- Help Center
- General legal and regulatory questions
-
Electronic signature
-
Electronic seals
-
Electronic certificate
-
Electronic timestamps
-
Signing Service
-
Identification methods
-
Smart Registration Service
-
RA agency
-
SRS Ident Website
-
Authentication and signature approval means
-
General legal and regulatory questions
-
Data privacy
-
DocuSign and Swisscom
-
Purchase and billing of our products
How long is the algorithm valid for the encryption of data and the signature?
The algorithms for hashing (checksum formation) and hash encryption follow the ETSI standard TS 119 312 recommendations, which also follow the NIS standards. These algorithms have certain assumptions about periods of 1->6 years in which they are stable. However, developments (e.g., cracking of algorithms) can also quickly lead to changes here. Swisscom Trust Services has already changed its root CA to comply with the requirements of> 6 years.
For long-term validation, it is necessary to regularly ensure integrity based on the latest algorithms, e.g., annual time-stamping of all documents or appropriate archiving solutions. Keyword “preservation of evidentiary value” – see DIN 31647:2015-05.