You are on page 1of 31

Practical Guide for secure use

of the electronic DNI


on the Internet

Guide for secure use of the electronic DNI in IT environments Page 1 of 31


INFORMATION SECURITY OBSERVATORY
Information Security Observatory
Edition: October 2010

The National Institute of Communication Technologies (INTECO), public cooperation


assigned to the Ministry of Industry, Tourism and Trade through the State Department for
Telecommunications and for the Information Society, is a platform for development of the
Knowledge Society through projections in the scope of innovation and technology.

The mission of INTECO is to provide value and innovation to citizens, to the SMEs, Public
Administrations and to the information technology sector through the development of projects
which contribute towards increasing confidence in our country’s Information Society services,
also promoting an international course of participation. For this purpose, INTECO will develop
proceedings, at least along the strategic lines of Technological Security, Accessibility, ICT
Quality and Training.

The Information Security Observatory (http://observatorio.inteco.es) falls within INTECO’s


strategic course of action concerning Technological Security, and is a national and international
icon in service of Spanish citizens , companies and administrations in order to describe, analyse,
assess and disseminate the Information Society’s culture of security and confidence.

More information: www.inteco.es

Anova IT Consulting is a Spanish company and market leader in Consultancy of Business


Processes, Research & Development & Innovation (R&D&I), Technological Services and Training.

It specialises in the design, planning and execution of R&D&I projects concerned with the Security
of information, Video Security, Biometrics, digital image processing, secure deletion and e-
business, promoting the Science-Technology-Business transfer.

It develops innovative projects relating to mobility systems, security of information, development of


digital and audiovisual content, specialised training in ICT, ICT global outsourcing and business
processes.

To guarantee the success of its projects, Anova IT Consulting has a R&D&I laboratory and a team
of professionals with recognised experience working on the design of ingenious technological
solutions which will make effective contributions to the integrated development of the company.
It collaborates with national and international entities, bringing the experience and knowledge
accrued by its researchers and consultants, promoting technological innovation through the
transfer of this knowledge, with the aim of providing the best solutions adapted to the needs of its
clients, efficiently and flexibly.

More information: http://www.anovagroup.es

Guide for secure use of the electronic DNI in IT environments Page 2 of 31


Information Security Observatory
CONTENTS

1  INTRODUCTION.............................................................................4 

2  THE ELECTRONIC DNI. TRANSACTIONS ACROSS THE


INTERNET............................................................................................5 

2.1  Legal Standard ........................................................................................ 6 

2.2  Use of the Electronic DNI ....................................................................... 7 

3  PROTECTION OF THE ELECTRONIC DNI AGAINST CYBER


ATTACKS...........................................................................................13 

3.1  Format .................................................................................................... 13 

3.2  Function ................................................................................................. 14 

4  AUTHENTICATION AND ELECTRONIC SIGNATURE ...............17 

4.1  Authentication ....................................................................................... 17 

4.2  Electronic Signature ............................................................................. 17 

5  PIN CODE.....................................................................................21 

5.1  Obtaining the PIN Code ........................................................................ 21 

5.2  Changing the PIN Code ........................................................................ 22 

6  ELECTRONIC DNI. IDENTITY GUARANTEE .............................26 

6.1  Electronic Signature Identity Guarantee ............................................. 26 

6.2  Electronic Signature Software ............................................................. 28 

6.3  Privacy ................................................................................................... 28 

7  LINKS OF INTEREST...................................................................30

Guide for secure use of the electronic DNI in IT environments Page 3 of 31


Information Security Observatory
1 INTRODUCTION

The National Identity Document, or DNI, is the official document for confirming the
personal identity of each citizen.

The electronic version of the National Identity Document is similar in appearance to the
traditional DNI. The major difference presented by the electronic DNI is the inclusion of a
chip which allows the holder to accredit themselves digitally. In the same way, it allows
you to securely sign documents electronically during operations and with full legal validity.

The electronic DNI also provides speed, comfort and immediacy when carrying out
administrative and business proceedings on the Internet.

In the current framework, Information Technology offers users the option to carry out
numerous ordinary operations using the Internet. For example:

• Obtaining a Certificate of Employment History in just a few minutes.


