3 min read

eIDAS - What You See is What You Sign (WYSIWYS) for Non-Repudiation

eIDAS - What You See is What You Sign (WYSIWYS) for Non-Repudiation

What You See is What Your Sign (WYSIWYS) is a term that is used to describe an enhanced level of data integrity within a digital signature system. Its purpose is to ensure that the content of a signed message cannot be altered, whether intentionally or accidentally (non-repudiation).

Primary Objectives of WYSIWYS to Consider

There are four primary objectives to consider with the use of WYSIWYS:

  • It ensures that the integrity of the data-to-be-signed (DTBS) is protected and accurately rendered over a trusted viewer/interface before the user signs it under their sole control
  • It provides a thorough audit trail that ensures non-repudiation of origin and emission
  • The user has a way to validate the signature operation.
  • The signature is elevated to the level of qualified electronic signature (QES)

Responsive to Cyber Threats

Download white paper

WYSIWYS works to thwart man-in-the-middle attacks (MITM), where the attacker secretly accesses and, in some cases, alters communications between two parties. Both parties mistakenly believe that they are communicating directly with each other. 

WYSIWYS counters MITM attacks, including:

  • Between Client (user’s browser) and the WYSIWYS server
  • Between Client and the Signing server
  • Man-in-the Middle in the browser
  • Reusing federated identity credentials

WYSIWYS Process in a Nutshell

As seen in the infographic below, the Cryptomathic Signer (Remote signature server):

  1. Terminates the user’s sole control in the Signature Activation Module (SAM)
  2. Manages the user’s keys
  3. Verifies the Signature Activation Device (SAD) and validates the authenticity of the identity provider (IdP)

The WYSIWYS Server:

  • Receives doc from the trusted source
  • Outputs signed doc to the trusted source

Signing-WYSIWYS-Process

Client Side:

On the client’s side, the doc is displayed over a trusted interface/viewer in the browser. It also ensures the user's commitment and sole control over the signature.

Deployment Possibilities and Target Groups

Cryptomathic offers this technology to customers such as government departments, banks and trust service providers (TSPs). Depending on the strategic positioning and importance of the signing service within the customer's overall portfolio, Cryptomathic provides the infrastructure:

  • On premise. In this deployment option, Cryptomathic’s technology is installed on-premise. The customer becomes a fully qualified trust service provider (QTSP) with full control and legal liability throughout the whole signing process and the signature & certificate life-cycle. This model is the preferred choice by certified trust service providers and governments.

    Bigger banks or expansive banking networks might choose such a solution - either motivated by scale effects or by business model decisions. 
  • Partially on premise. This model allows customers to offer remote signatures, where Cryptomathic operates the back-end signature services under SLA on the institution’s behalf; the institution assumes a limited role of a TSP. Through this arrangement, the financial institution will significantly reduce the workload of operative tasks as compared to the full TSP model, but remains in control of and legally liable for the whole process.

    This model is the typical choice of banking networks or cooperatives, benefiting from the pooled and centrally managed services in the Cryptomathic cloud.
  • As a service. This model enables the customer to provide trust services to its end-customers with minimum initial outlay. The business receives access to an API for QES services and becomes a Registration Authority (RA) for all subscribing customers. The financial institution remains in control of all valuable customer data and is the single point of contact to the customer. 

    This is the typical choice of banks which operate at a limited number of locations or wanting to focus on core competencies and end customer business.

Talk to us to discuss your most suitable infrastructure option.

 

Read White Paper

References