EIDAS REGULATION
10/13/2016 1
10/13/2016 2
Legal definition for ICT “jargon”:
Electronic identification
Election authentication
Electronic Signature (simple,
advanced, qualified)
Web site authentication
Electronic Time Stamping
Electronic Document delivery
Electronic Seal
…
Qualified Electronic Signature in
the Cloud :
AKA Server Signing
Authentication level to the Cloud is
becoming key
Re-use of Stork results for:
Authentication Assurance Level
EU PKI model based on:
 PEPS
 VIDP
Electronic identification + electronic authentication =
EU Digital Identity
Scope
10/13/2016 3
10/13/2016 4
10/13/2016 5
MIIJxwYJKoZIhvcNAQcCoIIJuDCCCbQCAQExCzAJBgUrDgMCGgUAMDoGCSqGSIb3DQEHAaAtBCtUaGlzIHRleHQgd2FzIGxvYWRlZCBmcm9tIGEgcGxhaW4gdGV4dCBmaWxloIIHwDCC
A9owggNDoAMCAQICAQIwDQYJKoZIhvcNAQEEBQAwgZQxFTATBgNVBAMTDEVkZW1vIFN1YiBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0BnZW1hdXRoLmNvbTELMAkGA1UEBhMC
VVMxFTATBgNVBAgTDFBlbm5zeWx2YW5pYTEQMA4GA1UEBxMHSG9yc2hhbTEQMA4GA1UEChMHR2VtcGx1czESMBAGA1UECxQJTk9SQU0gUiZEMB4XDTA0MDMxODE3MjgzMVo
XDTE0MDMxNjE3MjgzMVowgZMxFDASBgNVBAMTC0VkZW1vIEFsaWNlMR8wHQYJKoZIhvcNAQkBFhBpbmZvQGdlbWF1dGguY29tMQswCQYDVQQGEwJVUzEVMBMGA1UECBMM
UGVubnN5bHZhbmlhMRAwDgYDVQQHEwdIb3JzaGFtMRAwDgYDVQQKEwdHZW1wbHVzMRIwEAYDVQQLFAlOT1JBTSBSJkQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALZg
QPhOOF3cejp2VjWC0HrmG2xSP7s%2B2vQmfHT1D8gfpFr2f5eCJEn4GyOp4PJxLUlXRK5GheUXvFZcpX7NCR35Qhnfm978EhQ4EIBDjdhevLWsjv3oeei%2BbvzUymTHWDB0zeB5UJA0
M%2B%2BxO6%2BWluLZ16ctTkWJk9PaTvO0fpavAgMBAAGjggE5MIIBNTAhBglghkgBhvhCAQ0EFBYSQ2xpZW50IGNlcnRpZmljYXRlMAwGA1UdEwEB%2FwQCMAAwHQYDVR0OBBY
EFBYpejZfj966yRyue%2BRxS4NcR9vYMIHCBgNVHSMEgbowgbeAFBnk2hBUF9dgh7OuLL11nf62RSEIoYGbpIGYMIGVMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMUGVubnN5bHZ
hbmlhMRAwDgYDVQQHEwdIb3JzaGFtMRYwFAYDVQQDEw1FZGVtbyBSb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQGdlbWF1dGguY29tMRAwDgYDVQQKEwdHZW1wbHVzMRI
wEAYDVQQLFAlOT1JBTSBSJkSCAQEwCwYDVR0PBAQDAgXgMBEGCWCGSAGG%2BEIBAQQEAwIFoDANBgkqhkiG9w0BAQQFAAOBgQByaKGrjynQMJc3lJ9ZMZyjDMy7lfcne2cVphj18
GGJpsC8dzPR4y6uNl1BQ7MrYPUV9HH0rR5Onw02wMo5bnmyiGyPPE7YvXa0US1feOI0Ls3aCyCs2wbJ2ko7Z72j2scO%2FwZH7g8LBb7%2BepFftguH92YLE1Q2MgjEZX%2Fmqv5NfDC
CA94wggNHoAMCAQICAQEwDQYJKoZIhvcNAQEEBQAwgZUxCzAJBgNVBAYTAlVTMRUwEwYDVQQIEwxQZW5uc3lsdmFuaWExEDAOBgNVBAcTB0hvcnNoYW0xFjAUBgNVBAMTDUV
kZW1vIFJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9AZ2VtYXV0aC5jb20xEDAOBgNVBAoTB0dlbXBsdXMxEjAQBgNVBAsUCU5PUkFNIFImRDAeFw0wNDAzMTgxNzI2MzVaFw0x
NDAzMTYxNzI2MzVaMIGUMRUwEwYDVQQDEwxFZGVtbyBTdWIgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9AZ2VtYXV0aC5jb20xCzAJBgNVBAYTAlVTMRUwEwYDVQQIEwxQZW5uc3
lsdmFuaWExEDAOBgNVBAcTB0hvcnNoYW0xEDAOBgNVBAoTB0dlbXBsdXMxEjAQBgNVBAsUCU5PUkFNIFImRDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxL%2B6ZgyvWPID
Sh07N8XKht0mqAyj%2BmGcTvCTtKv1JJCZIPtNjJ3T5lHSjldwLlfpuoYkQApG%2FGyo1Cox0oKlyKbD%2FsAQsFbHIIGM75xLyjeqXHO0UzkHb9RMFdNsiBuak4dV%2B3mINmzFMv7Ex4M
zVcMw2G2%2F1Z%2BFEt6%2BqNqC88ECAwEAAaOCATswggE3MB0GCWCGSAGG%2BEIBDQQQFg5DQSBjZXJ0aWZpY2F0ZTASBgNVHRMBAf8ECDAGAQH%2FAgEAMB0GA1UdDgQ
WBBQZ5NoQVBfXYIezriy9dZ3%2BtkUhCDCBwgYDVR0jBIG6MIG3gBRDPGZtLIsqyiRlY39t2wGlK3Z3KKGBm6SBmDCBlTELMAkGA1UEBhMCVVMxFTATBgNVBAgTDFBlbm5zeWx2YW5
