adoption is less uniform but supported by national eIDAS transpositions; Germany's Signature Act (SigG) permits ASiC for advanced signatures in federal administration, though PAdES remains prevalent for PDFs, and Italy's Digital Administration Code mandates ASiC compatibility for interoperable public sector documents via AgID guidelines updated in 2020.[10] EEA non-EU members like Norway, Iceland, and Liechtenstein fully incorporate eIDAS via the EEA Agreement, extending ASiC recognition for cross-border trust services, though practical compatibility challenges persist in Nordic-Baltic interoperability for ASiC-E validation.[16] Internationally, ASiC lacks a unified regulatory framework equivalent to eIDAS, with adoption limited to voluntary alignment with ETSI standards; the United Arab Emirates' Telecommunications and Digital Government Regulatory Authority (TDRA) prescribes ASiC formats alongside XAdES, CAdES, and PAdES in its Digital Signature Standard Manual of January 2024, enabling their use for enforceable electronic transactions under Federal Decree-Law No. 46/2021 on Electronic Transactions, particularly in federal e-services and blockchain-integrated signatures.[17] Other jurisdictions, such as the UK post-Brexit, recognize electronic signatures under the Electronic Communications Act 2000 but do not mandate ASiC, favoring flexible formats without eIDAS-qualified equivalence, while countries like Switzerland accept ETSI-compliant signatures via bilateral agreements but prioritize national standards like SwissSign for qualified validity. No global treaty enforces ASiC, though its ZIP-based structure facilitates technical interoperability in regions adopting ETSI norms, such as select Middle Eastern and Asian ETSI members.[10]Technical Foundations
Container Architecture
Associated Signature Containers (ASiC) are structured as ZIP archives conforming to the ZIP Application Note specification (PKWARE APPNOTE.TXT, September 2012).[1] This format enables the packaging of one or more data objects alongside their electronic signatures or time assertions in a single, self-contained file, ensuring portability and ease of verification without altering the integrity of the contents.[1] The container employs detached signatures, where the signature files reference the data objects via uniform resource identifiers (URIs) or manifest files, preserving the original data unchanged during extraction.[2] The root of the ZIP archive contains the primary data files to be signed, placed directly without subfolders unless specified otherwise. A mandatory META-INF directory houses metadata, including signature documents and timestamps, typically formatted as XAdES (per ETSI EN 319 132-1 and EN 319 132-2) or CAdES (per ETSI EN 319 122-1 and EN 319 122-2).[1] An optional but recommended mimetype file, stored as the first entry in the archive and uncompressed, declares the container type—such as application/vnd.etsi.asic-s+zip for simple variants or application/vnd.etsi.asic-e+zip for extended variants—to facilitate automatic recognition by verifiers.[1] Baseline profiles impose further constraints, such as prohibiting MD5 digests, requiring explicit URI references to data objects, and mandating specific file extensions like .asics for simple containers or .asice for extended ones.[1] Signature binding occurs through ds:Reference elements in the signature documents, which point to the data files by relative path or full URI, or via an ASiCManifest.xml in extended containers to catalog multiple objects.[1] For simple ASiC-S containers, a single data file pairs with one signature file (e.g., signatures.xml or signature.p7s) in META-INF, ensuring one-to-one association.[1] Extended ASiC-E variants support multiple data files at the root and corresponding signature files (e.g., matching signatures.xml patterns), allowing complex multi-signature scenarios while maintaining verifiable linkages.[1] Conformance to baseline levels (B-B, B-T, B-LT, B-LTA) aligns with underlying XAdES or CAdES profiles, ensuring long-term validity through timestamping and certificate chains.[1]Signature Binding Mechanisms
Associated Signature Containers (ASiC) employ a combination of structural packaging and cryptographic referencing to bind electronic signatures to their corresponding data objects, ensuring both physical association and verifiable integrity. The core mechanism relies on the ZIP archive format, which encapsulates signed data files, signature files (conforming to AdES formats such as CAdES or XAdES), and optional metadata in a single container, identified by specific MIME types likeapplication/vnd.etsi.asic-s+zip for simple variants or application/vnd.etsi.asic-e+zip for extended ones.[1] This packaging prevents detachment of signatures from documents during storage or transmission, as the container maintains all elements together unless deliberately extracted.[1]
