Move to main content
:::
Index FAQ
What is the issuing frequency of CRLs?
The issuing frequency of CRLs is once daily. You can download the latest CRL from the Repository.
How to inspect the CRL?
Prior to using the CRL published by the CA in the Repository, the Relying party must first inspect the digital signature and verify that the CRL is correct.
Can the public directly access the database information?
Blocked by a firewall the CA host cannot be accessed from outside. You must retrieve certificate information or download certificates by linking to the Repository host.
What is the use of CA keys?
The CA uses both private keys and public keys. Private keys issued by the CA is used for issuing certificates and CRLs. Public keys issued by the CA is used for certificate exchange only.
What subscriber information can be made available to the public?
  1. Issued certificates published on the CA Repository (subscribers who have agreed to publish during application), the revoked certificates and the CRLs are not confidential information.
  2. Except for special arrangement, identification information and information recorded on the certificate are not considered confidential.
  3. Go to website to access and download the published information in the Repository: http://moica.nat.gov.tw (Certificate Operation/Certificate Issuance Query)
What to do if the audit logs retention period expires?
The audit officer will remove the data, no other persons must substitute this job.
How long is it necessary to backup the electronic audit logs?
Electronic audit logs must be backup once every month.
What must the CA do if the automated audit system is not working properly?
To protect system data integrity, and to avoid placing the highly confidential security system in high risk status, the CA must temporarily suspend certificate issuance service until eventual resolution of problems.
What information and events will have audit logs?
Security audit, identification and authentication, key generation, private key login and storage, private key export, certificate registration, certificate revocation, authorization for change of certificate status, CA organization setting, account management, certificate format dissection management, certificate revocation list dissection management, change of CA server settings, physical access and onsite security, anomalies, and so on and so forth.
How long the CA reviews the audit logs?
The CA reviews the audit logs every two months and tracks major events.
What is the retention period for audit logs?
The audit logs retains for two months.
What are CA's internet security measures?
The CA host and internal database are protected by double firewalls from the internet. Placed in the external firewall, its external database connects the internet. This database provides necessary maintenance, logistics and uninterrupted CRLs query service. Protected by digital signature, the internal database is connected to the external database by automated synchronized transmission. The external database carries out following operations:
  1. System repair update
  2. System weakness scanning
  3. Intrusion detecting system
  4. Firewall and,
  5. Filter router, Anti-insulation service, Intrusion attacks, etc
See chart below:
chart below
What is the retention period for CA data?
The retention period for the CA backup files and application programs for data processing are both ten (10) years.
How many tiers of security control are there for CA?
The CA operates with assurance level 3 for physical security control. There are four (4) tiers of protection for the computer room. The first tier is protected with security guards around the year; the second tier is protected with card swiping to control entry/exit; the third tier is protected with finger print biometric identification for staff of the computer room; and the fourth tier is protected with a card reader for opening of a security box, that is, the computer administrators can only use a smart card to open the security box.
How can we get the CA backup files?
Generally, the public will not be able to get the backup files. To get the backup files, you must file a written application and obtain official authorization by the competent department. The signer and date on the written document must be duly verified.
Will the application material of certificate subscribers be seen by a third party?
  1. The application material of certificate subscribers must not be made public or used by a third party without prior consent of the subscriber or required by law.
  2. The CA processes Certificate subscribers' application material according to the Law for Protection of Computer-Processed Personal Information.
How long does the CA carry out a Weakness Scanning of the Certificate Management System?
At least once per annum.
What are the protection measures for the CA files?
  1. No one must add, revise or delete the backup files.
  2. The backup files will be moved to another storage media with appropriate protection and its protection level will not be lower than that of the previous one.
  3. The backup files will be stored in a secure location.
Electronic records of the backup files have been protected by digital signature, but will it be tampered with?
Time-stamping of electronic records using digital signature is based on the computer system time and date. The CA will regularly carry out time calibration to ensure accuracy.
How does the CA securely deliver the private key to subscribers?
After certificate issuance, the CA auditor will personally passes the private key (inside the IC card) to subscribers face to face.
Will the CA back up data of the issued certificates?
  1. The CA will not have backup files of the private key for signature use.
  2. The CA will carry out regular filing but will not file the public keys in particular.
What is the CA format?
Subscriber certificate authentication standard adopts X.509 V3 and certificate revocation standard adopts X.509 V2.
Can CA take responsibility for key escrow?
The subscriber is responsible for keeping the key pair, the CA does not take responsibility for escrow of subscriber’s private key.
What are the levels of assurance? What is its applicability?
  1. Test: This level is used for interoperability testing and assumes no legal responsibility in data transmission.
  2. First Level (Rudimentary): This level provides the lowest degree of assurance concerning identity of the Subject. One of the primary functions of this level is to provide data integrity to the information being signed. This level is relevant to environments in which the risk of malicious activity is considered to be low. It may not be suitable for transactions requiring reliable authentication. It is generally insufficient for transactions requiring strong confidentiality, but may be used for this where certificates having higher levels of assurance are unavailable.
  3. Second Level (Basic): This level provides a basic level of assurance relevant to environments where there are risks and consequences of data compromise, but they are not considered to result in significant negative consequences. It is assumed at this security level that users are not likely to be malicious.
  4. Third Level (Medium): This level is relevant to environments where risks and consequences of data compromise are moderate. This may include transactions having substantial monetary value or risk of fraud.
  5. Fourth Level (High): This level is appropriate for use where the threats to data are high, or the consequences of the failure of security services are high. This may include very high value transactions or high levels of fraud risk.
What is the assurance level of Citizen Digital Certificate?
Assurance level: In accordance with the Government Public Key Infrastructure (PKI) Certificate Policy (hereinafter referred to as CP), the Interior Ministry Certification Authority (hereinafter referred to as CA) issues signature and encryption certificates in assurance level 3.
How are keys created?
The CA key pairs are generated within hardware cryptographic modules or software/hardware cryptographic modules within the IC card, meeting requirements of CPS and FIPS 140-1 level 2 certification or comparable security strength IC card.
What is the size of the key?
The Certification Authority uses 2048 bit RSA key pairs and SHA-1 hash algorithm to issue certificates while the subscriber uses 1024 bit RSA key pairs.
How is the CA key control system?
The CA adopts the private key multi-person control system (as proposed by scholar Shamir). It is a completely confidential secret sharing method whereby backup copies of a private key are held by different persons. This multi-person control gives a high degree of security. This multi-person control is also used for activating the private key.
How does the CA deal with the escrow, backup, suspension and destruction of a private key?
  1. Escrow: Private keys cannot be escrowed and the CA does not escrow private keys for subscribers.
  2. Backup: Private keys are backup for multi-person control and the high security IC card is the storage media for secret sharing.
  3. Suspension: Suspended CA RSA private keys will be controlled by m-out-of-n IC card group.
  4. Destruction: Upon expiration of the private key completion of Re-key and issuance of a new certificate, the private key in the IC card cryptographic module and the physical IC card will both be destroyed.