pYTEQMA4GA1UEBxMHSG9yc2hhbTEWMBQGA1UEAxMNRWRlbW8gUm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0BnZW1hdXRoLmNvbTEQMA4GA1UEChMHR2VtcGx1czES
MBAGA1UECxQJTk9SQU0gUiZEggEAMAsGA1UdDwQEAwIBBjARBglghkgBhvhCAQEEBAMCAQYwDQYJKoZIhvcNAQEEBQADgYEAuWSCUQ9%2ByUVtKCUXm4W64XePDcRIlS32nLrHv
bREi7%2BMQt%2BKGtkH00eZa9wxTrp0QgVCo4H03YptQWQJgxBKb7dLB5EtFpBienrKnkfLlbdhjHZWXB03i%2FcgPjC7xgudgmooKcLWNJz7a5iOfHUf%2B3GxveRezBSa76iaRzUcM5wx
ggGgMIIBnAIBATCBmjCBlDEVMBMGA1UEAxMMRWRlbW8gU3ViIENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQGdlbWF1dGguY29tMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMU
GVubnN5bHZhbmlhMRAwDgYDVQQHEwdIb3JzaGFtMRAwDgYDVQQKEwdHZW1wbHVzMRIwEAYDVQQLFAlOT1JBTSBSJkQCAQIwCQYFKw4DAhoFAKBdMBgGCSqGSIb3DQEJAzELBg
kqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEwMDkxMzE2NDY0MlowIwYJKoZIhvcNAQkEMRYEFFctKwKOBQXuRz1LPNvXWH2EHnm3MA0GCSqGSIb3DQEBAQUABIGArpBqvMgz
cSYFGzEDXLU%2FMRehztIPBDuVpk8fk1KH%2Be6ZXmg1uUKiYAY5Tj3XlrMJbroH5tYb1dM7bH%2Brlp8F5lxpP1d%2FMQPc0tzFVC8XyvSahvuASjF0zXOmmuY1zYIF%2FA%2Fvsv%2FU
xkjytOBZ6oow1UcNHwjhLY93cC7seT1RZ2A%3D
Certificate Info
Unique Serial Number,
format, crypto info, validity
date, usage (verif, encrypt)…
Holder identification
Name, mail address…
Public key
Issuer identification
CA name, DP address…
Extensions
Additional standard or
proprietary info
Certificate Signature
Using Issuer’s private key
Public certificate
Electronic Signature
Privacy by Design within a PKI infrastructure?
Public information as it is a public
certificate
10/13/2016 6
1999
10/13/2016 7
10/13/2016 8
Upcoming US/EU free trade zone
agreement - in 2013 = 649 B USD
10/13/2016 9
national prerogative.
mutual recognition
unambiguity
Trusted Identities in Cyberspace.
and
authenticate their digital identities
10/13/2016 10
10/13/2016 11
 Application and registration.
 Identity proofing and verification.
 Binding between the electronic identification means of
natural and legal persons.
Enrolment
 eID means characteristics and design.
 Issuance, delivery and activation.
 Suspension, revocation and reactivation.
 Renewal and replacement.
Electronic identification
means management
 Authentication mechanism.Authentication
 General provisions.
 Published notices and user information.
 Information security management.
 Record keeping, facilities and staff, technical controls,
compliance and audit.
Management and
organization
eID LoA is based on the reliability and
quality of each element*
*Article 1 of Implementing Act
10/13/2016 12
Assurance
level
Characterisitics and design Authentication
Substantial  At least two authentication factors from
different categories.
 Can be assumed to be used only if under
the control or possession of the person.
 Dynamic authentication.
 It is highly unlikely that guessing,
eavesdropping, replay or manipulation of
communication by an attacker with
moderate attack potential can subvert the
authentication mechanisms.
High Level substantial, plus:
 Protects against duplication, tampering
and attackers with high attack potential.
 It can be reliably protected by the person
against use by others.
Level substantial, plus:
 It is highly unlikely that guessing,
eavesdropping, replay or manipulation of
communication by an attacker with high
attack potential can subvert the
authentication mechanisms.
10/13/2016 13
10/13/2016 14