In ASiC-S (simple containers), binding is achieved through direct association of a single data object with one or more signature or timestamp files housed in a META-INF directory within the ZIP structure. For XAdES signatures, the signatures.xml file includes <ds:Reference> elements that point to the data object via URI (e.g., referencing the file name) or imply the reference if no explicit URI is provided, leveraging XML Digital Signature standards for hash-based verification.[1] CAdES signatures use files like signature.p7s, where binding occurs implicitly through the container's structure and the signature's internal content identifiers that match the data object's digest. Timestamp tokens (timestamp.tst) or evidence records follow similar placement rules, ensuring temporal assertions remain linked without requiring additional manifests.[1] This approach suits scenarios with minimal complexity, as the single-file limitation enforces straightforward reference resolution during validation.[2]
ASiC-E (extended containers) support more intricate binding for multiple data objects and signatures, incorporating explicit manifests to orchestrate associations. An ASiCManifest.xml file, validated against an ETSI-defined XML schema, declares SigReference elements that link to signature files (e.g., *signatures*.xml for XAdES or *signature*.p7s for CAdES) and include DataObjectReference sub-elements containing digests of the signed data objects, enabling precise mapping even in nested or multi-signature setups.[1] XAdES in ASiC-E may use <ds:Manifest> for indirect referencing of multiple objects, while CAdES relies on the manifest for cross-referencing, as CAdES lacks native multi-object support.[1] These mechanisms allow parallel signatures, countersignatures, and incremental additions without invalidating prior bindings, provided new elements reference existing ones correctly.[2]
Validation of binding integrity involves recomputing digests of data objects from the ZIP-extracted files and comparing them against those embedded in the signatures or manifests, confirming no alterations or detachments have occurred. The ETSI specifications mandate conformance to ZIP APPNOTE 6.3.3 for archive robustness, further safeguarding against manipulation.[1] This dual-layered approach—physical containment via ZIP and logical verification via AdES references and manifests—distinguishes ASiC from standalone signature formats, addressing risks of signature-document separation in long-term archiving or multi-party workflows.[1]
Usage and Implementation
Signing and Packaging Process
The signing process for Associated Signature Containers (ASiC) begins with the generation of advanced electronic signatures or timestamps over one or more data objects, adhering to ETSI standards for formats such as CAdES (per EN 319 122-1) or XAdES (per EN 319 132-1), which ensure long-term validity through inclusion of certificates, revocation information, and optional timestamps.[1] These signatures are detached, meaning they reference the data objects via hashes rather than embedding them, to maintain flexibility in packaging.[1] The signer must use cryptographic algorithms compliant with ETSI TS 119 312, such as RSA-PSS with SHA-256 or ECDSA with SHA-256, to meet security requirements for qualified electronic signatures under eIDAS.[1] Packaging follows signature creation by encapsulating the elements into a ZIP archive (per RFC 4883 or ZIP APPNOTE), with no encryption and optional DEFLATE compression to preserve integrity during verification.[1] Filenames use UTF-8 encoding, and the container must include a MIME type file at the root (e.g.,mimetype with content application/vnd.etsi.asic-s+zip for simple variants) as the first uncompressed entry for unambiguous identification.[1]
For ASiC-S (simple containers), packaging involves placing a single data object (e.g., a PDF or XML file) at the root, followed by a single signature or timestamp file in the META-INF directory, such as signatures.xml for XAdES (containing one or more <ds:Signature> elements) or signature.p7s for CAdES.[1] This structure binds exactly one data object to its associated signature(s), supporting sequential signing by multiple parties via appended XAdES elements, with file extensions like .asics or .scs.[1]
In ASiC-E (extended containers), the process accommodates multiple data objects and signatures by organizing data files outside META-INF and placing signature files (e.g., *signatures*.xml for XAdES with <asic:XAdESSignatures> or *signature*.p7s for CAdES) alongside manifests like ASiCManifest.xml that explicitly list referenced files and their digests for validation.[1] Timestamps (e.g., *timestamp*.tst per RFC 3161) or evidence records (e.g., evidencerecord.ers) can be included for non-repudiation, with extensions like .asice.[1] Each signature may cover a subset of files, enabling parallel or counter-signing scenarios while ensuring the ZIP's central directory accurately reflects the binding.[1]