• Undertaking an e–Learning course at distance (possibility of obtaining official
qualifications and certificates)
• Reserving a book at the library.
• Purchasing an air ticket.
• Accessing a bank to check your last transactions.
• Signing an invoice electronically.

These opportunities have a double advantage for the citizen: journeys are not required as
the holder does not have to attend the entity where the proceeding is carried out and is
not subject to timetables, thereby avoiding time conflicts between the daily activities of the
holder and the operations which have to be carried out.

Illustration 1 - Advantages of using the DNIe

Use of the electronic DNI must be understood as a real opportunity for accelerating the
implementation of the Information Society in Spain, which, undoubtedly, will favourably
influence all citizens and the Public Administration itself.

Guide for secure use of the electronic DNI in IT environments Page 4 of 31


Information Security Observatory
2 THE ELECTRONIC DNI. TRANSACTIONS ACROSS THE
INTERNET

The electronic National Identity Document is the document which physically and digitally
proves the personal identity of its holder and permits the electronic signing of documents.

The DNIe 1 is in response to the need to provide telematic operations with the Public
Administration, companies and other citizens, providing its users with greater guarantees
of protection and security.

Illustration 2: Front side of DNIe

It is designed as an opportunity for saving time and resources, without relinquishing


privacy. It makes an efficient and advanced tool available to the citizen which offers the
option to carry out:

• Proceedings with the Public Administration (e.g. obtaining Employment History)


• Proceedings with companies and other agents in the private sector (e.g. accessing
an insurance company).
• Proceedings between citizens (e.g. carrying out a leasing agreement without the
need for people in two different cities to make a journey).

Illustration 3: URL reference: http://www.dnielectronico.es

1
From now on the term electronic DNI and DNI will be used indifferently.

Guide for secure use of the electronic DNI in IT environments Page 5 of 31


Information Security Observatory
2.1 LEGAL STANDARD

The DNIe, as the instrument which permits physical and telematic interaction, possesses,
both in its definition and its projection, a well-defined legal basis:

• Article 12.1 of Organic Law 2/1986, of 13th March, of Law Enforcement and
Security Agencies:

“In addition to the general functions established in the previous article, the
following distribution of skills material is set up: They shall be exercised by the
National Police Corps: The issuing of the national identity document and
passports".

• Article 9 of Organic Law 1/1992, of 21st February, on the Protection of Citizen


Security:

“All Spanish citizens shall have the right to be issued with the National Identity
Document which will have the protection that is granted by law to public and official
documents and shall have, by itself, sufficient value in order to prove the identity of
persons."

"The National Identity Document shall be mandatory from the age of fourteen."

• Royal Decree 263/1996, of 16th February, which regulates the use of electronic,
IT and telematic techniques by the Public Administration.

• Directive 1999/93/CE of the European Parliament and of the Council of 13th


December 1999, which sets out a Community Trademark for electronic signature.

• Royal Decree 209/2003, of 21st February, which regulates the records and
telematic notifications, as well as the use of telematic media for replacement of the
certificates provided by citizens.

• Law 59/2003, of 19th December, of Electronic Signature, which regulates,


stipulating its regulatory framework with regard to the electronic national identity
document, which stands as a recognised electronic certificate destined to spread
the use of secure instruments of electronic communication, capable of conferring
the same integrity and authenticity that currently surrounds communications
through physical media.

• Article 1 of Royal Decree 1553/2005, of 23rd December, which regulates the


issuing of the National Identity Document and its electronic signature certificates.

Guide for secure use of the electronic DNI in IT environments Page 6 of 31


Information Security Observatory
“The National Identity Document is a personal, non-transferrable document issued
by the Home Office which will have the protection that is granted by law to public
and official documents. Its holder shall be liable for its custody and conservation."

This Document has sufficient value, by itself, to prove the identity and the personal
data of its assigned holder, as well as the Spanish nationality of the latter.[…]”

• Law 11/2007, of 22nd June, on electronic access of citizens to Public Services.

• Article 2 of Law 56/2007, of 28th December, on Measures to Promote the


Information Society (LISI).