LEVEL 1
LEVEL 2
LEVEL 3 LEVEL 3
LEVEL 4
Token
OTP
Legacy
Password
2FA
Token
+ pw
Token OTP + pw
Token
PIN PAD
Token OTP
(PIN + certified
TEE or SE)
PKI ID (PIN +
SE, SIM/eSE)
Weak
Authentication
Secure
Authentication
Strong
Authentication
Strong
Authentication
w/secure devices
Strong
Authentication
w/secure devices
with tamper
resistance capability
Risk extremely high Risk mitigated Low risk Low risk Minimal riskRisk level
PKI eID
(PIN)
No Identity Proofing Presentation of
Identity Information Verification of Identity Information Face to face
registration
LOW SUBSTANTIAL HIGH
EnrolmentAuthenticationElectronicIDmeans
Out of
Regulation
scope
Levels of Assurance
10/13/2016 15
eIDAS Regulation vs eIDAS token specifications
Legal frame for Trusted services
Electronic
signature
ElectronicSeal
ElectronicStamp
Electronic
registereddelivery
service
Qualifiedcertificate
forwebsite
authentication
eIDAS Regulation
Perform a
qualified
signature
Without GAP
With GAP
EAC V2.05
backward
compatible
Pseudo ID
with ERA
Common electronic
identification : e-ID LDS
Common
electronic
authentication:
GAP
Standard API to use Biometry as User
Authentication method (Finger Print, Voice,
Iris, Face)
Legal frame for: electronic
identification, authentication
eIDAS token specifications
TR Signature
TR Physical User Authentication
10/13/2016 16
Timeline
•In line with the Implementing acts with eIDAS token
specifications - July 2014-July 2016.
•First pre-notification of eID: mid 2016.
•Mutual recognition (voluntary) between 2 MS: mid 2017.
•Obligation of Mutual recognition : 1st of January 2019.
Greek
P.
Italian
P.
Latvia
P.
Lux.
P.
NL
P.
Slovakia
P.
Malta
P.
UK
P.
Estonia
P.
Bulgaria
P.
Austria
P.
Romania
P.
Directive 99/93/EC (and PPSCD)
10/13/2016 17
10/13/2016 18
Contact only
Contactless
only
Hybrid
Dual
interface
Estonia
Germany eIDAS
Cyprus eIDAS
Netherlands (ICAO only)
Slovakia (eIDAS)
Poland
Netherlands (privacy
card)
Italy
Greece
Eurosmart
customers
New
projects
Finland
Belgium
Portugal
Czech Republic
Luxembourg
Bulgaria (EAC V2.05
/ eIDAS)
Malta
Sweden
Lithuania
Latvia (IAS ECC à ICAO)
Spain
WHAT EUROSMART IS
19
10/13/2016 20
What Eurosmart is
About us
Eurosmart is a non-profit association located in Brussels and
representing the smart security industry. Founded in 1995, the
association advocates the use of smart secure devices and smart
security solutions to enhance the usability of digital services while
protecting privacy and combatting fraud.
The association is fully involved in political and technical initiatives as
well as R&D at the European and international levels.
About our members
 Members are manufacturers of smart cards, semiconductors,
academics, laboratories and associations.
 They share common European root:
– Annual turnover of over 15 billion euros of which over 40% is
generated in Europe.
– Close to 60.000 employees worldwide, of whom more than 50%
work in the EU.
10/13/2016 21
Eurosmart members
What Eurosmart is
Associate members
10/13/2016 22
Our mission
CONTACTS
23
STEFANE MOUILLE
Vice-President
timothee.mangenot@eurosmart.com
PIERRE-JEAN VERRANDO
Director of operations
pierrejean.verrando@eurosmart.com
Eurosmart | Rue du Luxembourg 19-21 | 1000 Brussels | Belgium
Tél. +32 2 506 88 38
FOLLOW-US

