Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

    • Environmental Topics
    • Air
    • Bed Bugs
    • Cancer
    • Chemicals, Toxics, and Pesticide
    • Emergency Response
    • Environmental Information by Location
    • Health
    • Land, Waste, and Cleanup
    • Lead
    • Mold
    • Radon
    • Research
    • Science Topics
    • Water Topics
    • A-Z Topic Index
    • Laws & Regulations
    • By Business Sector
    • By Topic
    • Compliance
    • Enforcement
    • Laws and Executive Orders
    • Regulations
    • Report a Violation
    • Environmental Violations
    • Fraud, Waste or Abuse
    • About EPA
    • Our Mission and What We Do
    • Headquarters Offices
    • Regional Offices
    • Labs and Research Centers
    • Planning, Budget, and Results
    • Organization Chart
    • EPA History

Breadcrumb

  1. Home
  2. Cross-Media Electronic Reporting Rule
  3. CROMERR 101 Training
  4. Lesson 7: From Requirements to Solutions

Lesson 7: Key Decision 1 - Type of Credential Used (continued)

Back | Next

For example, consider the following two types of credentials:

  • Shared secrets in the form of PINs or passwords
  • Certificates associated with private-public key pairs that are used to execute digital signatures
Type of Credential
Example Solutions Solution A
PINs or Passwords
Solution B
Private-Public Key Pairs A pair of cryptographic keys-a public key and a private key-used to execute digital signatures by a user. The private key is kept secret, while the public key may be widely distributed.
Issuing Credential Requires Secure Socket Layer (SSL), Transport Layer Security (TLS) or another technology during setup to protect them as they travel between registrant and system. The private key—which is used to execute the signatures—can be generated at the user's work station, so may not need to travel between registrant and system.
Binding Signature to Document Content Execution of a PIN- or password-based signature does not bind it to the document signed, so the system must provide additional functionality to provide for signature binding. The digital signature executed with the private key is bound to the document signed because the signature is just the hash value of the document content encrypted with the private key.
Signature Validation Can rely wholly on internal system records of PINs or passwords registered or issued by the system. Where the certificate associated with the key pair is issued by a third party—for example, where this is a PKI Enables users of a basically unsecure public network, such as the Internet, to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. certificate—then validation requires interaction with the issuing authority to determine that the certificate is valid.
Including Signatures in Copies of Record Signatures consisting of the PIN or password "in the clear" need "shielding" on the CORs—for example by being encrypted or hashed—so that PINs and passwords are not compromised by providing access to the CORs. Access to a digital signature (not to be confused with a digital certificate) An electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. on a COR As defined in § 3.3 of CROMERR, a true and correct copy of an electronic document received by an electronic document receiving system, which copy can be viewed in a human-readable format that clearly and accurately associates all the information provided in the electronic document with descriptions or labeling of the information. A copy of record includes: 1) All electronic signatures contained in or logically associated with that document; 2) The date and time of receipt; and 3) Any other information used to record the meaning of the document or the circumstances of its receipt. does not raise any issues of credential compromise In relationship to an electronic signature device, refers to when the device's code or mechanism is available for use by any other person. because a digital signature does not include and provides no way to derive the private key needed to execute it.

Back | Next

Cross-Media Electronic Reporting Rule

  • Learn about the Cross-Media Electronic Reporting Rule (CROMERR)
  • CROMERR 101 Training
    • Lesson 1: Overview of the Final Rule
      • Lesson 1: What Does the Rule Do?
      • Lesson 1: What Does the Rule NOT Do?
      • Lesson 1: Who is Affected?
      • Lesson 1: When Does the Rule NOT Apply?
      • Lesson 1: End of Lesson
    • Lesson 2: Quick Tour of the Final Rule
      • Lesson 2: End of Lesson
    • Lesson 3: Application Requirements
      • Lesson 3: Required Elements of a CROMERR Application
      • Lesson 3: Typical Application Components
      • Lesson 3: Cover Sheet
      • Lesson 3: Attorney General (AG) Certification
      • Lesson 3: System Description(s)
      • Lesson 3: Submitting the Application
      • Lesson 3: End of Lesson
    • Lesson 4: The EPA Review and Approval Process under Part 3
      • Lesson 4: Technical Review Committee (TRC)
      • Lesson 4: End of Lesson
    • Lesson 5: CROMERR-Compliant Electronic Reporting
      • Lesson 5: Overview of CROMERR Requirements for Electronic Reporting
      • Lesson 5: Requirements for Authorized Program e-Reporting
      • Lesson 5: Standards for an Acceptable Electronic Document Receiving System
      • Lesson 5: Defining "Valid Electronic Signatures"
      • Lesson 5: System Requirements for Receiving e-Signatures
      • Lesson 5: Priority vs. Non-Priority Reports
      • Lesson 5: Title: Enforceability Provisions
      • Lesson 5: Title: End of Lesson
    • Lesson 6: Using the Checklist to Work through System Requirements
      • Lesson 6: Registration
      • Lesson 6: Signature Process
      • Lesson 6: Submission Process
      • Lesson 6: Signature Validation
      • Lesson 6: Copy of Record (COR)
      • Lesson 6: The CROMERR Requirements and the Checklist Items
      • Lesson 6: End of Lesson
    • Lesson 7: From Requirements to Solutions
      • Lesson 7: From Requirements to Specific Solutions
      • Lesson 7: From Requirements to Specific Solutions Two Key Decisions
      • Lesson 7: Key Decision 1 - Type of Credential Used
      • Lesson 7: Key Decision 1 - Type of Credential Used (continued)
      • Lesson 7: Key Decision 2 - Defining the Copy of Record (COR)
      • Lesson 7: From Key Decisions to CROMERR-Compliant Solutions
      • Lesson 7: End of Lesson
    • Lesson 8: Four Critical Checklist Items
      • Lesson 8: CROMERR System Checklist Items
      • Lesson 8: Additional Sample Solutions
      • Lesson 8: End of Lesson
  • Overview for CROMERR
  • Program Announcements & Initiatives
  • Approved CROMERR Applications
  • CROMERR Federal Register Notices
  • Application Tools & Templates
  • Sample Applications & Checklists
  • Glossary
  • Frequently Asked Questions
  • Help Desk
Contact Us about Cross-Media Electronic Reporting Rule
Contact Us to ask a question, provide feedback, or report a problem.
Last updated on November 13, 2024
  • Assistance
  • Spanish
  • Arabic
  • Chinese (simplified)
  • Chinese (traditional)
  • French
  • Haitian Creole
  • Korean
  • Portuguese
  • Russian
  • Tagalog
  • Vietnamese
United States Environmental Protection Agency

Discover.

  • Accessibility Statement
  • Budget & Performance
  • Contracting
  • EPA www Web Snapshot
  • Grants
  • No FEAR Act Data
  • Plain Writing
  • Privacy
  • Privacy and Security Notice

Connect.

  • Data
  • Inspector General
  • Jobs
  • Newsroom
  • Regulations.gov
  • Subscribe
  • USA.gov
  • White House

Ask.

  • Contact EPA
  • EPA Disclaimers
  • Hotlines
  • FOIA Requests
  • Frequent Questions
  • Site Feedback

Follow.