“Obligation to have a telematic communications medium for provision of services


of special economic importance to the public. Notwithstanding the use of other
remote communications media with the clients, companies which provide services
of special economic importance to the general public must provide their users with
a telematic communications medium which, through the use of certificates
recognised by electronic signature, allows them to carry out at least the following
proceedings:,

o Electronic contracting of services, supplies and goods, modification and


completion or termination of the corresponding contracts, as well as any
act or legal transaction between the parties, notwithstanding the
established industry regulations.

o Inquiry of your client's data, which will include information on their invoice
history, the last three years and the undersigned contract, including the
general conditions, if any. […]”

• Royal Decree 1586/2009, of 16th October, which modifies Royal Decree


1553/2005, of 23rd December, and regulates the issue of the National Identity
Document and its electronic signature certificates.

2.2 USE OF THE ELECTRONIC DNI

With the electronic DNI, there are three aspects which are covered at the time of carrying
out an action:

1) Authentication of identity.

2) Electronic signature of documents.

As it is made on polycarbonate, the electronic DNI has considerably improved its quality,
durability and above all its level of security. Quite simply, the electronic DNI must be used

Guide for secure use of the electronic DNI in IT environments Page 7 of 31


Information Security Observatory
during the procedure for making a transaction or telematic activity, where the users must
identify themselves by inserting their document into a smart card reader. In this way, the
full identity of the holder is confirmed for the proceeding.

2.2.1 Basic functioning


To use it, it is necessary to insert the electronic DNI card into the computer from which
the operations will be carried out.

To this end, the following components are required:

Illustration 4: Components needed to use the electronic DNI

A detailed explanation is given below of each one of the components needed for carrying
out operations with an electronic DNI.

a) Computer

The requirements of the hardware with which the electronic DNI is to be used are basic:
Any ordinary computer can be used. The equipment must have at least an Intel
Microprocessor –Pentium III or upwards- or similar technology.

The Electronic DNI has been devised to work correctly with the
main Operating Systems:

• Microsoft Windows (2000, XP, Vista and 7).

• Linux.

• Mac.

b) Internet Access

Given that the Internet is the means by which actions are performed, it is necessary that
the computer has a proper Internet connection so that the information flows without any

Guide for secure use of the electronic DNI in IT environments Page 8 of 31


Information Security Observatory
problem. Strictly speaking, every procedure on line basically consists of transmitting and
receiving some specific data from one system to another, using the Internet as a medium.

Type of Internet connection

Any connection will be fully valid. Access to websites is made using the relevant Internet
browser. The electronic DNI functions correctly with:

• Microsoft Internet Explorer (version 6.0 or later)

• Mozilla Firefox (version 1.5 or later)

c) Hardware (smart card reader)

The electronic DNI is developed on a new medium, similar to a bank card, which has a
chip on its left hand side. This converts it into a type of smart card 2 .

The electronic DNI must be placed into a smart card reader. This is a device designed to
recognise these kinds of document, into which the document is physically inserted.

Illustration 5: Smart cards reader

The reader (which must comply with standard ISO-7816 3 ) must be properly connected to
a computer. The card has to be inserted on the chip side, as it would operate in a
cashpoint machine, for example.

There are three main types of reader: Integrated into the keyboard, external (via USB) or
through a PCMCIA interface.

2
Small-size cards which have an integrated circuit enabled allowing them to carry out a series of tasks, depending upon
whether the circuit is just memory or possesses a microprocessor.
3
International standard relating to electronic identification cards.

Guide for secure use of the electronic DNI in IT environments Page 9 of 31


Information Security Observatory
Integrated into the keyboard

The keyboard belonging to the equipment may have a reader. In this case, it will operate
properly with the hardware components already there.

It should be taken into account that software (drivers) will also be needed which is able to
properly interpret the electronic DNI information. This is due to the fact that the keyboard
is designed for all smart cards and the electronic DNI has some of its own features.

Illustration 6: Keyboard reader

External components

Consist of a device that is connected to the equipment through the USB port (Universal
Serial Bus). Other usual external components may include a printer, memory pendrive,
etc.

Illustration 7: Peripheral reader

PCMCIA Interface

This type of device is inserted into the PCMCIA port of laptop computers, allowing the
electronic DNI to be read in the system upon its insertion into the card reader.

Guide for secure use of the electronic DNI in IT environments Page 10 of 31


Information Security Observatory
Illustration 8: PCMCIA Interface

d) Software

The software needed to operate with the electronic DNI is essential so that the document
functions correctly and allows the citizen to carry out procedures comfortably. The
software is set out below which allows the computer to operate properly with the card
reader.