Validation and Verification
Validation and verification of Associated Signature Containers (ASiC) proceed in two primary phases: syntactic validation of the container's structure and semantic validation of the embedded signatures and bindings. Syntactic validation requires confirming that the ASiC file is a valid ZIP archive per the ZIP specification, with the "mimetype" entry positioned first, stored uncompressed without extra fields or compression, and containing the MIME type "application/vnd.etsi.asic-s+zip" for ASiC-S or "application/vnd.etsi.asic-e+zip" for ASiC-E.[1] Required entries include data objects in the root or subfolders, signatures or timestamps in the META-INF directory, and, for extended containers, an ASiCManifest.xml or equivalent to reference multiple objects; deviations, such as mismatched digests or unauthorized entries, result in structural failure.[1] [2] Semantic validation extracts the AdES-compliant signatures (e.g., XAdES or CAdES) and verifies binding to data objects via ds:Reference elements in XAdES or digest lists in ASiCManifest.xml for CAdES, ensuring hashes match the actual file contents.[2] Core checks follow ETSI EN 319 102-1 procedures: format conformance, extraction and identification of the signing certificate, cryptographic verification of the signature value using the public key and approved algorithms, and X.509 certificate path validation including chain construction to a trusted anchor and revocation status via CRL or OCSP.[18] Timestamps, if included, undergo separate validation of their token signatures and signing times relative to the electronic signature production.[18] For long-term viability, verification assesses embedded or referenced validation data like revocation information or archive timestamps to confirm past validity under current constraints, yielding statuses of TOTAL-PASSED (all checks succeed), TOTAL-FAILED (critical defects), or INDETERMINATE (insufficient data).[18] Open-source implementations, such as the EU Digital Signature Service (DSS), automate these steps for ASiC, integrating trusted lists for certificate trust.[13] Conformance tools like ETSI's Signature Checker further test against baseline profiles for interoperability.[19]Container Variants
ASiC-S (Simple Containers)
ASiC-S, or simple Associated Signature Containers, constitute a baseline format for binding a single data object to an electronic signature or timestamp, ensuring persistent association during storage, transmission, and verification. Defined in ETSI EN 319 162-1, ASiC-S utilizes a ZIP archive structure compliant with ZIP specification version 4.4 or higher, employing UTF-8 encoding and prohibiting split archives or encryption to maintain accessibility and integrity.[1] This format supports interoperability by packaging the data file at the container root alongside a single signature or timestamp file within a META-INF subdirectory, with an optionalmimetype entry at the root declaring the type application/vnd.etsi.asic-s+zip.[1]
The container mandates exactly one data object, which may itself be a nested ZIP or other supported format, and one corresponding signature or assertion file, preventing fragmentation common in detached signature workflows. Supported signature formats include CAdES baseline signatures per ETSI EN 319 122-1 and XAdES baseline signatures per ETSI EN 319 132-1, alongside RFC 3161 timestamps or RFC 4998/6283 evidence records.[1] File naming conventions require the signature file to use extensions such as .p7s for CAdES, .xml for XAdES, or .tst for timestamps, stored exclusively in META-INF to enforce a standardized verification path. Conformance to baseline profiles—B-B (basic), B-T (timestamped), B-LT (long-term), and B-LTA (archival)—ensures escalating levels of validity, with signatures verifiable against the contained data references.[1]
Unlike extended variants, ASiC-S restricts contents to a singular association, eschewing support for multiple independent data objects or layered signatures, which simplifies implementation for straightforward signing scenarios while mitigating risks of desynchronization. Recommended file extensions include .asics or .scs, though .zip is permissible with the MIME declaration to signal conformance. Validation involves extracting the ZIP, confirming the mimetype, and processing the META-INF entry against the root data file, yielding high reliability in eIDAS-compliant environments for qualified electronic signatures.[1] Empirical adoption demonstrates reduced signature loss in archival systems, as the self-contained structure preserves referential integrity without reliance on external manifests.[1]
