Yuji Shinozaki wrote:

> You can still verify a document signed by an expired key: they are
> simply cryptographically-related numbers.  The math will never change.
> It is just that you have to verify that the document was signed within
> the certificate's validity dates ( and within the validity dates of its
> certificate chain ).  The problem here will be bookkeeping: keeping a
> record of all the necessary certs throughout the "lifetime" of these
> documents.
> 
> [ It just occurred to me: isn't it possible that if a private key is
> compromised, a forger could "back date" documents?  A CRL really has
> the effect of invalidating ALL the signatures past, present and future
> that use that cert.  Makes you realize how vital private key security
> is. ]

What is crucial to reliance on signatures is the existence of a Time
Stamping Authority to prove the existence of a document (in this case
a signature) at a certain date.  See the IETF PKIX discussion on this.

Revocation should not invalidate any private key usage prior to 
the time of revocation -- otherwise we lose entirely the non-repudiation
quality of digital signatures.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to