Controllers

Controllers are also called drivers. These programs are needed so that the computer can
recognise the smart card reader and exchange information.

If presented with a peripheral card reader, the computer may not be able to communicate
with it. In this is the case, install the drivers (as a general rule they are supplied by the
manufacturer and should come with the reader). Nevertheless, the majority of operating
systems have them installed by default.

Illustration 9: Choice of modules and drivers during the installation process

Cryptographic modules

Furthermore, for the chip of the card to be properly recognised, the system must have
other types of programs installed. These are the cryptographic modules.

If attempting to work under the Microsoft Windows operating system, the equipment must
have a service installed called Cryptographic Service Provider (CSP). If, by contrast, other
environments (UNIX / Linux or MAC) are considered for using the electronic DNI, it will be
necessary to have the cryptographic module named PKCS#11.

Guide for secure use of the electronic DNI in IT environments Page 11 of 31


Information Security Observatory
Free download of these modules is available from url:
www.dnielectronico.es/descargas/

Illustration 10: URL for downloading cryptographic module

Guide for secure use of the electronic DNI in IT environments Page 12 of 31


Information Security Observatory
3 PROTECTION OF THE ELECTRONIC DNI AGAINST
CYBER ATTACKS

The DNIe provides speed, comfort, the immediate


execution of administrative and commercial procedures
using telematic media, but above all it provides security.

There is a tool which contains a “key” so that procedures


can also be easily carried out on the Internet. Like any
“key”, used correctly it provides a highly secure
communications and management environment.

3.1 FORMAT

The DNIe is made up of a polycarbonate card, to which the different security components
have been added against falsification (holograms, tactile letters, multiple laser images,
fluorescent dyes (UV/I), dyes which change colour (OVID), coded images, microtexts,
kinegrams, etc.) and includes a cryptographic chip.

The production of the DNIe in polycarbonate impedes its falsification and the inclusion of
the chip multiplies its security exponentially.

The microchip, which constitutes the main visible feature for the user, stores the following
information:

• Electronic certificate for authenticating the citizen.


• Electronic certificate for signing electronically.
• Certificate from the Certification Authority issuing (electronic DNI).
• User codes (PIN).
• Fingerprinting (the distinctive features of the fingerprint will be digitally stored).
• Digitalised photograph.
• Manuscript signature in digital format.
• Baseline data which appears written

Guide for secure use of the electronic DNI in IT environments Page 13 of 31


Information Security Observatory
Illustration 11: Physical description of the electronic DNI

3.2 FUNCTION

The purpose of the electronic DNI is to provide greater security during procedures carried
out on the Internet. In this capacity, mechanisms are included which give priority to
maximum privacy and guarantees of the system.

Illustration 12: Summary table of system security mechanisms

Guide for secure use of the electronic DNI in IT environments Page 14 of 31


Information Security Observatory
3.2.1 PIN code (Personal Identification Number)
Is a security code which operates in a similar way to that of a mobile phone or bank card.
That is, it prevents any other person than the legal owner (who will know the PIN) from
using the DNIe on the Internet for identification and digital signing.

Illustration 13: Window in Microsoft Windows for inserting the DNIe PIN

Whenever an attempt is made to carry out any electronic procedure, it is necessary to


provide proof of identity beforehand by inserting the security code (PIN number).

Without the PIN, it is not possible to carry out any kind of telematic operation. This
ensures that it is exclusively the electronic DNI holder who is able to gain access to and
carry out telematic operations on the Internet. Due to its relevance, this code and how it is
changed and verified will be discussed in more depth later.

3.2.2 Secure access


The use of the electronic DNI includes new advances in technology to prevent attack from
third party persons. It is a connection procedure which confirms, in all respects, that the
citizen authorised by PIN is carrying out the procedures securely.

The protocol of use of the DNIe is stated in the following diagram: The citizen connects to
the Public Organisation or Private Entity (for example, to the website of the Public Tax
Administration, or to a certain bank). The process can be summarised thus:

1) The citizen requests the procedure and is identified using their PIN.

2) The Organisation answers the citizen and sends him/her a message.

3) The citizen receives the message to confirm their request for this procedure.

4) A secure message channel is established.