ASiC-E (Extended Containers)
The ASiC-E (Associated Signature Container Extended) format, defined in ETSI EN 319 162-1, provides a ZIP-based packaging mechanism to bind one or more data objects with multiple advanced electronic signatures or time assertions, enabling flexible management of signed content in electronic transactions.[1] This structure supports the inclusion of diverse file types, such as documents or nested containers, referenced through an ASiCManifest.xml file in the META-INF directory, which enumerates data objects and their digests using SHA-256 or stronger algorithms (MD5 prohibited).[1] Signatures conform to XAdES (ETSI EN 319 132-1 and -2) or CAdES (ETSI EN 319 122-1 and -2) profiles, with time assertions via RFC 3161 timestamps or RFC 4998/6283 evidence records, and the container uses the MIME type application/vnd.etsi.asic-e+zip.[1] Unlike ASiC-S, which limits association to a single primary data object and its signatures or timestamps, ASiC-E accommodates multiple data objects and permits sequential addition of signatures or validation material without disrupting prior bindings, making it suitable for workflows involving countersignatures or iterative validation updates.[1] For XAdES-based ASiC-E, signature files (e.g., signatures*.xml) reference data via ds:Reference or ds:Manifest elements; CAdES variants use detached .p7s files with corresponding manifest entries.[1] Containers adhere to ZIP constraints, including UTF-8 encoding and no split archives, with file extensions typically .asice or .sce for interoperability.[1] ASiC-E incorporates baseline profiles (B-B, B-T, B-LT, B-LTA) to ensure progressive long-term validity, where B-B provides basic integrity, B-T adds trusted timestamps, B-LT includes certificates and revocation data, and B-LTA incorporates archival timestamps for extended preservation against key compromise or data degradation.[1] This enables use cases such as multi-party contract signing, where successive signers append XAdES or CAdES structures referencing the container's manifest, or regulatory archiving requiring embedded validation evidence.[2] Validation processes verify the ZIP integrity, manifest consistency, and signature conformance per ETSI TS 119 172-1, confirming bindings without relying on external references unless specified.[1]Specialized Additional Containers
ETSI EN 319 162-2 specifies additional ASiC container profiles to address use cases outside the scope of baseline containers, focusing on enhanced interoperability for scenarios involving independent time assertions or alternative signature formats.[7] These specialized variants maintain the ZIP-based structure of ASiC while incorporating elements like timestamp tokens from trusted service providers, enabling long-term validity without full electronic signatures in certain evidentiary contexts.[7] One key type is the ASiC-S time assertion additional container, which associates one or more data objects with timestamp tokens rather than signatures, suitable for proving existence or integrity at a specific point without signer authentication.[2] This variant uses aMETA-INF/ASiC-metadata.xml file to reference timestamp files, ensuring the container validates the timestamps' applicability to the enclosed data.[7] Timestamp tokens comply with ETSI EN 319 421, providing cryptographic proof of data processing before a defined time, which supports non-repudiation in archiving or auditing processes.
Extended additional containers include ASiC-E with CAdES, extending the baseline ASiC-E (limited to XAdES) to support CMS-based signatures for multiple data objects and signatures, each potentially covering distinct subsets of files.[1] [7] This allows flexible binding in complex workflows, such as multi-party contracts, where CAdES signatures (per ETSI EN 319 122-1) enable embedding certificates and revocation data directly.[9] Validation requires checking the ASiCManifest.xml for signature-data associations and verifying CAdES profiles up to long-term validation levels (CAdES-LT), ensuring sustained evidentiary value over decades.[7]
These additional containers also support hybrid use cases, such as combining timestamps with signatures in extended formats, to mitigate risks of signature invalidation due to expired certificates by incorporating archival timestamps.[20] Conformance testing, as outlined in ETSI TS 119 162-2, emphasizes structural integrity, metadata accuracy, and format-specific validation to prevent interoperability failures in eIDAS-compliant systems.[20] Adoption remains niche compared to baseline types, primarily in preservation services where timestamp-only proof suffices, as evidenced by their integration in tools like the European Commission's Digital Signature Service for optional timestamping.[21]
