1. Help Center
  2. General legal and regulatory questions

How long is the algorithm valid for the encryption of data and the signature?

The algorithms for hashing (checksum formation) and hash encryption follow the ETSI standard TS 119 312 recommendations, which also follow the NIS standards. These algorithms have certain assumptions about periods of 1->6 years in which they are stable. However, developments (e.g., cracking of algorithms) can also quickly lead to changes here. Swisscom Trust Services has already changed its root CA to comply with the requirements of> 6 years.

For long-term validation, it is necessary to regularly ensure integrity based on the latest algorithms, e.g., annual time-stamping of all documents or appropriate archiving solutions. Keyword “preservation of evidentiary value” – see DIN 31647:2015-05.