Guide for secure use of the electronic DNI in IT environments Page 15 of 31


Information Security Observatory
Illustration 14: Secure process for connecting the citizen with an entity

"Request employment history from the General Treasury of the Social


Security on the Internet”

Access is made to the Treasury Website 4 .Electronic DNI inserted into the reader and
the identity of the interested party is confirmed by entering the PIN number.

The Treasury reads the information on the chip, acknowledging the status of the
citizen (establishes that a certain person, with name and surname, is requesting a
specific procedure on the Internet).

The Treasury sends a message indicating that it has recognised the individual, allowing
them to access their services on the Internet.

A secure channel is set up for him/her, SSL (Secure Socket Layer).

3.2.3 Secure pages


The procedures that are carried out with the electronic DNI on the Internet are on secure
websites. This makes reference to websites that have a specific security protocol to
guarantee adequate interaction of the electronic DNI.

Attention is drawn on these websites to the relevant differences. One of the most
important differences is the type of protocol used (http or https). Visually, they differ
because they begin with https instead of http (the final s means security) and because of a
locked tag or a key that appears on the lower part of the browser. Through the secure
https protocol, the transmission is encoded differently to the http protocol, in that the
transmission is made unencrypted.

Illustration 15: Explorer bars of a secure website on Mozilla Firefox and Internet Explorer

4
Available at: www.segsocial.es/Internet_1/OficinaVirtual/CatalogodeServicios/index.htm?ID=37807

Guide for secure use of the electronic DNI in IT environments Page 16 of 31


Information Security Observatory
4 AUTHENTICATION AND ELECTRONIC SIGNATURE

The main benefits of using the electronic DNI in digital environments consists of the
possibility of carrying out telematic procedures from any place and at any time of the day.

The most important thing that the DNIe offers the user is two possibilities or
complementary functions. Both options are inserted into the electronic certificate
which resides inside the chip. These alternatives are: authentication and electronic
signature.

Illustration 16: Basic operations permitted by the electronic DNI

4.1 AUTHENTICATION

Through authentication during a specific operation, an individual is able to identify


themselves irrefutably.

To identify themselves telematically, a series of measures are required. The DNIe, as well
as being able to physically identify its holder, has the function for identifying the citizen in
digital media. This prevents identity theft.

For example, on requesting a criminal record certificate, the correct authentication


confirms that the aforementioned criminal record certificate is being requested by the
interested party, and no other person.

In other words, when specific Internet websites are accessed, it is necessary to


demonstrate unquestionably that a specific person is precisely who they say they are.
This is feasible for formal validation, gaining access with an electronic DNI and
confirming it with the PIN.

4.2 ELECTRONIC SIGNATURE

The electronic signature is the collection of digital data which can guarantee that a specific
procedure or document has been signed. In this way, it is proved that the person signing
is fully in agreement with the procedure or specific document.

Guide for secure use of the electronic DNI in IT environments Page 17 of 31


Information Security Observatory
The electronic signature uniquely identifies the signatory as for a hand-written signature. It
is possible to check that the signed documents have not been altered by third parties and
an electronically signed document cannot be rejected by its signatory.

Illustration 17: Program for electronic signing

Legislation (Law 59/2003, of 19th December, on electronic signature) differentiates


between two types of electronic signature:

1) Advanced electronic signature: (Art. 3.2) electronic signature which identifies


the signatory and detects any subsequent change to the signed data, which is
uniquely associated with the signatory and with the data to which is referred and
has been created by means which the signatory can keep under his/her exclusive
control.

2) Acknowledged electronic signature: (Art. 3.3) advanced electronic signature


based on a certificate recognised and generated using a secure signature creation
device. (Art. 3.4) The acknowledged electronic signature shall have, with respect
to the data set forth in electronic format, the same value as the manuscript
signature relating to the data set forth on paper.

4.2.1 Function of the Electronic Signature


With the data on the DNIe (signature certificate) and the file to be signed, a program will
create the code needed which will later accompany the document or procedure, and shall
have the same legal value as if it were done on paper. From a technical point of view, the
procedure below is followed:

1) The citizen's connection with the Public or Private Entity is established, provided
by their electronic DNI.