More Related Content

PPTX
eIDAS Reference Guide
PDF
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
PPTX
ADVA launches world’s first commercial optical transport solution with post-q...
PDF
Verifiable Credentials in Self-Sovereign Identity (SSI)
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Multifactor Authentication
PPTX
Crowdstrike .pptx
PDF
IoT-Prototyping
eIDAS Reference Guide
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
ADVA launches world’s first commercial optical transport solution with post-q...
Verifiable Credentials in Self-Sovereign Identity (SSI)
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Multifactor Authentication
Crowdstrike .pptx
IoT-Prototyping

What's hot (20)

PPTX
EDR vs SIEM - The fight is on
PDF
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
PDF
Digital Identity Wallets: What They Mean For Banks
PPTX
Identity and Access Management Introduction
PDF
What is a Firewall Risk Assessment?
PPTX
PCI DSS Compliance Checklist
PDF
Ethereum-Cryptocurrency (All about Ethereum)
PPT
PCI DSS
PDF
Examples of Smart Contracts
PDF
Verifiable credentials explained by CCI
PPTX
Zero Trust Security / Sécurité Zéro Confiance
PPTX
Digital Locker System (DigiLocker) - A Government of India Initiative_1.pptx
PDF
HITCON FreeTalk 2022 - Zero Trust Architecture 讀書筆記
PDF
Introduction to Self-Sovereign Identity
PDF
Physical Security Presentation
PPTX
Threat modelling(system + enterprise)
PPTX
NotPetya Presentation
PDF
Zero-Knowledge Proofs in Light of Digital Identity
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPT
EDR vs SIEM - The fight is on
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Digital Identity Wallets: What They Mean For Banks
Identity and Access Management Introduction
What is a Firewall Risk Assessment?
PCI DSS Compliance Checklist
Ethereum-Cryptocurrency (All about Ethereum)
PCI DSS
Examples of Smart Contracts
Verifiable credentials explained by CCI
Zero Trust Security / Sécurité Zéro Confiance
Digital Locker System (DigiLocker) - A Government of India Initiative_1.pptx
HITCON FreeTalk 2022 - Zero Trust Architecture 讀書筆記
Introduction to Self-Sovereign Identity
Physical Security Presentation
Threat modelling(system + enterprise)
NotPetya Presentation
Zero-Knowledge Proofs in Light of Digital Identity
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Ad

Viewers also liked (20)

PDF
E-government eIDAS - June 2016
PPT
Internet of Things
PDF
Whitepaper E-Signing at the Inhouse Pos
PPTX
eIDAS Regulation (Reg. No. 910/2014)
PPTX
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
PDF
OpenShift: Java EE in the clouds
PDF
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
PDF
Présentation de la protection sociale française
PDF
Consulta Stati Generali dell'Innovazione
PDF
Smau 2016 Presentazione Nicola Savino Solution
PDF
Whitepaper Online E-Signing
PDF
Whitepaper Mobile E-Signing
PDF
Mobile Internet Moscow
PDF
SIGNificant ColorPad 6
PDF
xyzmo Overview Russian
PDF
Docker Tooling for Eclipse
PPTX
Electronic identification
PDF
xyzmo Company Overview
PDF
Real-Time Data Loading from MySQL to Hadoop with New Tungsten Replicator 3.0
PDF
How Netflix does Microservices
E-government eIDAS - June 2016
Internet of Things
Whitepaper E-Signing at the Inhouse Pos
eIDAS Regulation (Reg. No. 910/2014)
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
OpenShift: Java EE in the clouds
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Présentation de la protection sociale française
Consulta Stati Generali dell'Innovazione
Smau 2016 Presentazione Nicola Savino Solution
Whitepaper Online E-Signing
Whitepaper Mobile E-Signing
Mobile Internet Moscow
SIGNificant ColorPad 6
xyzmo Overview Russian
Docker Tooling for Eclipse
Electronic identification
xyzmo Company Overview
Real-Time Data Loading from MySQL to Hadoop with New Tungsten Replicator 3.0
How Netflix does Microservices
Ad

