======ECP Archival====== In ECP applications, the archiving infrastructure should be provided. Comprehensive information about archiving can be found in section [[imza_arsivleme|Signature Archival]]. Since the Electronic Seal component in the packages created with ECP 2.0 and 2.1 versions is in the archive signature format, other electronic signature components of the P3/P4 CAdES-X LONG type in the package are also protected with archive timestamps. For this reason, the archiving scenarios for ECP cover only the cases specific to the archive signature. Accordingly, the packages specified in the table below should be archived. The Electronic Signature component in ECP 1.3 can be in P4 CAdES-X LONG or P4 CAdES-A signature format. If signature is in P4 CAdES-X LONG format, it must be protected with archival. If the signature is in P4 CAdES-A format, archiving scenarios only cover tests specific to archive signature. Archived signature can be added in the package. If there is a Final Hash component in the package, this component also needs to be renewed after archival. **Signed Files to be Archived for ECP** ^**ECP**| P4_A90 | P4_A94 | P3_A90 | P3_A94 | |:::| P4_EYPG_A28 | P4_EYPG_A29 | P3_EYPG_A28 | P3_EYPG_A29 | Trusted algorithms should be kept in the whitelist. A signed document with a timestamp, whose algorithm is not in the whitelist, must be re-archived. At the same time, the root certificates that are no longer considered trusted should be kept on the blacklist. Signed documents created with Qualified Certificates or Electronic Seal Certificates that are issued from roots in this list should also be archived. ^**Archive Packages**^ |[[https://yazilim.kamusm.gov.tr/?q=tr/system/files/private/eyp2.0_p4_test_paketleri.zip|e-Correspondance Package P4]]| |[[https://yazilim.kamusm.gov.tr/?q=tr/system/files/private/eyp2.1_p3_test_paketleri.zip|e-Correspondance Package P3]]|