Guide for secure use of the electronic DNI in IT environments Page 18 of 31


Information Security Observatory
2) The citizen identifies him/herself (it will formally recognise if it they are the person
they say they are)

3) A secure message channel is established.

Illustration 18: Secure communication procedure

In the construction protocol of this secure communications channel, there are several
proponents:

• Certificate of Public Entity (or Private Entity)

This certificate, associated with the Organisation or Entity, will guarantee that the
citizen is connected to said entity and to no other.

• Citizen’s authentication certificate

In order to identify themselves before the Organisation (or Private Entity) a


certificate with capacity for authentication will be required. In this way, the
aforementioned Organisation will be able to acknowledge the identity of the citizen.
The validity of this certificate is determined by the Police Headquarters. This
certificate, as mentioned previously, is included in the electronic DNI.

a) Protocol for electronically signing a procedure

The steps to follow for electronically signing a procedure are as follows:

5) The Public Organisation (or Private Entity) displays a form for the specific
procedure.

6) The citizen completes the form and accepts it.

7) The Public Organisation (or Private Entity) will reconstruct the form in text
format and will re-send it to the citizen for checking.

Guide for secure use of the electronic DNI in IT environments Page 19 of 31


Information Security Observatory
8) The citizen checks that the procedure being requested is exactly the one
intended (for example, subsidy request).

9) The citizen is asked to sign electronically.

10) The citizen, with their PIN and DNIe, signs the procedure.

11) The Public Organisation (or Private Entity) checks that the signature is
correct and that the electronic Certificate is active.

12) The procedure is then signed electronically.

13) The Public Organisation (or Private Entity) delivers the citizen a form which
requests receipt and signature.

Illustration 19: Secure protocol of electronic signature

Guide for secure use of the electronic DNI in IT environments Page 20 of 31


Information Security Observatory
5 PIN CODE

As was put forward in the epigraph 0 it consists of a secret key, (similar to that of a bank
card or mobile telephone) which has the purpose of preventing anyone, except the legal
holder, from using someone else's electronic DNI.

If the PIN is not inserted, no operation can be carried out on the Internet or in any other
case. The PIN is the “key” which makes access possible to the virtual world with an
electronic DNI.

Illustration 20: PIN as a personal security code

Just as with a mobile telephone, and to reinforce security, incorrectly inserting the code 3
times consecutively will result in the PIN being blocked, which will prevent any action for
operating on the Internet with the latter. To unblock it, it is necessary to go to the DNIe
Issuing Offices (in some cities these offices are in Police Stations).

Illustration 21: Warning on insertion of incorrect PIN

5.1 OBTAINING THE PIN CODE

At the time the DNIe is issued, a random 8 to 16 digit alphanumeric characters PIN is
generated (it may include letters and/or numbers. Capitals and lower case can be seen)
which is delivered to the citizen in a sealed envelope.

From the moment it is obtained it is important to remember that the PIN is the password
which safeguards the private codes of the user and, therefore, it is private, personal and
non-transferrable.

Guide for secure use of the electronic DNI in IT environments Page 21 of 31


Information Security Observatory
Illustration 22: Outside and inside the envelope containing the original PIN

Owing to the fact that the original code is generated randomly, it can be difficult for the
user to remember.

The aim is for the user to be able to remember the PIN at any time and place (when the
need arises to carry out a procedure requiring it), therefore it is advisable not to make a
note of it on the original envelope, on any other paper or document, and to change the
initial PIN for another code which is more easily remembered.

5.2 CHANGING THE PIN CODE

The protocol for changing the PIN is very simple. There are two options:

5.2.1 Changing the PIN code on the Internet


It is necessary to visit the website which permits this. It consists of a section 5 within the
page created by the National Police Corps specifically dealing with the electronic DNI
which allows the PIN code to be changed.

The procedure to be carried out is shown here to ensure the code is correctly changed.
The change does not occur directly on the web, inserting the data. It is necessary to
download specific software known as PAD 6 (Update Point for the virtual DNIe).

5
Available at: http://www.dnielectronico.es/descargas/kiosco_virtual.html
6
Available at: http://www.dnielectronico.es/descargas/softw_pad.html

Guide for secure use of the electronic DNI in IT environments Page 22 of 31


Information Security Observatory
Illustration 23: Window for executing the PAD

Once download is complete, it will be necessary to install the program through which the
PIN can be changed. For maximum security, it is essential to know the current PIN in
order to change it to another one. If the latter is not known, the user will only be able to
change it personally at the DNIe Update Point, located in an Issuing Office.