Similar to Eurosmart presentation on the eidas regulation (20)

PPTX
Authentifusion: Clarifying the Future of User Authentication
PPTX
Authentifusion: Clarifying the Future of User Authentication
PPT
Ynamono Hs Lecture
PPT
Authentication and strong authentication for Web Application
PDF
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
PPT
Authentication means in electronic environments
PDF
Ethical hacking, the way to get product & solution confidence and trust in an...
PDF
An Online secure ePassport Protocol
PPTX
Qafis, Regular smartcards 150313001
PPT
ePassport reloaded goes mobile
PPTX
Encap security
PPTX
Consumer identity @ Tuesday Update on 1 December 2009
PPTX
Authentifusion: Clarifying the Future of Customer Authentication
PPTX
E banking security
PDF
2FYSH: two-factor authentication you should have for password replacement
PDF
Mobile Solutions and Market Trends
PDF
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
PPT
Re-using existing PKIs for online Identity Management
PDF
120 i143
PPTX
5 nov gsma_eema
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
Ynamono Hs Lecture
Authentication and strong authentication for Web Application
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
Authentication means in electronic environments
Ethical hacking, the way to get product & solution confidence and trust in an...
An Online secure ePassport Protocol
Qafis, Regular smartcards 150313001
ePassport reloaded goes mobile
Encap security
Consumer identity @ Tuesday Update on 1 December 2009
Authentifusion: Clarifying the Future of Customer Authentication
E banking security
2FYSH: two-factor authentication you should have for password replacement
Mobile Solutions and Market Trends
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
Re-using existing PKIs for online Identity Management
120 i143
5 nov gsma_eema

Recently uploaded (20)

PPTX
Enterprise Network Design and Implementation Project using Cisco ASA, FortiGa...
PDF
Overview of Fundamentals of Project Management
PPTX
Principles-of-International-Environmental-Law.pptx
PPTX
Staff WelFare Presentation for Larger Organizations
DOC
办DSU毕业证学历认证,罗杰威廉姆斯大学毕业证毕业典礼
PPTX
Training for Village Watershed Volunteers.pptx
PPTX
The Power of Communication & Overcoming
PDF
Enhancing the Value of African Agricultural Products through Intellectual Pro...
DOCX
Sheka Indigenous Knowledge and Governance
PPTX
ECO VAULT AUTOMATIC DIAPER DISPENSER AND SHREDDER
PPTX
HRPTA PPT 2024-2025 FOR PTA MEETING STUDENTS
PDF
Echoes of AccountabilityComputational Analysis of Post-Junta Parliamentary Qu...
PPTX
VIVEK BOOK REVIEW the fish sticks book.pptx
PDF
The History of COBSI, a Community-based Smallholder Irrigation, and its Regio...
PPTX
2025-08-31 Joseph 05 (shared slides).pptx
PDF
Unit 3 Ratio Analysis.pdf xdvdssdfsdfsd sdf
PPTX
Special Occasion Speech by NBA YoungBoy.pptx
PPTX
The-Impact-of-Study-Spaces-on-Academic-Performance.pptx
PPTX
The walking dead SERIE PARA EXPONER DISPOSITIVA
PPTX
Go Kiss the World book review presentation.pptx
Enterprise Network Design and Implementation Project using Cisco ASA, FortiGa...
Overview of Fundamentals of Project Management
Principles-of-International-Environmental-Law.pptx
Staff WelFare Presentation for Larger Organizations
办DSU毕业证学历认证,罗杰威廉姆斯大学毕业证毕业典礼
Training for Village Watershed Volunteers.pptx
The Power of Communication & Overcoming
Enhancing the Value of African Agricultural Products through Intellectual Pro...
Sheka Indigenous Knowledge and Governance
ECO VAULT AUTOMATIC DIAPER DISPENSER AND SHREDDER
HRPTA PPT 2024-2025 FOR PTA MEETING STUDENTS
Echoes of AccountabilityComputational Analysis of Post-Junta Parliamentary Qu...
VIVEK BOOK REVIEW the fish sticks book.pptx
The History of COBSI, a Community-based Smallholder Irrigation, and its Regio...
2025-08-31 Joseph 05 (shared slides).pptx
Unit 3 Ratio Analysis.pdf xdvdssdfsdfsd sdf
Special Occasion Speech by NBA YoungBoy.pptx
The-Impact-of-Study-Spaces-on-Academic-Performance.pptx
The walking dead SERIE PARA EXPONER DISPOSITIVA
Go Kiss the World book review presentation.pptx

Eurosmart presentation on the eidas regulation