5.2.2 Changing the PIN on arrival at a DNIe Issuing Office


In this case, the citizen must attend a DNIe (PAD) Update Point, located only in those
offices 7 which issue the electronic DNI.

Illustration 24: PAD kiosk. DNI Update Point

At these Update Points, the DNIe can be inserted into the slot and, after keying in the PIN
code for identification, the latter can then be changed. If the PIN code is not known, or has
been blocked due to being inserted incorrectly three times, there is a fingerprint reader at
these Update Points which allows the cryptographic information of the fingerprint to be

7
Available at: http://www.policia.es/udoc/dni/mapa_oficinas.htm

Guide for secure use of the electronic DNI in IT environments Page 23 of 31


Information Security Observatory
compared with that of the holder which was stored on the chip at the time of issue. When
identification is validated, the application allows the holder to change the PIN of their
electronic DNI.

Illustration 25: Function of the PAD

a) Operations with the PAD

The DNI Update Points allow three different procedures:

• Change of PIN.

• Unblocking of the PIN, if it was previously blocked after being incorrectly inserted
three times consecutively.

• Renewal of the electronic Certificate.

For security reasons the electronic Certificate will expire after 30 months. One month
before its expiry, it is possible to renew it for another 30 months.

It is mandatory to carry out renewal of the Certificate in the PADs at the issuing offices. It
is not possible to do this on the Internet. An expired electronic certificate does not mean
that the electronic DNI is also expired, although it does prevent procedures being carried
out on the Internet.

Finally, to check that the DNIe is working properly and that the electronic certificates are
active, on a computer, once the electronic DNI is inserted into the reader, the Official

Guide for secure use of the electronic DNI in IT environments Page 24 of 31


Information Security Observatory
Portal of the electronic DNI can be visited and its area 8 for downloads can be accessed in
order to install the proper software with respect to the operating system being used.

If everything is operating properly, after inserting the PIN, the application will read the
electronic DNI Certificate and display this window:

Illustration 26: Checking the Authentication Certificate of your DNIe

8
Available at: http://www.dnielectronico.es/descargas/index.htmll

Guide for secure use of the electronic DNI in IT environments Page 25 of 31


Information Security Observatory
6 ELECTRONIC DNI. IDENTITY GUARANTEE

6.1 ELECTRONIC SIGNATURE IDENTITY GUARANTEE

As stated previously, the electronic chip included in the new electronic DNI contains
information relating to the personal identity of the holder; therefore there has been a lot of
emphasis on underlining the importance of compliance with the needs of privacy.

This chapter compiles and emphasises the most important things with a view to conveying
peace of mind and security to the users of the functions offered by the electronic DNI.

This security not only refers to electronic signing, but to three aspects as specified:

1) Accreditation of identity. The Authentication Certificate (Digital Signature)


ensures that electronic communication is carried out with the person they claim
to be. The citizen will also be able to prove their identity before a third person.

2) Instrument for electronically signing a document. Through using the


Signature Certificate (nonRepudiation), the person who receives an
electronically signed message can check that the signature is correct and that
the signatory cannot reject it.

3) Certification of the integrity of a document. The Certificate also makes it


possible to check that a specific document has not been altered. This can be
done by using the summary functions (hash) and the encryption of the message
and electronic signature. If the document is amended, it will indicate that it has
been altered.

Illustration 27: IT application message confirming the integrity of the document

This identity of the physical person using the DNIe is irrefutably accredited on several
levels:

Guide for secure use of the electronic DNI in IT environments Page 26 of 31


Information Security Observatory
6.1.1 Authentication using PIN
The electronic DNI requests the PIN which will automatically block after three incorrect
attempts. (CHV 9 - Card Holder Verification). The PIN code is personal and non-
transferrable. It must only be known by the holder of the document.

6.1.2 Authentication of application


The purpose of this is for the application in which a procedure is being carried out to prove
that it knows a specific name and code, in order to increase security and show that the
entity requesting the procedure is being dealt with. The steps below are followed.

• The application challenges the card.

• The application must use an algorithm in response to this challenge along with the
relevant secret code and code name.

• The card carries out the same operation and compares the result with the data
transmitted by the application. If they coincide, the presentation of the card for
future operations will be approved.

6.1.3 Mutual authentication


In order to guarantee full confidence between the parts of an operation (user and entity).

During the mutual authentication process, also included will be the secure exchange of
some session keys, which must be used to secure (encrypt) all the messages exchanged
previously. This service allows different alternatives to be used.

The two available options are base don the specification ‘CWA 14890-1 Application
Interface for smart cards used as Secured Signature Creation Devices – Part 1’ 10 , and are
as follows:

• Authentication with exchange of keys (described in chapter 8.4 of CWA 14890-1).

• Authentication of devices with privacy protection, (described in chapter 8.5 of CWA


14890-1).

6.1.4 Security of messages


The card allows a secure channel to be established which confirms the content of the
messages. HTTPS. The secure channel allows us to find out the identity of the parties,

9
Verification of the DNIe holder. This operation is carried out by checking the code provided by the external entity through
the corresponding command. Each code has its own attempts counter. These will decrease after each erroneous attempt at
insertion.
10
Electronic signature standard

Guide for secure use of the electronic DNI in IT environments Page 27 of 31


Information Security Observatory
and the communication between both is encrypted to ensure that nobody outside can
access its content.

6.2 ELECTRONIC SIGNATURE SOFTWARE

In order to carry out procedures using the whole scope of the electronic signature, it is
sometimes necessary to have specific software available which can generate the same
electronic signature.

“Electronically sign a rental contract for a garage space following its


drafting”.

There are numerous ways to do this:

1) It is feasible to produce the rental contract for the garage space on any word
processor or spreadsheet, and then obtain the option to sign it electronically with the
same processor.

2) It is also possible to use programs which allow the signature to be included on the
digital document for the rental contract.

6.2.1 Types of program for producing Electronic Signatures


There is a wide range of them available and many are free. Some not only allow electronic
signing of text documents, but also other types of file (for example, signing of an image
displaying the author and the date of the same). Among other options, we can find:

• INTECO Signature application

www.inteco.es/Seguridad/DNI_Electronico/Firma_Electronica_de_Documentos

• @firma. Digital signature Platform

www.csae.map.es/csi/pg5a12.htm

6.3 PRIVACY

Since its first conception, the need has arisen for the electronic DNI to make an effort to
preserve the privacy of its users. Like the previous DNI, the same authorised data is
included on the card up to the current date (name, residence, date of birth, etc.). The
electronic DNI is not seeking to control the citizen or to store their access data,
preferences or any other information of that nature on the Internet,

This is stipulated and regulated by the organic data protection law (LOPD), for
establishing a series of requirements that guarantee the scrupulous respect of the rights
of citizens to privacy and intimacy. These demands are strictly complied with at all times
by the electronic DNI.

Guide for secure use of the electronic DNI in IT environments Page 28 of 31


Information Security Observatory
Access may only be gained to data which is included on the DNI from the Police
Headquarters, the Civil Guard and the security forces of the state and autonomous, and
only for identification requests from the different police bodies.

6.3.1 Privacy protocol


The citizen must have their privacy guaranteed at all times, both against the Public
Powers, and against other citizens. On this last note, there are specific instruments
available to guarantee it.

The PIN plays a fundamental role, its proper use confirms that nobody other than the
holder themselves can access it. For this reason, in the event that the interested party
believes that anyone else has been able to identify their PIN, they should change the PIN
immediately, using any of the procedures available described in the previous chapter.

Guide for secure use of the electronic DNI in IT environments Page 29 of 31


Information Security Observatory
7 LINKS OF INTEREST

If the user wishes to find out more about the electronic DNI, a series of websites is listed
below with information referring to the DNIe:

• http://www.dnielectronico.es/

• http://www.usatudni.es/

• http://www.formaciondnie.es/

• http://www.inteco.es/Seguridad/DNI_Electronico/

Guide for secure use of the electronic DNI in IT environments Page 30 of 31


Information Security Observatory
Instituto Nacional
de Tecnologías
de la Comunicación

www.inteco.es
Guide for secure use of the electronic DNI in IT environments www.anovagroup.esPage 31 of 31
Information Security Observatory

You might also like